-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
720 lines (648 loc) · 36.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
<!DOCTYPE html>
<html lang="en">
<head>
<title>Blog</title>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<script src="https://kit.fontawesome.com/yourcode.js" crossorigin="anonymous"></script>
<style>
* {
box-sizing: border-box;
}
/* Style the body */
body {
font-family: serif;
margin: 0;
}
/* Header/logo Title */
header {
position: relative;
background-color: black;
height: 75vh;
min-height: 25rem;
text-align: center;
width: 100%;
padding: 120px;
color: white;
overflow: hidden;
font-size: 40px;
}
header video {
position: absolute;
top: 50%;
left: 50%;
min-width: 100%;
min-height: 100%;
width: auto;
height: auto;
z-index: 0;
-ms-transform: translateX(-50%) translateY(-50%);
-moz-transform: translateX(-50%) translateY(-50%);
-webkit-transform: translateX(-50%) translateY(-50%);
transform: translateX(-50%) translateY(-50%);
}
header .container {
position: relative;
z-index: 2;
}
header .overlay {
position: absolute;
top: 0;
left: 0;
height: 100%;
width: 100%;
background-color: black;
opacity: 0.5;
z-index: 1;
}
@media (pointer: coarse) and (hover: none) {
header {
background: url('image/look.jpg') black no-repeat center center scroll;
}
header video {
display: none;
}
}
/* Style the top navigation bar */
.navbar {
overflow: hidden;
background-color: #333;
}
/* Style the navigation bar links */
.navbar a {
float: left;
display: block;
color: white;
text-align: center;
padding: 14px 20px;
text-decoration: none;
}
/* Right-aligned link */
.navbar a.right {
float: right;
}
/* Change color on hover */
.navbar a:hover {
background-color: #ddd;
color: black;
}
/* Column container */
.row {
display: -ms-flexbox;
/* IE10 */
display: flex;
-ms-flex-wrap: wrap;
/* IE10 */
flex-wrap: wrap;
}
/* Create two unequal columns that sits next to each other */
/* Sidebar/left column */
.side {
-ms-flex: 8%;
/* IE10 */
flex: 8%;
background-color: #f1f1f1;
padding: 10px;
}
/* Main column */
.main {
-ms-flex: 70%;
/* IE10 */
flex: 70%;
background-color: white;
padding: 20px;
text-align: justify;
line-height: 150%;
}
.heading {
text-justify: newspaper;
}
/* Fake image, just for this example */
.fakeimg {
background-color: #aaa;
width: 100%;
padding: 20px;
}
.author {
background-image: url(image/Krishnaranjani.jpg);
background-size: contain;
background-repeat: no-repeat;
width: 100%;
padding: 20px;
}
.cover {
background-image: url(image/securtity.jpg);
background-size: contain;
background-repeat: no-repeat;
background-position: center;
width: 100%;
padding: 20px;
}
.img1 {
background-image: url(image/dia\ 1.PNG);
background-size: initial;
background-repeat: no-repeat;
background-position: center;
width: 100%;
padding: 160px;
}
.img2 {
background-image: url(image/Dia.PNG);
background-size: initial;
background-repeat: no-repeat;
background-position: center;
width: 100%;
padding: 160px;
}
.abc {
animation-duration: 3s;
animation-name: slidein;
animation-iteration-count: 1;
}
@keyframes slidein {
from {
margin-left: 100%;
width: 300%;
}
to {
margin-left: 0%;
width: 100%;
}
}
/* Footer */
.footer {
padding: 20px;
text-align: center;
background: #212529;
color: #f2f2f2;
}
.ftext {
color: rgb(255, 255, 255);
padding: 20px;
font-family: serif;
font-size: 20px;
}
.icon{
color: azure;
padding: 20px;
font-family: Georgia, 'Times New Roman', Times, serif;
font-size: 20px;
}
.nounderline{
text-decoration-line: none;
}
table {
text-align: center;
border-collapse: collapse;
border-spacing: 0;
width: 60%;
border: 4px solid #ddd;
}
th {
text-align: left;
padding: 16px;
color: #f1f1f1;
background-color: #323539;
}
td {
text-align: left;
padding: 10px;
}
tr:nth-child(even) {
background-color: #f2f2f2;
}
/* Responsive layout - when the screen is less than 700px wide, make the two columns stack on top of each other instead of next to each other */
@media screen and (max-width: 700px) {
.row {
flex-direction: column;
}
}
/* Responsive layout - when the screen is less than 400px wide, make the navigation links stack on top of each other instead of next to each other */
@media screen and (max-width: 400px) {
.navbar a {
float: none;
width: 100%;
}
}
</style>
</head>
<body>
<header>
<div class="overlay"></div>
<video playsinline="playsinline" autoplay="autoplay" muted="muted" loop="loop">
<source src="video/sea.mp4" type="video/mp4">
</video>
<div class="container h-100">
<div class="d-flex h-100 text-center align-items-center">
<div class="w-100 text-white">
<h1 class="display-1">BLOG</h1>
</div>
</div>
</div>
</header>
<div class="navbar">
<a class="navbar-brand" href="#">KRISHNARANJANI</a>
</div>
<div class="row">
<div class="side">
<h1>Author</h1>
<div class="author" style="height:200px;"></div>
<h1>Krishnaranjani</h1>
<h2>😃Passionate   Engineer</h2>
</div>
<div class="main">
<h1 class=" heading display-2">Defence on Cyber Crimes Against Women and Laws in India</h1>
<h3>A Survey, July 02, 2021</h3>
<p class="text-justify text-center font-weight-bold">         Though crime against women is
on a rise in all fields being a casualty of cyber crime might be most traumatic involvement for a woman.
Particularly in India where the society looks down upon the woman, and the law doesn’t indeed
legitimately perceive cyber crimes. Time is presently here to acquit that our women are secure in cyber
world; the memento alarms to halt clowning around activities on web get to because it is an offense and
women take umbrage from it. Each moment, one woman in India gets deceived to be a casualty of and the
online platform cyber violations and a cyber crime is presently the modern stage where a security,
woman’s dignity and security is progressively being challenged each minute. Offense, undermining,
Trolling, stalking, voyeurism, body-shaming, slandering, watchfulness, exact retribution porn and
numerous other shapes of obscene representation of women are uncontrolled within the cyber world. In
this paper we organize to examine upon the diverse sorts of cyber crimes that can be caused upon a
woman, and they unfavourably influence her. We shall also briefly examine upon the different laws that
exist to secure woman in such cases such as the Information Technology Act (2000).</p>
<div class="cover" style="height:200px;"></div>
<h3 class="abc" align="center"><q> Security used to be an inconvenience sometimes, but now it’s a necessity
all the time. </q> </h3>
<p></p>
<p></p>
<p></p>
<p></p>
<h2>Cyber Crimes Against Women</h2>
<p>         Technical measures to forfend computer systems are being implemented along with
licit measures to obviate and deter malefactor deportment. But this technology kens no physical
boundaries; it flows more facilely around the world subsequently the malefactors are increasingly
located in places other than where their acts engender their effects and Cyberspace is no exception to
it. Cyberspace is an incipient horizon controlled by machine for information and any malefactor activity
where computer or network is utilized as the source, implement, or target is kenned Cybercrime. The
mundane types of cybercrime may be discussed under the following heads: hacking, cyber stalking, cyber
pornography, phishing, web jacking, software piracy, and cyber terrorism. Cybercrime against women in
India is relatively an incipient concept. When India commenced her peregrination in the field of
Information Technology, the priority was given to the aegis of electronic commerce (e-commerce) and
communications under Information Technology Act, 2000 whereas cyber socializing communications has
remained untouched. The Act turned out to be a moiety baked law as the operating area of the law
stretched Cyber Victimization of Women and Cyber Laws in India. The present study is an endeavour to
highlight the cyber malefactions against women in India</p>
<p></p>
<p></p>
<p>        Indian women aren't ready to report cybercrimes straightaway as they're not
extremely aware on wherever to report such crimes or aren't serious regarding coverage an equivalent
thanks to social embarrassment they don’t wish to face.Their mindset needs to broaden and they must be
the whip to curb down by taking derring-do against such perpetrators that is to go ahead and lodge an
immediate complaint. Most of the issues will be resolved if women report the crime right away and warn
the wrongdoer concerning taking robust action.</p>
<p></p>
<p></p>
<p>        Cybercrimes intent typically through fake ids created on Facebook, Twitter and
different social media platforms inflicting grave injury to women, as through these platforms, major
blackmailing, threatening, bullying, or cheating via person messages and email unit of measurement done
by perpetrators. Ill-intentioned men act these cyber-crimes with malafide intention like smuggled gain,
revenge, insult to the modesty of a woman, extortion, blackmailing, sexual exploitation, defamation,
incite hate against the community, and prank satisfaction of acquiring and to steal data</p>
<p></p>
<p></p>
<h2>Major Cyber Crime Areas</h2>
<p>         Some of the most important well-known cybercrimes have place thousands of girls
into varied health problems like depression, cardiovascular disease and women suffer from anxiety,
cardiomyopathy, diabetic and thyroid ailments because of e-harassment. Major cyber crimes area unit as
under,</p>
<h3>                     ▪ Cyber stalking</h3>
<h3>                     ▪ Defamation</h3>
<h3>                     ▪ Morphing </h3>
<h3>                     ▪ Cyber Pornography</h3>
<h3>                     ▪ E-mail spoofing</h3>
<h3>                     ▪ Trolling</h3>
<p></p>
<p></p>
<h2>Cyber Law under the Information and Technology Act, 2000</h2>
<p>        The stalkers and cybercriminals can be booked under several sections for
breaching of privacy. Section 67 deals with publishing or transmitting obscene material in electronic
form. The earlier section in ITA was later widened as per ITAA 2008 in which child pornography and
retention of records by intermediaries were all included.</p>
<p></p>
<p></p>
<h3>a) Section 66A</h3>
<p></p>
<p></p>
<p>        Sending offensive messages through communication service, inflicting annoyance
etc., through associate transmission or causing associate email to mislead or deceive the recipient
regarding the origin of such messages normally referred to as IP or email spoofing area unit all coated
here. Punishment for these acts is imprisonment up to three years or fine. </p>
<p></p>
<p></p>
<h3> b) Section 66B</h3>
<p></p>
<p></p>
<p>        Dishonestly receiving taken computer resource or communication device with social
control up to a few years or one large integer rupees as fine or each.</p>
<p></p>
<p></p>
<h3> c) Section 66D</h3>
<p></p>
<p></p>
<p>        Cheating by person on victimization computer resource or a communication device
shall be reprimanded with imprisonment of either description for a term that extends to 3 years and
shall even be at risk of fine which can touch one 100000 rupees.</p>
<p></p>
<p></p>
<h3> d) Section 66E</h3>
<p></p>
<p></p>
<p>        Privacy violation-Publishing or transmittal non-public space of somebody while
not his or her consent etc. penalisation is 3 years imprisonment or 2 hundred thousand rupees fine or
each.</p>
<p></p>
<p></p>
<h3>e) Section 66F</h3>
<p></p>
<p></p>
<p>        Cyber terrorism – intent to threaten the unity, integrity, security or
sovereignty of the state and denying access to anyone licensed to get access to personal resource or
trying to penetrate or access a computer resource while not authorization.</p>
<p></p>
<p></p>
<h3> f) Section 72</h3>
<p></p>
<p></p>
<p>        Punishment for breaching one’s space and confidentiality.</p>
<p></p>
<p></p>
<h3> g) Section 72A</h3>
<p></p>
<p></p>
<p>        Punishment for revealing data throughout lawful contract.</p>
<p></p>
<p></p>
<h3> h) Section 441 IPC</h3>
<p></p>
<p></p>
<p>        This section deals with criminal misdemeanour.</p>
<p></p>
<p></p>
<h3> i) Section 354D</h3>
<p></p>
<p></p>
<p>        This section deals with stalking. It defines stalker as a person who follows
women and tries to contact such woman, monitors each activity undertaken by the girl whereas
mistreatment digital media.</p>
<p></p>
<p></p>
<h2>Major Cyber Crime Areas</h2>
<p></p>
<p></p>
<p>                     ▪ Don’t share passwords</p>
<p3>                     ▪ Don’t leave your webcam
connected</p>
<p>                     ▪ Don’t share more than
necessary</p>
<p>                     ▪ Don’t meet on-line
acquaintances alone</p>
<p>                     ▪ Update all operating systems
on your devices</p>
<p>                     ▪ Secure your devices with
anti-virus software</p>
<p>                     ▪ Perused the fine print</p>
<p>                     ▪ There's no such thing as
‘freebies’</p>
<p3>                     ▪ Block individuals you don’t
need to interact with</p>
<p></p>
<p></p>
<h2>Reporting a cyber crime</h2>
<p></p>
<p></p>
<p>        The strategy for news cyber violations is extra or less a proportionate
as for news the other very offense. The nearby police stations can be approached for recording
complaints fair as the cyber crime cells specially assigned with the jurisdiction to enlist
complaint. In addition, provisions have now been made for filing of 'E-FIR' in most of the
states. Women security is a must and the police in our nation must be well prepared to resolve
complaints of cyber crime made by women and cognizance of the same must be taken very seriously.
</p>
<p></p>
<p></p>
<p>        Each police station must have expert-trained police officer who can
quickly bargain with cyber crime complaints made. In case a police station denies enlist the
complaint, a representation may be given to the commissioner of police/superintendent of police.
If in spite of that action isn't taken, the following step seem either be a private complaint
before the concerned court or a summons before the high court. “If There's Cyber Crime, Women
Begin Reporting Right Now” </p>
<p></p>
<p></p>
<div class="img1" style="height:20px;"></div>
<p align="center">Fig 1. Reasons for Cyber Attacks</p>
<p></p>
<p></p>
<h2>Targets for cyber attackers</h2>
<p></p>
<p></p>
<p>        There are different frameworks and innovations that are being focused on
by attackers, using multiple attack measures. There is steady development towards targeted
attacks, which is expanding the like hood of attacks to take place.</p>
<p></p>
<p></p>
<table align="center">
<thead>
<tr>
<th>Targeted Attacks</th>
<th>Percentage(%)</th>
</tr>
</thead>
<tbody>
<tr>
<td>Identity impersonation</td>
<td>22%</td>
</tr>
<tr>
<td>Phishing attacks</td>
<td>61%</td>
</tr>
<tr>
<td>E-mail based attack</td>
<td>75%</td>
</tr>
<tr>
<td>Malware/Ransom ware</td>
<td>69%</td>
</tr>
<tr>
<td>Web-Based applications</td>
<td>33%</td>
</tr>
<tr>
<td>Vulnerabilities associated with system</td>
<td>22%</td>
</tr>
<tr>
<td>Physical theft of computing devices</td>
<td>22%</td>
</tr>
</tbody>
</table>
<p></p>
<p align="center">Table 1 . Targets for Cyber Attackers </p>
<p></p>
<p></p>
<p></p>
<p></p>
<h2> Measures needed to Reduce Cyber Crimes </h2>
<p></p>
<p></p>
<p>                     ▪ Drafting of National Cyber Security Policy of India as soon as possible.</p>
<p>                     ▪ Dedicated cyber security laws in India keeping in mind contemporary cyber security threat.</p>
<p>                     ▪ Cyber security awareness must be improved in order to involve all the stakeholders for the implementation of cyber security initiatives of GOI.</p>
<p>                     ▪ Greater emphasis on R&D of indigenous security technology.</p>
<p>                     ▪ PPP VIA a VIS technical and operational co-operation aimed at encouraging organisation to adopt individually tailored IT regulations </p>
<p>                     ▪ Creation of new agency such as National Critical Information Infrastructure Protection Centre to charge with protecting assets in sensitive areas</p>
<p></p>
<p></p>
<h2> Most affected </h2>
<p></p>
<p></p>
<p>        A major consequence of online abuse is the silencing effect it has on
women, sometimes forcing them to shut themselves out of online spaces. A survey by Feminism in
India, a digital platform, found that 28% of women who experienced online abuse said they
intentionally reduced their online presence. Amnesty International conducted a study on online
violence against women in 2017 which showed that more than 75% of women surveyed across eight
countries (Denmark, Italy, New Zealand, Poland, Spain, Sweden, the UK and USA) who had
experienced abuse or harassment made changes to the way they used social media platforms. A
third of women said they even stopped posting their opinion on certain issues altogethe </p>
<p></p>
<p></p>
<p>        Women often find it difficult to report online abuse to the police for
several reasons, ranging from not knowing the law to not trusting the criminal justice system.
Of the women surveyed by Feminism in India who reported harassment to the authorities, only one
in ten said they had received a helpful response. The National Crime Records Bureau says that
around 12,000 incidents of cyber-crimes were reported in 2016, and nearly the same number that
were reported the previous year were still pending investigation.</p>
<p></p>
<p></p>
<p>        Social media platforms, which are uniquely positioned to take quick and
effective action against abusers, are also known to fail to act. Amnesty’s survey indicated that
women feel social media companies need to do more. Just 18% of women polled across all countries
said that the responses of social media companies were very, fairly or completely adequate. In
India, there have been a number of reports in the media about women who reported online abuse to
social media platforms, but received highly unsatisfactory responses</p>
<p></p>
<p></p>
<div class="img2" style="height:20px;"></div>
<p align="center">Fig 2.Top Five Attacks Faced</p>
<h1> Cybercrime Tools</h1>
<p></p>
<p></p>
<h2> Analysis Tools</h2>
<p></p>
<p></p>
<p>        These tools are utilized to measure hazard. They measure what an incident
did and how it was done and what the results were. Cases of investigation tools include the
Coroners Toolkit that runs beneath NIX and Encase that runs beneath windows.</p>
<p></p>
<p></p>
<p>        These include a specialized awareness through information of specialized
suggestions of activities, an understanding of how data can be modified, cleverness,
open-mindedness, deviousness, a tall standard of morals, proceeding instruction and the utilize
of excess information sources. In case one doesn’t altogether get it or meet the over
necessities, the framework can be left distant more regrettable than when at first compromised
from a legal angle. It is like a activity cop investigating a murder scene. I would deliver a
case of one of the told” EcCase”. It gives a recognizable Windows Explorer fashion view. The
view shows records without changing them in any way, counting free space that contains erased
records. The see sheet is additionally exceptionally supportive when sorting through many
records. It contains a solid Report see which offer assistance agents construct a case as they
continue. It too permits point and tap record hashing; a priceless apparatus to verify records
afterward.</p>
<p></p>
<p></p>
<p>        The reason of the ultimate organ of the cyber crimes division is to
police the web to guarantee that certain cyber crimes can be stopped some time recently their
commission. For this reason, the Network Monitoring Centre has been provided with a Network
Monitoring Tool, created by I.I.T. Kanpur. It is additionally utilized to permit comparative
devices to attain such a purpose.</p>
<p></p>
<p></p>
<h2> Machine Learning & Deep Learning based Tools</h2>
<p></p>
<p></p>
<h3>A) SIEM tool</h3>
<p></p>
<p></p>
<p>        Machine Learning & Deep Learning based SIEM tool for numerous
professionals, SOC still implies SIEM tool and security observing and to a few degrees that's
redress as the SIEM tool acts as a core engine of the SOC, which collects the logs from the
integrated log sources, forms those logs as per the predefined rule and give the alerts</p>
<p></p>
<p></p>
<p>        Since the beginning of the SIEM tool security engineers/analysts are
putting in parts of distinctive rules to screen and relate the log information pumped into the
SIEM instrument. These rules are included one by one as per the environment necessities</p>
<p></p>
<p></p>
<p>        Since of the amount of log data that must be prepared by the SIEM
apparatus, it is impossible to generate the rule that can distinguish the anomalies. The next
generation SIEM tools will be utilizing machine learning which is basically marrying the rules
or algorithms with the measurements that can be utilized for making knowledge-based, intelligent
investigation that will deliver prescient noteworthy results </p>
<p></p>
<p></p>
<h3>B) Wearing the Hackers Hat — AI primarily based Sandbox</h3>
<p>        Hackers are constantly ahead of security defence bunches, utilize the
innovation to perform investigation of focused on client’s environment to spot the
vulnerabilities to anticipate exploitability. This same technique security analyst will use by
utilizing AI and ML-based sandboxing tool, which will be a proactive approach and a defensive
one too. this could offer knowledge-based inputs to the analyst to counter the probable security
attacks and shield the system from potential security risks.</p>
<p></p>
<p></p>
<p>        A Security Operations Centre (SOC) is characterised each as a group,
typically operating in shifts round the clock, and a facility dedicated to and arranged to stop,
detect, judge and respond to cyber security threats and incidents, and to fulfil and survey
administrative compliance.</p>
<p></p>
<p></p>
<p>        All these progressions within the innovation zone don't dispose of the
require for making the natural educated decisions by the human brain. We still need to have
security investigator to see into the occurrences and finalize the activity plan. The life of
these analysts will be made simple by liberating them from the tedious unremarkable tasks and
they can utilize their time and intelligence in characterizing and executing the occurrence
reaction arrange to decrease the impact.</p>
<p></p>
<p></p>
<h3>C) AI and machine learning can boost cyber defences </h3>
<p></p>
<p></p>
<p>        As artificial intelligence and machine learning gathers pace, and begins
to affect increasingly businesses, it’s beyond any doubt to play a greater part in cyber
security. Since the fight with cyber criminals moves so rapidly, machine learning models that
can anticipate and accurately identify attacks quickly may well be a genuine boon for InfoSec
experts. These models got to be prepared and sharpened. In any case, there's moreover a risk
that AI and machine learning may be misused by attackers </p>
<p></p>
<p></p>
<p>        According to a survey every month 7000 cyber crimes are happened, but in
national crime record bureau less than 1000 crimes have been reported. So, there is huge
mismatch between actual crime happen and crimes reported. Cybercrime reporting in India is still
in its nascent stage though cyber violence is fast growing. Our laws need to be changed to make
them cyber-sensitive as well as gender-sensitive. Words like lascivious and prurient should be
dropped from the concerned Act to make them better secure women’s equality and dignity. The
perspective of the laws should be to ensure dignity of women and not being in a paternalistic
role. Cybercrimes against women needs a holistic approach with change in laws, change in
approach of officials and more intense sensitization campaigns involving different sections of
society. Indian women netizens are still not open to quickly report the cyber mishandle or
cyber-crime. This nature gives the guilty parties the chance to elude after the commission of
cyber-crime. The issue would be unravelled only when the victimized woman at that point and
there report back or indeed caution the abuser around taking strong activities. </p>
</div>
</div>
<div class="footer">
<h2>Author: Krishnaranjani</h2>
<p class="icon">
🌐 <a class= "ftext nounderline" href="https://github.com/KrishnaRanjani"> Github</a> 🎯<a class= "ftext nounderline" href="https://www.linkedin.com/in/krishnaranjani/">LinkedIn</a> 📧<a class= "ftext nounderline" href="mailto:rkrishnaranjani12@gmail.com">Contact</a> 📚<a class= "ftext nounderline "href="#">Blog</a>
</p>
<br>
<div class= "ftext" >© 2021 Copyright</div>
</div>
</body>
</html>