Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

ISO Standards And various Indian Cyber Laws

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
Cyber law
Cyber law
Cargando en…3
×

Eche un vistazo a continuación

1 de 14 Anuncio

Más Contenido Relacionado

Similares a ISO Standards And various Indian Cyber Laws (20)

Más reciente (20)

Anuncio

ISO Standards And various Indian Cyber Laws

  1. 1. SO Standards And various dian Cyber Laws By : Suraj Kumar Class :MCA-II Roll no. :2111935 Sub.: ISCL
  2. 2.  ISO stands for International Organization for Standardization  International Standards make things to work.  These standards provide a world-class specification for:. - products - services and computers - to ensure quality - safety and efficiency
  3. 3. ABOUT ISO  ISO standard is officially established On 23 February 1947  It is an independent, non-governmental international organization.  it has a membership of 162 national standards bodies.  ISO has published over 22336 International Standards .  its related documents which covers almost every industry, from  information technology, to food safety, to agriculture and healthcare.  information technology, to food safety, to agriculture and healthcare.
  4. 4. VARIOUS SERIES OF ISO ISO 27000 Series The need of ISO 27000 series arises because of the risk of cyber-attacks which the organization face. The cyber-attacks are growing day by day making hackers a constant threat to any industry that uses technology. ISO 27001-This standard allows us to prove the clients and stakeholders of any organization to managing the best security of their confidential data and informatio ISO 27002- This standard provides guidelines for organizational information security standards and information security management practices ISO 27005- This standard supports the general concepts specified in 27001. It is designed to provide the guidelines for implementation of information security based on a risk management
  5. 5. CYBER LAW  CYBER LAW IS THE LAW GOVERNING CYBER SPACE.  CYBER SPACE IS VERY WIDE TERM AND INCLUDES COMPUTERS, NETWO SOFTWARE, DATA STORAGE DEVICES(SUCH AS HARD DISKS, USB DISKS THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH PHONE , ATM MACHINES ETC.
  6. 6. CYBER LAWININDIA  CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 200  SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH TO ALL LEGAL AN REDULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB  THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FO AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENG THEN T INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRO COMMERCE.
  7. 7. CYBER CRIME CAN BE BASICALLY DIVIDED INTO THREE MAJOR CATEGORIES  CYBER CRIME AGAINST PERSION  CYBER CRIME AGAINST PROPERTY  CYBER CRIME AGAINST GOVERNMENT
  8. 8. CYBER CRIME AGAINST PERSION  CYBER CRIME AGAINST PERSION INCLUDES VARIOUS CRIME LIKE TRANSMISSION OF CHILD, PORNOGRAPHY, HARASSMENT OR ANY ONE WITH THE USE OF COMPUTER SUCH AS E-MAIL.  E-mail Spamming:Email spam, also known as junk email or unsolicited bulk email (UBE). Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.  E-mail Bombing :E-mail bombing occurs through sending threatening E-mails: For example: Mr. X received an e-mail message from someone who called him “your friend”. The attachment with the e-mail contained morphed pornographic photographs of Mr. X. The mail message said that if Mr. X were not to pay Rs. 20,000 at a specified place every month, the photographs would be uploaded to the Internet and then a copy sent to his family
  9. 9. CYBER CRIME AGAINST PROPERTY THESE CRIMES INCLUDES:  COMPUTER VANDALISM (DESTRUCTION OF OTHER’S PROPERTY  TRANSMISSION OF HARMFUL PROGRAMMES  SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION  STEALING SECRET INFORMATION AND DATA
  10. 10. CYBER CRIME AGAINST GOVERNMENT  CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY  THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUP TO THE INTERNATIONAL GOVERNMENTS AS ALSO TOO TERRORIZ THE CIT A COUNTRY.  THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
  11. 11. I.T. ACT 2000  INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGAT INTO 13 CHAPTERS.  FOUR SCHEDULE FROM PART OF THE ACT.  CAME INTO EXISTENCE ON OCTOBER 17, 2000.  INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.  THE PRIME SOURCE OF CYBER LAWIN INDIA IS THE INFORMATION TECHNOLOGY ACT 2000  THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO ELECTRONIC COMMERCE RECORDS WITH THE GOVERNMENT.  THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES TO DEAL WITH CYBER CRIME . SUCH AN ACT IS REQUIRED AS PEOPLE CA PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS WITH OF GETTING MISUSED.
  12. 12. IT AMENDMENT ACT 2008  INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATI TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITI FOCUS ON INFORMATIONSECURITY, IT HAS ADDED SEVERAL NEW SECTIO ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION.  THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMB AND CAME INTO FORCE FROM OCTOBER 27,2009 ONWARDS.
  13. 13. NEED & IMPORTANCE OF CYBER LAW  TACKLING CYBER CRIME  SUCCESSFUL AND SMOOTH FUNCTIONING OF E-COMMERCE AND VIRTUA COMMUNICATION.  NO JURISDICTIONAL BOUNDARIES  INCREASING USE OF MOBILE BANKING AND INTERNET BANKING.  CLOUD COMPUTING IS PROVING TO BE A MAJOR THREAT.  ECONOMIC EFFECIENCY
  14. 14. THANK YOU !

×