An Analysis of the Increasing Cases of Data Breaches in India

Smrithi Sukesh*, Doreen Hephzibah Miriam D.**, C. R. Rene Robin***
* Department of Accounting and Finance, Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, India.
** Computational Intelligence Research Foundation (CIRF), Chennai, India.
*** Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India.
Periodicity:January - March'2023
DOI : https://doi.org/10.26634/jse.17.3.19791

Abstract

The number of data breaches in India has increased significantly in recent years. This is due to a number of factors, including the growing use of digital technologies, the lack of adequate data security measures, and the increasing sophistication of cybercriminals. The impact of data breaches can be far-reaching. Individuals may suffer financial losses, identity theft, and other forms of harm. Businesses may lose customers, suffer reputational damage, and incur significant costs to remediate the breach. The Indian government has taken some steps to address the problem of data breaches. However, more actions should be taken to strengthen data security measures and to educate businesses and individuals about the risks of data breaches. This research examines the rise of data breaches in India and uses the Air India case study to demonstrate the possible attacks in an airline company's infrastructure and how easily the customers' personal information can be stolen.

Keywords

Data Breach, Cybercrime, India, Air India, Personal Information, Information Security.

How to Cite this Article?

Sukesh, S., Miriam, D. D. H., and Robin, C. R. R. (2023). An Analysis of the Increasing Cases of Data Breaches in India. i-manager’s Journal on Software Engineering, 17(3), 38-43. https://doi.org/10.26634/jse.17.3.19791

References

[1]. Almulihi, A. H., Alassery, F., Khan, A. I., Shukla, S., Gupta, B. K., & Kumar, R. (2022). Analyzing the implications of healthcare data breaches through computational technique. Intelligent Automation & Soft Computing, 32(3), 1763-1779.
[2]. Bali, V. (2007). Data privacy, data piracy: Can India provide adequate protection for electronically transferred data. Temple International and Comparative Law Journal, 21, 103.
[5]. Collins, J. D., Sainato, V. A., & Khey, D. N. (2011). Organizational data breaches 2005-2010: Applying SCP to the healthcare and education sectors. International Journal of Cyber Criminology, 5(1), 794-810.
[7]. Fathima, A., & Ahmed, B. (2013). Making data breach prevention a matter of policy in corporate governance. International Journal of Scientific Engineering and Technology, 2(1), 1-7.
[10]. Guha, A., & Indurkar, S. K. (2020). A study on cyber crime and data breach management. Research Journal of Engineering and Technology, 11(2), 113-117.
[11]. Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., & Liu, M. (2015). Cloudy with a chance of breach: Forecasting cyber security incidents. In 24th {USENIX}Security Symposium ({USENIX}Security 15) (pp. 1009-1024).
[12]. Miriam, H., Doreen, D., Dahiya, D., & Rene Robin, C. R. (2023). Secured cyber security algorithm for healthcare system using blockchain technology. Intelligent Automation & Soft Computing, 35(2), 1889-1906.
[13]. Patil, B. P., Kharade, K. G., & Kamat, R. K. (2020). Investigation on data security threats & solutions. International Journal of Innovative Science and Research Technology, 5(1), 79-83.
[15]. Wang, P., & Johnson, C. (2018). Cybersecurity incident handling: A case study of the Equifax data breach. Issues in Information Systems, 19(3), 150-159.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.