Cyber Security : Protection of Human Rights

Authors(1) :-Navjot Jyoti

Presently, it is basic to share data publically on the web. There are numerous social sites which are utilizing person's information to show publically. Although each site clarifies their privacy policies however everybody doesn't know from these points of interest. Thus, there are numerous breaks to person's data. At the point when data is access by unapproved people utilizing Computer as well as Internet then it is a crime known as a cyber crime. It is our right to keep the information private and if someone is rupturing the security of other without approval then it resembles violations of human rights. This article gives information about cyber crime, privacy, right to privacy, and protection of this private data of individuals by National Cyber Security Policy.

Authors and Affiliations

Navjot Jyoti
Assistant Professor, Department of Computer Science & Engineering, Northwest Group of Institutions, Dhudike, Moga, Punjab, India

Cyber Security, Human Rights, National Cyber Security Policy, Cyber Phishing

  1. Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.
  2. Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN 0-201-70719-5
  3. accessed on 1 Dec 2013
  5. Paper by Roger Clarcke, National University of Australia,
  9., 15 April-2017

Publication Details

Published in : Volume 3 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 888-895
Manuscript Number : IJSRSET1841236
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Navjot Jyoti, " Cyber Security : Protection of Human Rights, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.888-895, March-April-2017.
Journal URL :

Article Preview

Follow Us

Contact Us