SlideShare a Scribd company logo
Chaitra
2079
Information security and
Cyber Law
Digital Society
A digital society is a society in which the use of digital technologies and the internet are widespread
and integrated into many aspects of daily life. In a digital society, people use digital technologies to
communicate, work, learn, shop, and access information. Digital technologies include personal
computers, smartphones, tablets, wearables, and other internet-connected devices.
Advances in digital technology have brought significant changes to society. The digital revolution
has transformed the way we live, work, and interact with each other. Digital technologies have
enabled us to communicate more easily and efficiently, and to access vast amounts of information
instantly. They have also created new opportunities for education, entertainment, and commerce.
However, the digital society also poses challenges and risks. Digital technologies can contribute to
social isolation, addiction, and cyberbullying. They can also lead to job displacement and economic
inequality. There are concerns about data privacy, security, and the misuse of personal information.
In addition, the digital divide between those who have access to digital technologies and those who
do not remains a significant issue.
Computer Ethics
Computer ethics refers to the study of ethical issues that arise in the context of computing
technology. It deals with questions of how computers and related technologies can be used ethically,
what ethical obligations individuals and organizations have in relation to computing, and how
computing technology can be developed and deployed in ways that respect human values and
rights.
Some of the key issues that fall under the umbrella of computer ethics include privacy, security,
intellectual property, accessibility, artificial intelligence, and the impact of technology on society. For
example, computer ethics might address questions such as:
What data should be collected and how should it be used, stored, and shared?
How can we ensure that our online transactions are secure and our personal information is
protected?
What rights do individuals and organizations have to access and use intellectual property, such as
copyrighted material or patented inventions?
How can we ensure that computing technology is accessible to people with disabilities or those who
lack access to traditional means of communication?
What ethical considerations arise in the development and deployment of artificial intelligence and
autonomous systems?
How can we ensure that technology is designed and deployed in ways that promote social justice
and equity?
Information Security
Information security refers to the practice of protecting digital information and data from unauthorized
access, use, disclosure, disruption, modification, or destruction. It involves a range of strategies,
technologies, and practices aimed at safeguarding the confidentiality, integrity, and availability of
information assets.
Information security includes a wide range of practices, including:
Access control: This involves limiting access to information to only authorized users and preventing
unauthorized access.
Encryption: This involves the use of cryptographic algorithms to protect sensitive information by
making it unreadable without the appropriate decryption key.
Network security: This involves protecting computer networks from unauthorized access and ensuring
that data transmitted over the network is secure.
Security policies and procedures: This includes creating policies and procedures that govern the use of
information systems and help ensure compliance with relevant regulations and laws.
Physical security: This involves protecting physical assets such as computer systems, data centers, and
servers from unauthorized access, theft, and damage.
Incident response: This involves creating a plan for responding to security incidents and minimizing the
impact of any breaches or attacks.
Risk assessment and management: This involves identifying potential risks and vulnerabilities to
information systems and implementing strategies to mitigate those risks.
Cybercrime
Cybercrime refers to criminal activities that are committed through the use of digital technologies, such as
computers, the internet, and mobile devices. Cybercriminals can use these technologies to access or
damage computer systems, steal personal or financial information, commit fraud, or engage in other illegal
activities.
There are many types of cybercrime, including:
1. Hacking: Unauthorized access to computer systems or networks.
2. Malware: Software that is designed to harm computer systems or steal information.
3. Phishing: Attempting to obtain sensitive information such as passwords, credit card numbers, or
personal information by pretending to be a trustworthy entity.
4. Identity theft: Stealing someone's personal information to commit fraud or other criminal activities.
5. Cyberstalking: Harassment or threatening behavior using digital technologies.
6. Ransomware: Malware that encrypts a victim's data and demands payment in exchange for the
decryption key.
7. Distributed Denial of Service (DDoS): Overwhelming a website or server with traffic to disrupt its normal
functioning.
Cybercrime is a growing concern as more people and businesses rely on digital technologies to conduct
their daily activities. It is important for individuals and organizations to take steps to protect themselves
from cyber threats, such as using strong passwords, keeping software up-to-date, and being cautious
Malicious software
Malicious software, also known as malware, refers to any type of software that is designed to cause harm to
a computer system, network, or device. Malware can take many different forms, including viruses, worms,
trojan horses, ransomware, spyware, adware, and more.
Malware is often created by hackers and cybercriminals to gain unauthorized access to sensitive data or to
control a compromised system for their own purposes. Malware can be distributed through a variety of
methods, including email attachments, file-sharing networks, and infected websites.
Once a system is infected with malware, it can cause a wide range of issues, including slowing down the
system, crashing the system, stealing sensitive data, and allowing unauthorized access to the system.
Malware can be difficult to detect and remove, and it can be very damaging to businesses and individuals
who are affected by it.
To protect against malware, it is important to have up-to-date antivirus software, to avoid downloading or
opening suspicious files or attachments, and to practice safe browsing habits online.
Spam
Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers
of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing,
for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending
the same message to the same user. While the most widely recognized form of spam is email spam, the
term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web
search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging
spam, Internet forum spam, junk fax transmissions, social spam, spam mobile
apps. Television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of
a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly
sing "Spam" repeatedly.
Spamming remains economically viable because advertisers have no operating costs beyond the
management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult
to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are
borne by the public and by Internet service providers, which have added extra capacity to cope with the
volume. Spamming has been the subject of legislation in many jurisdictions.
Protection from
Cybercrime
Cybercrime has become a serious concern in today's digital age, and it's crucial to take steps to protect
yourself and your personal information online. Here are some measures you can take to protect yourself
from cybercrime:
1. Use strong and unique passwords: Use a different password for every account, and use a mix of letters,
numbers, and special characters.
2. Enable two-factor authentication: This adds an extra layer of security by requiring a code in addition to
your password to access your account.
3. Keep your software up to date: Keep your operating system, antivirus software, and other applications
up to date to prevent vulnerabilities from being exploited by cybercriminals.
4. Be cautious of suspicious emails: Phishing emails can trick you into providing personal information or
downloading malware. Be wary of unsolicited emails and avoid clicking on links or downloading
attachments from unknown senders.
5. Use a Virtual Private Network (VPN): A VPN encrypts your internet traffic and masks your IP address,
making it harder for hackers to intercept your data.
6. Backup your data: Regularly backup your data, so you can recover it if it's lost due to cybercrime or
other reasons.
Intellectual Property
Right
Intellectual property (IP) rights refer to the legal rights that are granted to individuals or businesses for
their creative and intellectual works. These rights are designed to encourage innovation and creativity by
providing incentives for people to create and invest in new ideas and works.
There are several types of intellectual property rights, including:
1. Patents: Patents provide inventors with exclusive rights to prevent others from making, using, selling,
and importing an invention for a certain period of time, usually 20 years from the date of filing.
2. Copyrights: Copyrights provide authors, artists, and creators with exclusive rights to reproduce,
distribute, perform, display, and create derivative works of their original works of authorship, such as
books, music, and movies, for a certain period of time, usually the lifetime of the creator plus 70 years.
3. Trademarks: Trademarks protect words, phrases, symbols, or designs that identify and distinguish the
goods or services of one company from those of another. Trademarks can last indefinitely as long as
they are used and maintained properly.
4. Trade secrets: Trade secrets protect confidential information that provides a competitive advantage,
such as formulas, processes, and customer lists. Unlike patents, trade secrets have no expiration date
and can be protected indefinitely as long as they remain secret.
Intellectual property rights are important for promoting innovation and creativity, but they can also be
Digital Signature
A digital signature is a mathematical technique used to verify the authenticity and integrity of electronic
documents or messages. It is the digital equivalent of a handwritten signature or a seal on a document.
The process of creating a digital signature involves using a cryptographic algorithm to generate a unique
digital code, also known as a hash, from the contents of the document or message. The signer then uses
their private key to encrypt the hash, creating a digital signature. This digital signature is attached to the
document or message, along with the signer's public key and other identifying information.
When the recipient receives the document or message, they can verify the digital signature by decrypting it
with the signer's public key and comparing the resulting hash with a new hash generated from the received
document or message. If the two hashes match, it means that the document or message has not been
altered in transit and that it was indeed signed by the claimed signer.
Digital signatures are widely used in e-commerce, online contracts, and other digital transactions to ensure
the authenticity and integrity of electronic documents and messages.
Cyber Law in Nepal
Different countries have different cyber laws and cyber laws regulating bodies. In Nepal cyber law is called
as Electronic Transaction Act (ETA) 2063, which was passed in 2004. The bill deals with issues related to
digital signature, intellectual property, cybercrime, etc. The Act is dived into 12 sections and 80 clauses.
This law keeps an eyeball on issues which are related to computer networks and cybercrime. It brings
cybercriminals under the justice of law and penalizes them just like other crimes. As per the Act, if anyone
is found violating cybercrime, he/she will be punished for a minimum of 6 months to a maximum of 3
years in jail and has to pay a minimum of 50 thousand to a maximum of three lakhs as a penalty.
Important Statistics
There are a total of 10.21 million people in Nepal who used the internet in 2020. The number of users
increased by 315,000 between 2019 and 2020. Around 10 million people in Nepal use social media. It
appears that the country’s citizens have been reluctant to report cybercrime, with only 53 cases being
registered in 2017. However, 2018 saw a sharp rise in the number of cases to 132. In 2018 and 2019, a
total of 180 cases were registered. Out of these 180, 125 cases were from the capital city, Kathmandu, and
the rest from others.
ICT Policy in Nepal
ICT Policy, 2015
Vision
• Transforming Nepal to Information and Knowledge based society through use of ICT.
Goals
• By 2020
• Place Nepal into top second quartile in Network Readliness and EGDI
• 75% of population will be digitally literal
• 90% population will have access to broadband
• Contribution of ICT sector (except telecom)in GDP will cross 2.5%
• Everyone will have access to internet
Establishment of community ICT Center
• Development if Local Content
• Implemention of digital inclusion programs
• Health
• Agriculture
• Tourism
• Education
• Climate change adoptaton

More Related Content

Similar to Shailendra Pandey.ppt

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
himanshuratnama
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
ShailendraPandey96
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
Information security
Information securityInformation security
Information security
IshaRana14
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
SharmilaMore5
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
RobertBhattarai
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
TanviModi14
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 

Similar to Shailendra Pandey.ppt (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
C018131821
C018131821C018131821
C018131821
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Information security
Information securityInformation security
Information security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Shailendra Pandey.ppt

  • 2. Digital Society A digital society is a society in which the use of digital technologies and the internet are widespread and integrated into many aspects of daily life. In a digital society, people use digital technologies to communicate, work, learn, shop, and access information. Digital technologies include personal computers, smartphones, tablets, wearables, and other internet-connected devices. Advances in digital technology have brought significant changes to society. The digital revolution has transformed the way we live, work, and interact with each other. Digital technologies have enabled us to communicate more easily and efficiently, and to access vast amounts of information instantly. They have also created new opportunities for education, entertainment, and commerce. However, the digital society also poses challenges and risks. Digital technologies can contribute to social isolation, addiction, and cyberbullying. They can also lead to job displacement and economic inequality. There are concerns about data privacy, security, and the misuse of personal information. In addition, the digital divide between those who have access to digital technologies and those who do not remains a significant issue.
  • 3. Computer Ethics Computer ethics refers to the study of ethical issues that arise in the context of computing technology. It deals with questions of how computers and related technologies can be used ethically, what ethical obligations individuals and organizations have in relation to computing, and how computing technology can be developed and deployed in ways that respect human values and rights. Some of the key issues that fall under the umbrella of computer ethics include privacy, security, intellectual property, accessibility, artificial intelligence, and the impact of technology on society. For example, computer ethics might address questions such as: What data should be collected and how should it be used, stored, and shared? How can we ensure that our online transactions are secure and our personal information is protected? What rights do individuals and organizations have to access and use intellectual property, such as copyrighted material or patented inventions? How can we ensure that computing technology is accessible to people with disabilities or those who lack access to traditional means of communication? What ethical considerations arise in the development and deployment of artificial intelligence and autonomous systems? How can we ensure that technology is designed and deployed in ways that promote social justice and equity?
  • 4. Information Security Information security refers to the practice of protecting digital information and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves a range of strategies, technologies, and practices aimed at safeguarding the confidentiality, integrity, and availability of information assets. Information security includes a wide range of practices, including: Access control: This involves limiting access to information to only authorized users and preventing unauthorized access. Encryption: This involves the use of cryptographic algorithms to protect sensitive information by making it unreadable without the appropriate decryption key. Network security: This involves protecting computer networks from unauthorized access and ensuring that data transmitted over the network is secure. Security policies and procedures: This includes creating policies and procedures that govern the use of information systems and help ensure compliance with relevant regulations and laws. Physical security: This involves protecting physical assets such as computer systems, data centers, and servers from unauthorized access, theft, and damage. Incident response: This involves creating a plan for responding to security incidents and minimizing the impact of any breaches or attacks. Risk assessment and management: This involves identifying potential risks and vulnerabilities to information systems and implementing strategies to mitigate those risks.
  • 5. Cybercrime Cybercrime refers to criminal activities that are committed through the use of digital technologies, such as computers, the internet, and mobile devices. Cybercriminals can use these technologies to access or damage computer systems, steal personal or financial information, commit fraud, or engage in other illegal activities. There are many types of cybercrime, including: 1. Hacking: Unauthorized access to computer systems or networks. 2. Malware: Software that is designed to harm computer systems or steal information. 3. Phishing: Attempting to obtain sensitive information such as passwords, credit card numbers, or personal information by pretending to be a trustworthy entity. 4. Identity theft: Stealing someone's personal information to commit fraud or other criminal activities. 5. Cyberstalking: Harassment or threatening behavior using digital technologies. 6. Ransomware: Malware that encrypts a victim's data and demands payment in exchange for the decryption key. 7. Distributed Denial of Service (DDoS): Overwhelming a website or server with traffic to disrupt its normal functioning. Cybercrime is a growing concern as more people and businesses rely on digital technologies to conduct their daily activities. It is important for individuals and organizations to take steps to protect themselves from cyber threats, such as using strong passwords, keeping software up-to-date, and being cautious
  • 6. Malicious software Malicious software, also known as malware, refers to any type of software that is designed to cause harm to a computer system, network, or device. Malware can take many different forms, including viruses, worms, trojan horses, ransomware, spyware, adware, and more. Malware is often created by hackers and cybercriminals to gain unauthorized access to sensitive data or to control a compromised system for their own purposes. Malware can be distributed through a variety of methods, including email attachments, file-sharing networks, and infected websites. Once a system is infected with malware, it can cause a wide range of issues, including slowing down the system, crashing the system, stealing sensitive data, and allowing unauthorized access to the system. Malware can be difficult to detect and remove, and it can be very damaging to businesses and individuals who are affected by it. To protect against malware, it is important to have up-to-date antivirus software, to avoid downloading or opening suspicious files or attachments, and to practice safe browsing habits online.
  • 7. Spam Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps. Television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly. Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions.
  • 8. Protection from Cybercrime Cybercrime has become a serious concern in today's digital age, and it's crucial to take steps to protect yourself and your personal information online. Here are some measures you can take to protect yourself from cybercrime: 1. Use strong and unique passwords: Use a different password for every account, and use a mix of letters, numbers, and special characters. 2. Enable two-factor authentication: This adds an extra layer of security by requiring a code in addition to your password to access your account. 3. Keep your software up to date: Keep your operating system, antivirus software, and other applications up to date to prevent vulnerabilities from being exploited by cybercriminals. 4. Be cautious of suspicious emails: Phishing emails can trick you into providing personal information or downloading malware. Be wary of unsolicited emails and avoid clicking on links or downloading attachments from unknown senders. 5. Use a Virtual Private Network (VPN): A VPN encrypts your internet traffic and masks your IP address, making it harder for hackers to intercept your data. 6. Backup your data: Regularly backup your data, so you can recover it if it's lost due to cybercrime or other reasons.
  • 9. Intellectual Property Right Intellectual property (IP) rights refer to the legal rights that are granted to individuals or businesses for their creative and intellectual works. These rights are designed to encourage innovation and creativity by providing incentives for people to create and invest in new ideas and works. There are several types of intellectual property rights, including: 1. Patents: Patents provide inventors with exclusive rights to prevent others from making, using, selling, and importing an invention for a certain period of time, usually 20 years from the date of filing. 2. Copyrights: Copyrights provide authors, artists, and creators with exclusive rights to reproduce, distribute, perform, display, and create derivative works of their original works of authorship, such as books, music, and movies, for a certain period of time, usually the lifetime of the creator plus 70 years. 3. Trademarks: Trademarks protect words, phrases, symbols, or designs that identify and distinguish the goods or services of one company from those of another. Trademarks can last indefinitely as long as they are used and maintained properly. 4. Trade secrets: Trade secrets protect confidential information that provides a competitive advantage, such as formulas, processes, and customer lists. Unlike patents, trade secrets have no expiration date and can be protected indefinitely as long as they remain secret. Intellectual property rights are important for promoting innovation and creativity, but they can also be
  • 10. Digital Signature A digital signature is a mathematical technique used to verify the authenticity and integrity of electronic documents or messages. It is the digital equivalent of a handwritten signature or a seal on a document. The process of creating a digital signature involves using a cryptographic algorithm to generate a unique digital code, also known as a hash, from the contents of the document or message. The signer then uses their private key to encrypt the hash, creating a digital signature. This digital signature is attached to the document or message, along with the signer's public key and other identifying information. When the recipient receives the document or message, they can verify the digital signature by decrypting it with the signer's public key and comparing the resulting hash with a new hash generated from the received document or message. If the two hashes match, it means that the document or message has not been altered in transit and that it was indeed signed by the claimed signer. Digital signatures are widely used in e-commerce, online contracts, and other digital transactions to ensure the authenticity and integrity of electronic documents and messages.
  • 11. Cyber Law in Nepal Different countries have different cyber laws and cyber laws regulating bodies. In Nepal cyber law is called as Electronic Transaction Act (ETA) 2063, which was passed in 2004. The bill deals with issues related to digital signature, intellectual property, cybercrime, etc. The Act is dived into 12 sections and 80 clauses. This law keeps an eyeball on issues which are related to computer networks and cybercrime. It brings cybercriminals under the justice of law and penalizes them just like other crimes. As per the Act, if anyone is found violating cybercrime, he/she will be punished for a minimum of 6 months to a maximum of 3 years in jail and has to pay a minimum of 50 thousand to a maximum of three lakhs as a penalty. Important Statistics There are a total of 10.21 million people in Nepal who used the internet in 2020. The number of users increased by 315,000 between 2019 and 2020. Around 10 million people in Nepal use social media. It appears that the country’s citizens have been reluctant to report cybercrime, with only 53 cases being registered in 2017. However, 2018 saw a sharp rise in the number of cases to 132. In 2018 and 2019, a total of 180 cases were registered. Out of these 180, 125 cases were from the capital city, Kathmandu, and the rest from others.
  • 12. ICT Policy in Nepal ICT Policy, 2015 Vision • Transforming Nepal to Information and Knowledge based society through use of ICT. Goals • By 2020 • Place Nepal into top second quartile in Network Readliness and EGDI • 75% of population will be digitally literal • 90% population will have access to broadband • Contribution of ICT sector (except telecom)in GDP will cross 2.5% • Everyone will have access to internet Establishment of community ICT Center • Development if Local Content • Implemention of digital inclusion programs • Health • Agriculture • Tourism • Education • Climate change adoptaton