SlideShare a Scribd company logo
SO Standards
And
various
dian Cyber Laws
By : Suraj Kumar
Class :MCA-II
Roll no. :2111935
Sub.: ISCL
 ISO stands for International Organization for Standardization
 International Standards make things to work.
 These standards provide a world-class specification for:.
- products
- services and computers
- to ensure quality
- safety and efficiency
ABOUT ISO
 ISO standard is officially established On 23 February 1947
 It is an independent, non-governmental international organization.
 it has a membership of 162 national standards bodies.
 ISO has published over 22336 International Standards .
 its related documents which covers almost every industry, from
 information technology, to food safety, to agriculture and healthcare.
 information technology, to food safety, to agriculture and healthcare.
VARIOUS SERIES OF ISO
ISO 27000 Series
The need of ISO 27000 series arises because of the risk
of cyber-attacks which the organization face. The cyber-attacks
are growing day by day making hackers a constant threat to any
industry that uses technology.
ISO 27001-This standard allows us to prove the clients and stakeholders of any
organization to managing the best security of their confidential data and informatio
ISO 27002- This standard provides guidelines for organizational information
security standards and information security management practices
ISO 27005- This standard supports the general concepts specified in 27001.
It is designed to provide the guidelines for implementation of information
security based on a risk management
CYBER LAW
 CYBER LAW IS THE LAW GOVERNING CYBER SPACE.
 CYBER SPACE IS VERY WIDE TERM AND INCLUDES COMPUTERS, NETWO
SOFTWARE, DATA STORAGE DEVICES(SUCH AS HARD DISKS, USB DISKS
THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH
PHONE , ATM MACHINES ETC.
CYBER LAWININDIA
 CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 200
 SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH TO ALL LEGAL AN
REDULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB
 THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FO
AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENG THEN T
INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRO
COMMERCE.
CYBER CRIME CAN BE BASICALLY
DIVIDED INTO THREE MAJOR CATEGORIES
 CYBER CRIME AGAINST PERSION
 CYBER CRIME AGAINST PROPERTY
 CYBER CRIME AGAINST GOVERNMENT
CYBER CRIME AGAINST PERSION
 CYBER CRIME AGAINST PERSION INCLUDES VARIOUS CRIME LIKE TRANSMISSION
OF CHILD, PORNOGRAPHY, HARASSMENT OR ANY ONE WITH THE USE OF
COMPUTER SUCH AS E-MAIL.
 E-mail Spamming:Email spam, also known as junk email or
unsolicited bulk email (UBE). Spam is flooding the Internet with
many copies of the same message, in an attempt to force the
message on people who would not otherwise choose to receive
it. In addition to wasting people's time with unwanted e-mail,
spam also eats up a lot of network bandwidth.
 E-mail Bombing :E-mail bombing occurs through sending threatening E-mails:
For example: Mr. X received an e-mail message from someone who called him “your friend”.
The attachment with the e-mail contained morphed pornographic photographs of Mr. X.
The mail message said that if Mr. X were not to pay Rs. 20,000 at a specified place every
month, the photographs would be uploaded to the Internet and then a copy sent to his family
CYBER CRIME AGAINST PROPERTY
THESE CRIMES INCLUDES:
 COMPUTER VANDALISM (DESTRUCTION OF OTHER’S PROPERTY
 TRANSMISSION OF HARMFUL PROGRAMMES
 SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION
 STEALING SECRET INFORMATION AND DATA
CYBER CRIME AGAINST GOVERNMENT
 CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY
 THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUP TO
THE INTERNATIONAL GOVERNMENTS AS ALSO TOO TERRORIZ THE CIT
A COUNTRY.
 THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL
INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
I.T. ACT 2000
 INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGAT
INTO 13 CHAPTERS.
 FOUR SCHEDULE FROM PART OF THE ACT.
 CAME INTO EXISTENCE ON OCTOBER 17, 2000.
 INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.
 THE PRIME SOURCE OF CYBER LAWIN INDIA IS THE INFORMATION
TECHNOLOGY ACT 2000
 THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO
ELECTRONIC COMMERCE RECORDS WITH THE GOVERNMENT.
 THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES
TO DEAL WITH CYBER CRIME . SUCH AN ACT IS REQUIRED AS PEOPLE CA
PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS WITH
OF GETTING MISUSED.
IT AMENDMENT ACT 2008
 INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATI
TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITI
FOCUS ON INFORMATIONSECURITY, IT HAS ADDED SEVERAL NEW SECTIO
ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION.
 THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMB
AND CAME INTO FORCE FROM OCTOBER 27,2009 ONWARDS.
NEED & IMPORTANCE OF CYBER LAW
 TACKLING CYBER CRIME
 SUCCESSFUL AND SMOOTH FUNCTIONING OF E-COMMERCE AND VIRTUA
COMMUNICATION.
 NO JURISDICTIONAL BOUNDARIES
 INCREASING USE OF MOBILE BANKING AND INTERNET BANKING.
 CLOUD COMPUTING IS PROVING TO BE A MAJOR THREAT.
 ECONOMIC EFFECIENCY
THANK YOU !

More Related Content

Similar to ISO Standards And various Indian Cyber Laws

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Karuna763604
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
SumandeepKaur733500
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
esther_sonu
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
Areniym Lovelova
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
21E4114NithyashreeI
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
Hemant
 

Similar to ISO Standards And various Indian Cyber Laws (20)

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 

Recently uploaded

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 

ISO Standards And various Indian Cyber Laws

  • 1. SO Standards And various dian Cyber Laws By : Suraj Kumar Class :MCA-II Roll no. :2111935 Sub.: ISCL
  • 2.  ISO stands for International Organization for Standardization  International Standards make things to work.  These standards provide a world-class specification for:. - products - services and computers - to ensure quality - safety and efficiency
  • 3. ABOUT ISO  ISO standard is officially established On 23 February 1947  It is an independent, non-governmental international organization.  it has a membership of 162 national standards bodies.  ISO has published over 22336 International Standards .  its related documents which covers almost every industry, from  information technology, to food safety, to agriculture and healthcare.  information technology, to food safety, to agriculture and healthcare.
  • 4. VARIOUS SERIES OF ISO ISO 27000 Series The need of ISO 27000 series arises because of the risk of cyber-attacks which the organization face. The cyber-attacks are growing day by day making hackers a constant threat to any industry that uses technology. ISO 27001-This standard allows us to prove the clients and stakeholders of any organization to managing the best security of their confidential data and informatio ISO 27002- This standard provides guidelines for organizational information security standards and information security management practices ISO 27005- This standard supports the general concepts specified in 27001. It is designed to provide the guidelines for implementation of information security based on a risk management
  • 5. CYBER LAW  CYBER LAW IS THE LAW GOVERNING CYBER SPACE.  CYBER SPACE IS VERY WIDE TERM AND INCLUDES COMPUTERS, NETWO SOFTWARE, DATA STORAGE DEVICES(SUCH AS HARD DISKS, USB DISKS THE INTERNET, WEBSITES, EMAIL AND EVEN ELECTRONIC DEVICES SUCH PHONE , ATM MACHINES ETC.
  • 6. CYBER LAWININDIA  CYBER LAW OF INDIA IS DEFINED UNDER IT ACT 200  SIMPLY SPEAKING CYBER LAW IS GENERIC TERM WHICH TO ALL LEGAL AN REDULATORY ASPECTS OF INTERNET AND WORLD WIDE WEB  THE GROWTH OF ELECTRONIC COMMERCE HAS PROPELLED THE NEED FO AND EFFECTIVE REGULATORY MECHANISMS WHICH WOULD STRENG THEN T INFRASTRUCTURE AND WOULD BE CRUCIAL FOR THE SUCCESS OF ELECTRO COMMERCE.
  • 7. CYBER CRIME CAN BE BASICALLY DIVIDED INTO THREE MAJOR CATEGORIES  CYBER CRIME AGAINST PERSION  CYBER CRIME AGAINST PROPERTY  CYBER CRIME AGAINST GOVERNMENT
  • 8. CYBER CRIME AGAINST PERSION  CYBER CRIME AGAINST PERSION INCLUDES VARIOUS CRIME LIKE TRANSMISSION OF CHILD, PORNOGRAPHY, HARASSMENT OR ANY ONE WITH THE USE OF COMPUTER SUCH AS E-MAIL.  E-mail Spamming:Email spam, also known as junk email or unsolicited bulk email (UBE). Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.  E-mail Bombing :E-mail bombing occurs through sending threatening E-mails: For example: Mr. X received an e-mail message from someone who called him “your friend”. The attachment with the e-mail contained morphed pornographic photographs of Mr. X. The mail message said that if Mr. X were not to pay Rs. 20,000 at a specified place every month, the photographs would be uploaded to the Internet and then a copy sent to his family
  • 9. CYBER CRIME AGAINST PROPERTY THESE CRIMES INCLUDES:  COMPUTER VANDALISM (DESTRUCTION OF OTHER’S PROPERTY  TRANSMISSION OF HARMFUL PROGRAMMES  SIPHONING OF FUNDS FROM FINANCIAL INSTITUTION  STEALING SECRET INFORMATION AND DATA
  • 10. CYBER CRIME AGAINST GOVERNMENT  CYBER TERRORISM IS ONE DISTINCT KIND OF CRIME IN THIS CATEGORY  THE MEDIUM OF CYBER SPACE IS USED BY INDIVIDUALS OR GROUP TO THE INTERNATIONAL GOVERNMENTS AS ALSO TOO TERRORIZ THE CIT A COUNTRY.  THIS CRIME MANIFESTS ITSELF INTO TERRORISM WHEN AN INDIVIDUAL INTO A GOVERNMENT OR MILITARY MAINTAINED WEBSITE.
  • 11. I.T. ACT 2000  INFORMATION TECHNOLOGY ACT CONSISTED OF 94 SECTION SEGREGAT INTO 13 CHAPTERS.  FOUR SCHEDULE FROM PART OF THE ACT.  CAME INTO EXISTENCE ON OCTOBER 17, 2000.  INDIA IS THE 12TH NATION IN THE WORLD TO ENACT THE CYBER LAW.  THE PRIME SOURCE OF CYBER LAWIN INDIA IS THE INFORMATION TECHNOLOGY ACT 2000  THE MAIN PURPOSE OF THE ACT IS TO PROVIDE LEGAL RECOGNITION TO ELECTRONIC COMMERCE RECORDS WITH THE GOVERNMENT.  THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND PROVIDES TO DEAL WITH CYBER CRIME . SUCH AN ACT IS REQUIRED AS PEOPLE CA PURCHASE TRANSACTION OVER THE NET THROUGH CREDIT CARDS WITH OF GETTING MISUSED.
  • 12. IT AMENDMENT ACT 2008  INFORMATION TECHNOLOGY ACT 2008, AS A NEW VERSION OF INFORMATI TECHNOLOGY ACT 2000 IS OFTEN REFERRED, HAS PROVIDED THE ADDITI FOCUS ON INFORMATIONSECURITY, IT HAS ADDED SEVERAL NEW SECTIO ON OFFENSE INCLUDING CYBER TERRORISM AND DATA PROTECTION.  THE IT ACT 2008 HAS BEEN PASSED BY THE PARLIAMENT ON 23RD DECEMB AND CAME INTO FORCE FROM OCTOBER 27,2009 ONWARDS.
  • 13. NEED & IMPORTANCE OF CYBER LAW  TACKLING CYBER CRIME  SUCCESSFUL AND SMOOTH FUNCTIONING OF E-COMMERCE AND VIRTUA COMMUNICATION.  NO JURISDICTIONAL BOUNDARIES  INCREASING USE OF MOBILE BANKING AND INTERNET BANKING.  CLOUD COMPUTING IS PROVING TO BE A MAJOR THREAT.  ECONOMIC EFFECIENCY