2. ISO stands for International Organization for Standardization
International Standards make things to work.
These standards provide a world-class specification for:.
- products
- services and computers
- to ensure quality
- safety and efficiency
3. ABOUT ISO
ISO standard is officially established On 23 February 1947
It is an independent, non-governmental international organization.
it has a membership of 162 national standards bodies.
ISO has published over 22336 International Standards .
its related documents which covers almost every industry, from
information technology, to food safety, to agriculture and healthcare.
information technology, to food safety, to agriculture and healthcare.
4. VARIOUS SERIES OF ISO
ISO 27000 Series
The need of ISO 27000 series arises because of the risk
of cyber-attacks which the organization face. The cyber-attacks
are growing day by day making hackers a constant threat to any
industry that uses technology.
ISO 27001-This standard allows us to prove the clients and stakeholders of any
organization to managing the best security of their confidential data and informatio
ISO 27002- This standard provides guidelines for organizational information
security standards and information security management practices
ISO 27005- This standard supports the general concepts specified in 27001.
It is designed to provide the guidelines for implementation of information
security based on a risk management
5. CYBER LAW
CYBER LAW IS THE LAW GOVERNING CYBER SPACE.
CYBER SPACE IS VERY WIDE TERM AND INCLUDES COMPUTERS, NETWO
SOFTWARE, DATA STORAGE DEVICES(SUCH AS HARD DISKS, USB DISKS
THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH
PHONE , ATM MACHINES ETC.
6. CYBER LAWININDIA
CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 200
SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH TO ALL LEGAL AN
REDULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB
THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FO
AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENG THEN T
INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRO
COMMERCE.
7. CYBER CRIME CAN BE BASICALLY
DIVIDED INTO THREE MAJOR CATEGORIES
CYBER CRIME AGAINST PERSION
CYBER CRIME AGAINST PROPERTY
CYBER CRIME AGAINST GOVERNMENT
8. CYBER CRIME AGAINST PERSION
CYBER CRIME AGAINST PERSION INCLUDES VARIOUS CRIME LIKE TRANSMISSION
OF CHILD, PORNOGRAPHY, HARASSMENT OR ANY ONE WITH THE USE OF
COMPUTER SUCH AS E-MAIL.
E-mail Spamming:Email spam, also known as junk email or
unsolicited bulk email (UBE). Spam is flooding the Internet with
many copies of the same message, in an attempt to force the
message on people who would not otherwise choose to receive
it. In addition to wasting people's time with unwanted e-mail,
spam also eats up a lot of network bandwidth.
E-mail Bombing :E-mail bombing occurs through sending threatening E-mails:
For example: Mr. X received an e-mail message from someone who called him “your friend”.
The attachment with the e-mail contained morphed pornographic photographs of Mr. X.
The mail message said that if Mr. X were not to pay Rs. 20,000 at a specified place every
month, the photographs would be uploaded to the Internet and then a copy sent to his family
9. CYBER CRIME AGAINST PROPERTY
THESE CRIMES INCLUDES:
COMPUTER VANDALISM (DESTRUCTION OF OTHER’S PROPERTY
TRANSMISSION OF HARMFUL PROGRAMMES
SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION
STEALING SECRET INFORMATION AND DATA
10. CYBER CRIME AGAINST GOVERNMENT
CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY
THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUP TO
THE INTERNATIONAL GOVERNMENTS AS ALSO TOO TERRORIZ THE CIT
A COUNTRY.
THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL
INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
11. I.T. ACT 2000
INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGAT
INTO 13 CHAPTERS.
FOUR SCHEDULE FROM PART OF THE ACT.
CAME INTO EXISTENCE ON OCTOBER 17, 2000.
INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.
THE PRIME SOURCE OF CYBER LAWIN INDIA IS THE INFORMATION
TECHNOLOGY ACT 2000
THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO
ELECTRONIC COMMERCE RECORDS WITH THE GOVERNMENT.
THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES
TO DEAL WITH CYBER CRIME . SUCH AN ACT IS REQUIRED AS PEOPLE CA
PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS WITH
OF GETTING MISUSED.
12. IT AMENDMENT ACT 2008
INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATI
TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITI
FOCUS ON INFORMATIONSECURITY, IT HAS ADDED SEVERAL NEW SECTIO
ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION.
THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMB
AND CAME INTO FORCE FROM OCTOBER 27,2009 ONWARDS.
13. NEED & IMPORTANCE OF CYBER LAW
TACKLING CYBER CRIME
SUCCESSFUL AND SMOOTH FUNCTIONING OF E-COMMERCE AND VIRTUA
COMMUNICATION.
NO JURISDICTIONAL BOUNDARIES
INCREASING USE OF MOBILE BANKING AND INTERNET BANKING.
CLOUD COMPUTING IS PROVING TO BE A MAJOR THREAT.
ECONOMIC EFFECIENCY