Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights

Authors

  • Rahul Khanna Ganges Valley Institute of Law Varanasi

DOI:

https://doi.org/10.36676/ijl.v2.i3.28

Keywords:

Cybersecurity law, Digital assets, Privacy rights, Cyber threats, Data breaches, Malware attacks

Abstract

Provides an overview of the complex landscape of cybersecurity law, highlighting the challenges and legal frameworks aimed at safeguarding digital assets and privacy rights in an increasingly interconnected and digital world. the evolving nature of cybersecurity threats, the legal principles underpinning cybersecurity regulation, and the tensions between security imperatives and individual rights. Cybersecurity law encompasses a broad range of legal principles, regulations, and policies designed to protect digital assets, information systems, and privacy rights from cyber threats and attacks. the multifaceted nature of cybersecurity challenges, including data breaches, malware attacks, ransomware, insider threats, and state-sponsored cyber espionage, which pose significant risks to individuals, organizations, and governments worldwide.

References

Anju. (2017). Right to Privacy as a Fundamental Right. Innovative Research Thoughts, 3(8), 1–7. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/185

Avinash Gaur. (2023). The Evolution of Privacy Laws in the Digital Age: Challenges and Solutions. International Journal for Research Publication and Seminar, 14(1), 352–360. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/382

Atomode, D (2024). HARNESSING DATA ANALYTICS FOR ENERGY SUSTAINABILITY: POSITIVE IMPACTS ON THE UNITED STATES ECONOMY, Journal of Emerging Technologies and Innovative Research (JETIR), 11 (5), 449-457.

Clarke, N., & Rennie, A. (2019). Cybersecurity Law. Cambridge University Press.

Chertoff, M. (2018). Exploding Data: Reclaiming Our Cyber Security in the Digital Age. Atlantic Books.

Dr. Archana Adhik Pawar. (2023). Human Rights & Constitutional laws in International Scenario. International Journal for Research Publication and Seminar, 14(2), 195–201. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/408

Dr. Archana Adhik Pawar. (2023). Effects of Technology on Human Rights in International Scenario. International Journal for Research Publication and Seminar, 14(2), 186–194. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/407

Dr. Sunil Khosla. (2017). The Right to Privacy: Constitutional Perspective in India. Innovative Research Thoughts, 3(2), 121–127. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/526

Greenleaf, G. (Ed.). (2017). Global Data Privacy Laws: 2018 Edition. Edward Elgar Publishing.

Heyman, L. J., & Januszewski, J. (2016). The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value. Apress.

Lynch, J. J. (2017). Data Breach and Encryption Handbook. Thomson Reuters.

Katragadda, V. . (2024). Leveraging Intent Detection and Generative AI for Enhanced Customer Support. Journal of Artificial Intelligence General Science (JAIGS) ISSN:3006-4023, 5(1), 109–114. https://doi.org/10.60087/jaigs.v5i1.178

Reidenberg, J. R., & Burrell, J. W. (2019). Information Privacy Law. Wolters Kluwer.

Satyanarayan Kanungo, 2021. "Enhancing IoT Security and Efficiency: The Role of Cloud Computing and Machine Learning" ESP Journal of Engineering & Technology Advancements 1(1): 7-14. DOI: https://doi.org/10.56472/25832646/JETA-V1I1P099

Schrems, M. (2018). Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family. Rowman & Littlefield Publishers.

Singla, M. (2017). Right to Privacy, Constitutional Rights and latest reform in 2017. Innovative Research Thoughts, 3(9), 58–62. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/224

Singla, A. (2024). The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights. Indian Journal of Law, 2(1), 1–6. https://doi.org/10.36676/ijl.v2.i1.01

Solove, D. J. (2015). Understanding Privacy. Harvard University Press.

Spiekermann, S., & Cranor, L. F. (2015). Engineering Privacy in Data-intensive Systems. Springer.

Van Alstine, J., & Neumann, G. (2018). Cybersecurity: Shared Risks, Shared Responsibilities. Harvard Kennedy School.

Downloads

Published

01-07-2024
CITATION
DOI: 10.36676/ijl.v2.i3.28
Published: 01-07-2024

How to Cite

Rahul Khanna. (2024). Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights. Indian Journal of Law, 2(3), 15–20. https://doi.org/10.36676/ijl.v2.i3.28

Issue

Section

Original Research Article