×
WORK HARD IN SILENCE; LET SUCCESS MAKE THE NOISE
--Your friends at LectureNotes
Close

Information Security and Cyber Law

by Abhishek Apoorv
Type: NoteOffline Downloads: 39Views: 3191Uploaded: 8 months agoAdd to Favourite

Touch here to read
Page-1

Information Security and Cyber Law by Abhishek Apoorv

Topic:
Abhishek Apoorv
Abhishek Apoorv

/ 47

Share it with your friends

Suggested Materials

Leave your Comments

Contributors

Abhishek Apoorv
Abhishek Apoorv
Information Security and Cyber Law About the Tutorial The Internet has now become all-encompassing; it touches the lives of every human being. We cannot undermine the benefits of Internet, however its anonymous nature allows miscreants to indulge in various cybercrimes. This is a brief tutorial that explains the cyber laws that are in place to keep cybercrimes in check. In addition to cyber laws, it elaborates various IT Security measures that can be used to protect sensitive data against potential cyber threats. Audience Anyone using a computer system and Internet to communicate with the world can use this tutorial to gain knowledge on cyber laws and IT security. Prerequisites You should have a basic knowledge of Internet and its adverse effects. Copyright and Disclaimer  Copyright 2015 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at contact@tutorialspoint.com i
Information Security and Cyber Law Table of Contents About the Tutorial ..................................................................................................................................... i Audience .................................................................................................................................................... i Prerequisites .............................................................................................................................................. i Copyright and Disclaimer ........................................................................................................................... i Table of Contents ...................................................................................................................................... ii 1. INTRODUCTION..................................................................................................................... 1 Cyberspace ............................................................................................................................................... 1 Cybersecurity ............................................................................................................................................ 1 Cybersecurity Policy .................................................................................................................................. 1 Cyber Crime .............................................................................................................................................. 2 Nature of Threat ....................................................................................................................................... 2 Enabling People ........................................................................................................................................ 3 Information Technology Act ...................................................................................................................... 4 Mission and Vision of Cybersecurity Program ........................................................................................... 4 2. OBJECTIVES ........................................................................................................................... 5 Emerging Trends of Cyber Law .................................................................................................................. 5 Create Awareness ..................................................................................................................................... 5 Areas of Development .............................................................................................................................. 6 International Network on Cybersecurity ................................................................................................... 6 3. INTELLECTUAL PROPERTY RIGHTS ......................................................................................... 8 Types of Intellectual Property Rights ........................................................................................................ 8 Advantages of Intellectual Property Rights ............................................................................................... 9 Intellectual Property Rights in India .......................................................................................................... 9 Intellectual Property in Cyber Space ....................................................................................................... 10 ii
Information Security and Cyber Law 4. STRATEGIES FOR CYBER SECURITY ...................................................................................... 11 Strategy 1: Creating a Secure Cyber Ecosystem ....................................................................................... 11 Comparision of Attacks ........................................................................................................................... 12 Case Study .............................................................................................................................................. 13 Types of Attacks ...................................................................................................................................... 14 Strategy 2: Creating an Assurance Framework ........................................................................................ 15 Strategy 3: Encouraging Open Standards ................................................................................................ 16 Strategy 4: Strengthening the Regulatory Framework ............................................................................ 16 Strategy 5: Creating Mechanisms for IT Security ..................................................................................... 17 Strategy 6: Securing E-Governance Services ............................................................................................ 17 Strategy 7: Protecting Critical Information Infrastructure ....................................................................... 18 5. POLICIES TO MITIGATE CYBER RISK ..................................................................................... 19 Promotion of R&D in Cybersecurity ........................................................................................................ 19 Reducing Supply Chain Risks ................................................................................................................... 20 Mitigate Risks through Human Resource Development .......................................................................... 21 Creating Cybersecurity Awareness .......................................................................................................... 21 Information sharing ................................................................................................................................ 22 Implementing a Cybersecurity Framework ............................................................................................. 22 6. NETWORK SECURITY ........................................................................................................... 25 Types of Network Security Devices ......................................................................................................... 25 Firewalls ................................................................................................................................................. 25 Antivirus ................................................................................................................................................. 26 Content Filtering ..................................................................................................................................... 26 Intrusion Detection Systems ................................................................................................................... 27 7. I.T. ACT................................................................................................................................ 28 Salient Features of I.T. Act ...................................................................................................................... 28 iii

Lecture Notes