Search results
Results from the WOW.Com Content Network
The Indian Cyber Crime Coordination Centre (I4C; Hindi: भारतीय साइबर अपराध समन्वय केंद्र) is a government initiative to deal with cybercrime in India, in a coordinated and effective manner. It is affiliated to the Ministry of Home Affairs, Government of India.
National Cybercrime Reporting Portal is online reporting portal set up by Government of India to help victims of Cyber crime and Cyber fraud. It was launched on 11 December 2023. It was launched on 11 December 2023.
However, India has formulated the National Cyber Security Policy 2013 which is not yet implemented. [4] The National Cyber Coordination Centre's purpose would be to help the country deal with malicious cyber-activities by acting as an Internet traffic monitoring entity that can fend off domestic or international attacks. [5] [6]
India had no Cyber security policy before 2013. In 2013, The Hindu newspaper, citing documents leaked by NSA whistle-blower Edward Snowden, has alleged that much of the NSA surveillance was focused on India's domestic politics and its strategic and commercial interests. [5] This sparked a furore among people.
The World Economic Forum’s 2023 Global Risks Report ranked cybercrime as one of the top 10 risks facing the world today and for the next 10 years. [6] If viewed as a nation state, cybercrime would count as the third largest economy in the world. [7] In numbers, cybercrime is predicted to cause over 9 trillion US dollars in damages worldwide ...
The law applies to the whole of India. If a crime involves a computer or network located in India, persons of other nationalities can also be indicted under the law. [2] The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes ...
Main page; Contents; Current events; Random article; About Wikipedia; Contact us
A cyberattack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.