Abstract
The suggested study paper intends to go thorough cybersecurity standards for India. The presentation will begin by giving a general review of India’s current cybersecurity environment and analysing the numerous risks and difficulties the nation is now experiencing. The following section of the paper will explore the current cybersecurity laws and regulations in India and evaluate their efficacy. This research will be used to provide a set of recommendations for best practises, technology adoption, capacity building, and public-private partnerships for enhancing cybersecurity in India. The paper’s conclusion will emphasise the significance of cybersecurity in assuring the expansion and advancement of the Indian economy as well as the necessity of a proactive strategy to cybersecurity to deal with the changing threat landscape.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://www.india.com/technology/unacademy-hacked-data-of-22-million-users-sold-on-dark-web-4022974/
Poornima B (2022) Cyber threats and nuclear security in India. J Asian Secur Int Affairs 9(2):183–206. https://doi.org/10.1177/23477970221099748
Prasad S, Kumar A (2022) Cyber terrorism: a growing threat to India’s cyber security. Springer Singapore, Singapore, pp 53–73
Godbole T, Gochhait S, Ghosh D (2022) Developing a framework to measure cyber resilience behaviour of Indian bank employees. In: Senjyu T, Mahalle PN, Perumal T, Joshi A (eds) ICT with intelligent applications. Springer Singapore, Singapore, pp 299–309
Datta P, Panda SN, Tanwar S, Kaushal RK (2020) A technical review report on cyber crimes in india. In: 2020 International conference on emerging smart computing and informatics (ESCI), pp 269–275
https://opengovasia.com/the-current-state-of-cyber-security-in-india/
https://securityboulevard.com/2021/06/third-party-data-breaches-a-rising-threat/
https://kratikal.com/blog/the-current-state-of-cyber-security-in-india/
Chakraborty A, Jindal M, Khosravi MR, Singh P, Shankar A, Diwakar M (2021) A secure IoT-based cloud platform selection using entropy distance approach and fuzzy set theory. Wirel Commun Mob Comput 2021:1–11
Chauhan H, Kumar V, Pundir S, Pilli ES (2013) A comparative study of classification techniques for intrusion detection. In: 2013 International symposium on computational and business intelligence. IEEE, pp 40–43
Sharma S, Ghanshala KK, Mohan S (2019) Blockchain-based internet of vehicles (IoV): an efficient secure ad hoc vehicular networking architecture. In: 2019 IEEE 2nd 5G World forum (5GWF), pp 452–457. https://doi.org/10.1109/5GWF.2019.8911664
Thapliyal S, Nautiyal P (2021) A mechanism of sentimental analysis on youtube comments. Element Educ Online 20(2):2391–2397. https://doi.org/10.17051/ilkonline.2021.02.254; https://ilkogretim-online.org/?mno=111555
Thapliyal S, Wazid M, Singh DP (2023) Blockchain-driven smart healthcare system: challenges, technologies and future research. In: Choudrie J, Mahalle P, Perumal T, Joshi A (eds) ICT with intelligent applications. Springer Nature Singapore, Singapore, pp 97–110
Thapliyal S, Wazid M, Singh DP, Das AK, Alhomoud A, Alharbi AR, Kumar H (2022) ACM-SH: an efficient access control and key establishment mechanism for sustainable smart healthcare. Sustainability 14(8). https://doi.org/10.3390/su14084661, https://www.mdpi.com/2071-1050/14/8/4661
Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Int Things J 5(1):269–282
Wazid M, Das AK, Shetty S, Rodrigues JJ, Guizani M (2022) AISCM-FH: AI-enabled secure communication mechanism in fog computing-based healthcare. IEEE Trans Inform Foren Secur 18:319–334
Wazid M, Singh J, Das AK, Shetty S, Khan MK, Rodrigues JJ (2022) ASCP-IOMT: AI-enabled lightweight secure communication protocol for internet of medical things. IEEE Access 10:57990–58004
Wazid M, Thapliyal S, Singh DP, Das AK, Shetty S (2022) Design and testbed experiments of user authentication and key establishment mechanism for smart healthcare cyber physical systems. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2022.3163201
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Juyal, T., Thapliyal, S., Garg, N., Singh, D. (2023). A Study on Cyber Security and its Challenges in India. In: Choudrie, J., Mahalle, P.N., Perumal, T., Joshi, A. (eds) IOT with Smart Systems. ICTIS 2023. Lecture Notes in Networks and Systems, vol 720. Springer, Singapore. https://doi.org/10.1007/978-981-99-3761-5_15
Download citation
DOI: https://doi.org/10.1007/978-981-99-3761-5_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3760-8
Online ISBN: 978-981-99-3761-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)