Information Security and Cyber Law
About the Tutorial
The Internet has now become all-encompassing; it touches the lives of every human
being. We cannot undermine the benefits of Internet, however its anonymous nature
allows miscreants to indulge in various cybercrimes.
This is a brief tutorial that explains the cyber laws that are in place to keep cybercrimes
in check. In addition to cyber laws, it elaborates various IT Security measures that can
be used to protect sensitive data against potential cyber threats.
Anyone using a computer system and Internet to communicate with the world can use
this tutorial to gain knowledge on cyber laws and IT security.
You should have a basic knowledge of Internet and its adverse effects.
Copyright and Disclaimer
Copyright 2015 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point
(I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or
republish any contents or a part of contents of this e-book in any manner without written
consent of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely
as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I)
Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of
our website or its contents including this tutorial. If you discover any errors on our
website or in this tutorial, please notify us at firstname.lastname@example.org