Beruflich Dokumente
Kultur Dokumente
Security.
Submitted By:- Arjun Sabu
Class:- X - B
Roll No. 25
Introduction
In the era of cyber world as the usage of computers became
more popular, there was expansion in the growth of
technology as well, and the term ‘Cyber’ became more
familiar to the people. The evolution of Information
Technology (IT) gave birth to the cyber space wherein
internet provides equal opportunities to all the people to
access any information, data storage, analyse etc. with the
use of high technology. Due to increase in the number of
netizens, misuse of technology in the cyberspace was
clutching up which gave birth to cyber crimes at the
domestic and international level as well.
What is Cyber Crime?
Cyber Crime can be defined as the criminal activities carried out by means of computers
or the Internet. It involves unlawful acts wherein the computer is either a tool or target or
both. Computer crime encompasses a broad range of activities:-
1) Cyber Crimes
2) Electronic or Digital Signatures
3) Intellectual Property
4) Data Protection and Privacy
Cyber Laws of India
1) IT Act-2000
1) The Information Technology Act, 2000 (IT Act), came into force on
17 October 2000.
2) The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records
with the Government.
3) Information Technology Act 2000 consisted of 94 sections
segregated into 13 chapters.
IT Act-2000:- Objectives
1) To provide legal recognition for transactions.
2) To facilitate electronic filing of documents with the
Government agencies.
3) To amend the Indian Penal Code, The Indian Evidence
Act, 1872, The Banker's Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934.
4) Aims to provide the legal framework to all electronic
records.
IT Act-2000
Important Cyber Law Provisions in
India.
Offence Section under IT
Act
1) Tampering with Computer source documents Sec.43
(without the permission of
in charge).
2) To create an assurance framework for design of security policies and for promotion and
enabling actions for compliance to global security standards and best practices by way of
conformity assessment (product, process, technology & people).
4) To enhance and create National and Sectoral level 24 x 7 mechanisms for obtaining
strategic information regarding threats to ICT infrastructure, creating scenarios for response,
resolution and crisis management through effective predictive, preventive, protective,
response and recovery actions.
5) To enhance the protection and resilience of Nation’s critical information infrastructure by operating a 24x7
National Critical Information Infrastructure Protection Centre (NCIIPC) and mandating security practices
related to the design, acquisition, development, use and operation of information resources.
6) To develop suitable indigenous security technologies through frontier technology research, solution oriented
research, proof of concept, pilot development, transition, diffusion and commercialisation leading to
widespread deployment of secure ICT products / processes in general and specifically for addressing National
Security requirements.
7) To improve visibility of the integrity of ICT products and services by establishing infrastructure for testing &
validation of security of such products.
8) To create a workforce of 500,000 professionals skilled in cyber security in the next 5 years through capacity
building, skill development and training.
9) To provide fiscal benefits to businesses for adoption of standard security practices and processes.
10) To enable protection of information while in process, handling, storage & transit so as to safeguard privacy
of citizens data and for reducing economic losses due to cyber crime or data theft.
11) To enable effective prevention, investigation and prosecution of cybercrime
and enhancement of law enforcement capabilities through appropriate legislative
intervention.
12) To create a culture of cyber security and privacy enabling responsible user
behaviour & actions through an effective communication and promotion strategy.
➔ Read Privacy policy carefully when you submit the data through internet.
➔ Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.
➔ Disable remote connectivity.
➔ Use antivirus software
➔ Insert firewalls , pop up blocker
➔ Uninstall unnecessary software
➔ Maintain backup
➔ Check security settings
➔ Use secure connection
➔ Open attachments carefully
➔ Use strong passwords , don’t give personal information unless required.
Some Antivirus Softwares.
Conclusion