Understanding the foundations of cybersecurity, including intrusion detection, cloud security, data privacy, and cyber security operations, in addition to industry-standard technology like firewalls and data encryption. BOB THOMAS is the Father of Cybercrime.
Professional recognition for VU’s Bachelor of Information Technology is granted by the Australian Computer Society.

Cyber Security


Section 45 of the Indian Penal Code is a residuary clause that stipulates that anyone who violates any of the IT Act’s requirements, for which there isn’t a separate penalty, faces up to 25,000 rupees in penalties or compensation. Privacy violations are punishable under the IT Act. Given its assessment that Sections 66E, 72, and 72A would offer an adequate degree of protection, Section 66E necessitates the cooperation of the relevant parties. On the other hand, Section 72A simply calls for limited consent. In essence, the only people to whom this section applies are those who get authority under the Act. The maximum penalty is three years in prison, a fine of five lakh rupees, or both. It covers incidents of password and login ID theft as well as illegal access to computer databases.


In 1992, the first polymorphic virus was released, marking the beginning of cybercrime. It was Yahoo v. Akash Aurora. One of the first instances of cybercrime in India dates back to 1999.
Examples include the following: ATM system hacking; ∙ UIDAI Aadhaar software hacking; ∙ SIM Swamp Scam; and ∙ Cosmos Bank cyberattack in Pune.
HACKING: The deliberate use of computer system vulnerabilities in an organization is referred to as cyber hacking, or cyberattacking. It can be used to further malicious goals, obstruct communication or operations, or steal data.
Five Typical Cyber Hacking Methods Exist:
Ethical hacking: What is it? An authorized person can try to access your computer, system, or data without authorization as a means of evaluating cybersecurity.

Privacy Rules

The GDPR The Data Protection Directive 95/46/EC (DPD) has been superseded by the EU General Data Protection Regulations (GDPR). All EU nations are required by common law to facilitate the free and safe flow of data across EU borders. It attempts to shield all EU residents from privacy violations and data breaches by placing data subjects at the forefront of data security. By May2018, you must abide by the rules if you are in charge of or handle sensitive personal data, such as Personally Identifiable Information (PII), belonging to EU nationals. You still have to abide by the regulations even if you don’t have any offices or staff in the EU.
The Global Data Protection Regulations, or GDPR, will go into force on May 25, 2018. The primary goals of the GDPR are to offer residents and individuals more control over their personal data and, by bringing all EU legislation under one roof, to streamline the regulatory framework for global trade. The GDPR broadens the application of EU data protection law to include all foreign businesses that handle the data of EU citizens.
But doing so comes with a rigorous data privacy compliance system and harsh fines of up to 4% of global revenue of $20 million.


CCPA – The California Consumer Privacy Act (CCPA) offers customers greater control over the personal data that companies gather about them. The regulations governing the CCPA also offer guidelines on how the law should be applied. With the exception of a few specific instances, this landmark law gives California consumers additional privacy rights, such as the following: ∙ The right to know what Personal Information a business collects about them, how it is used, and disseminated ∙ The ability to have their gathered personal information deleted.
∙ The ability to refuse to have their personal information sold or shared. ∙ The protection against discrimination for using their CCPA rights. Voters in California enacted Proposition 24, also known as the CPRA, in November 2020. This updated the CCPA and provided new privacy protections that went into effect on January 1, 2023. Customers now have additional rights, like the ability to have erroneous personal information about them from firms corrected. These rules regarding online privacy in order to protect our personal information from processes like hacking, theft, and cyberbullying, the CCPA and GDPR both have limited access to personal information and the ability to remove rights from computer access.

Make sure to use strong passwords, avoid sharing too much on social media, exercise caution while using free Wi-Fi, be on the lookout for links and attachments, verify if the website is secure, think about additional protection, and back up your data. Click here to get in touch with us for free consultation.

Author Avatar
Siddhi Mavadia

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *