SlideShare uma empresa Scribd logo
1 de 14
SO Standards
And
various
dian Cyber Laws
By : Suraj Kumar
Class :MCA-II
Roll no. :2111935
Sub.: ISCL
 ISO stands for International Organization for Standardization
 International Standards make things to work.
 These standards provide a world-class specification for:.
- products
- services and computers
- to ensure quality
- safety and efficiency
ABOUT ISO
 ISO standard is officially established On 23 February 1947
 It is an independent, non-governmental international organization.
 it has a membership of 162 national standards bodies.
 ISO has published over 22336 International Standards .
 its related documents which covers almost every industry, from
 information technology, to food safety, to agriculture and healthcare.
 information technology, to food safety, to agriculture and healthcare.
VARIOUS SERIES OF ISO
ISO 27000 Series
The need of ISO 27000 series arises because of the risk
of cyber-attacks which the organization face. The cyber-attacks
are growing day by day making hackers a constant threat to any
industry that uses technology.
ISO 27001-This standard allows us to prove the clients and stakeholders of any
organization to managing the best security of their confidential data and informatio
ISO 27002- This standard provides guidelines for organizational information
security standards and information security management practices
ISO 27005- This standard supports the general concepts specified in 27001.
It is designed to provide the guidelines for implementation of information
security based on a risk management
CYBER LAW
 CYBER LAW IS THE LAW GOVERNING CYBER SPACE.
 CYBER SPACE IS VERY WIDE TERM AND INCLUDES COMPUTERS, NETWO
SOFTWARE, DATA STORAGE DEVICES(SUCH AS HARD DISKS, USB DISKS
THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH
PHONE , ATM MACHINES ETC.
CYBER LAWININDIA
 CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 200
 SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH TO ALL LEGAL AN
REDULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB
 THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FO
AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENG THEN T
INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRO
COMMERCE.
CYBER CRIME CAN BE BASICALLY
DIVIDED INTO THREE MAJOR CATEGORIES
 CYBER CRIME AGAINST PERSION
 CYBER CRIME AGAINST PROPERTY
 CYBER CRIME AGAINST GOVERNMENT
CYBER CRIME AGAINST PERSION
 CYBER CRIME AGAINST PERSION INCLUDES VARIOUS CRIME LIKE TRANSMISSION
OF CHILD, PORNOGRAPHY, HARASSMENT OR ANY ONE WITH THE USE OF
COMPUTER SUCH AS E-MAIL.
 E-mail Spamming:Email spam, also known as junk email or
unsolicited bulk email (UBE). Spam is flooding the Internet with
many copies of the same message, in an attempt to force the
message on people who would not otherwise choose to receive
it. In addition to wasting people's time with unwanted e-mail,
spam also eats up a lot of network bandwidth.
 E-mail Bombing :E-mail bombing occurs through sending threatening E-mails:
For example: Mr. X received an e-mail message from someone who called him “your friend”.
The attachment with the e-mail contained morphed pornographic photographs of Mr. X.
The mail message said that if Mr. X were not to pay Rs. 20,000 at a specified place every
month, the photographs would be uploaded to the Internet and then a copy sent to his family
CYBER CRIME AGAINST PROPERTY
THESE CRIMES INCLUDES:
 COMPUTER VANDALISM (DESTRUCTION OF OTHER’S PROPERTY
 TRANSMISSION OF HARMFUL PROGRAMMES
 SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION
 STEALING SECRET INFORMATION AND DATA
CYBER CRIME AGAINST GOVERNMENT
 CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY
 THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUP TO
THE INTERNATIONAL GOVERNMENTS AS ALSO TOO TERRORIZ THE CIT
A COUNTRY.
 THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL
INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
I.T. ACT 2000
 INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGAT
INTO 13 CHAPTERS.
 FOUR SCHEDULE FROM PART OF THE ACT.
 CAME INTO EXISTENCE ON OCTOBER 17, 2000.
 INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.
 THE PRIME SOURCE OF CYBER LAWIN INDIA IS THE INFORMATION
TECHNOLOGY ACT 2000
 THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO
ELECTRONIC COMMERCE RECORDS WITH THE GOVERNMENT.
 THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES
TO DEAL WITH CYBER CRIME . SUCH AN ACT IS REQUIRED AS PEOPLE CA
PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS WITH
OF GETTING MISUSED.
IT AMENDMENT ACT 2008
 INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATI
TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITI
FOCUS ON INFORMATIONSECURITY, IT HAS ADDED SEVERAL NEW SECTIO
ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION.
 THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMB
AND CAME INTO FORCE FROM OCTOBER 27,2009 ONWARDS.
NEED & IMPORTANCE OF CYBER LAW
 TACKLING CYBER CRIME
 SUCCESSFUL AND SMOOTH FUNCTIONING OF E-COMMERCE AND VIRTUA
COMMUNICATION.
 NO JURISDICTIONAL BOUNDARIES
 INCREASING USE OF MOBILE BANKING AND INTERNET BANKING.
 CLOUD COMPUTING IS PROVING TO BE A MAJOR THREAT.
 ECONOMIC EFFECIENCY
THANK YOU !

Mais conteúdo relacionado

Semelhante a ISO Standards And various Indian Cyber Laws

Semelhante a ISO Standards And various Indian Cyber Laws (20)

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 

Último

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

ISO Standards And various Indian Cyber Laws

  • 1. SO Standards And various dian Cyber Laws By : Suraj Kumar Class :MCA-II Roll no. :2111935 Sub.: ISCL
  • 2.  ISO stands for International Organization for Standardization  International Standards make things to work.  These standards provide a world-class specification for:. - products - services and computers - to ensure quality - safety and efficiency
  • 3. ABOUT ISO  ISO standard is officially established On 23 February 1947  It is an independent, non-governmental international organization.  it has a membership of 162 national standards bodies.  ISO has published over 22336 International Standards .  its related documents which covers almost every industry, from  information technology, to food safety, to agriculture and healthcare.  information technology, to food safety, to agriculture and healthcare.
  • 4. VARIOUS SERIES OF ISO ISO 27000 Series The need of ISO 27000 series arises because of the risk of cyber-attacks which the organization face. The cyber-attacks are growing day by day making hackers a constant threat to any industry that uses technology. ISO 27001-This standard allows us to prove the clients and stakeholders of any organization to managing the best security of their confidential data and informatio ISO 27002- This standard provides guidelines for organizational information security standards and information security management practices ISO 27005- This standard supports the general concepts specified in 27001. It is designed to provide the guidelines for implementation of information security based on a risk management
  • 5. CYBER LAW  CYBER LAW IS THE LAW GOVERNING CYBER SPACE.  CYBER SPACE IS VERY WIDE TERM AND INCLUDES COMPUTERS, NETWO SOFTWARE, DATA STORAGE DEVICES(SUCH AS HARD DISKS, USB DISKS THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH PHONE , ATM MACHINES ETC.
  • 6. CYBER LAWININDIA  CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 200  SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH TO ALL LEGAL AN REDULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB  THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FO AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENG THEN T INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRO COMMERCE.
  • 7. CYBER CRIME CAN BE BASICALLY DIVIDED INTO THREE MAJOR CATEGORIES  CYBER CRIME AGAINST PERSION  CYBER CRIME AGAINST PROPERTY  CYBER CRIME AGAINST GOVERNMENT
  • 8. CYBER CRIME AGAINST PERSION  CYBER CRIME AGAINST PERSION INCLUDES VARIOUS CRIME LIKE TRANSMISSION OF CHILD, PORNOGRAPHY, HARASSMENT OR ANY ONE WITH THE USE OF COMPUTER SUCH AS E-MAIL.  E-mail Spamming:Email spam, also known as junk email or unsolicited bulk email (UBE). Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.  E-mail Bombing :E-mail bombing occurs through sending threatening E-mails: For example: Mr. X received an e-mail message from someone who called him “your friend”. The attachment with the e-mail contained morphed pornographic photographs of Mr. X. The mail message said that if Mr. X were not to pay Rs. 20,000 at a specified place every month, the photographs would be uploaded to the Internet and then a copy sent to his family
  • 9. CYBER CRIME AGAINST PROPERTY THESE CRIMES INCLUDES:  COMPUTER VANDALISM (DESTRUCTION OF OTHER’S PROPERTY  TRANSMISSION OF HARMFUL PROGRAMMES  SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION  STEALING SECRET INFORMATION AND DATA
  • 10. CYBER CRIME AGAINST GOVERNMENT  CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY  THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUP TO THE INTERNATIONAL GOVERNMENTS AS ALSO TOO TERRORIZ THE CIT A COUNTRY.  THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
  • 11. I.T. ACT 2000  INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGAT INTO 13 CHAPTERS.  FOUR SCHEDULE FROM PART OF THE ACT.  CAME INTO EXISTENCE ON OCTOBER 17, 2000.  INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.  THE PRIME SOURCE OF CYBER LAWIN INDIA IS THE INFORMATION TECHNOLOGY ACT 2000  THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO ELECTRONIC COMMERCE RECORDS WITH THE GOVERNMENT.  THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES TO DEAL WITH CYBER CRIME . SUCH AN ACT IS REQUIRED AS PEOPLE CA PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS WITH OF GETTING MISUSED.
  • 12. IT AMENDMENT ACT 2008  INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATI TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITI FOCUS ON INFORMATIONSECURITY, IT HAS ADDED SEVERAL NEW SECTIO ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION.  THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMB AND CAME INTO FORCE FROM OCTOBER 27,2009 ONWARDS.
  • 13. NEED & IMPORTANCE OF CYBER LAW  TACKLING CYBER CRIME  SUCCESSFUL AND SMOOTH FUNCTIONING OF E-COMMERCE AND VIRTUA COMMUNICATION.  NO JURISDICTIONAL BOUNDARIES  INCREASING USE OF MOBILE BANKING AND INTERNET BANKING.  CLOUD COMPUTING IS PROVING TO BE A MAJOR THREAT.  ECONOMIC EFFECIENCY