Cyber Security Unit-I
Cyber Security Unit-I
1. Cyberspace
Cyberspace can be defined as an intricate environment that involves interactions
between people, software, and services. It is maintained by the worldwide distribution of
information and communication technology devices and networks.
With the benefits carried by the technological advancements, the cyberspace today has
become a common pool used by citizens, businesses, critical information infrastructure, military
and governments in a fashion that makes it hard to induce clear boundaries among these
different groups. The cyberspace is anticipated to become even more complex in the upcoming
years, with the increase in networks and devices connected to it.
2. Cyber security:
Cyber security denotes the technologies and procedures intended to safeguard
computers, networks, and data from unlawful admittance, weaknesses, and attacks transported
through the Internet by cyber delinquents.
ISO 27001 (ISO27001) is the international Cyber security Standard that delivers a model
for creating, applying, functioning, monitoring, reviewing, preserving, and improving an
Information Security Management System.
The Ministry of Communication and Information Technology under the government of
India provides a strategy outline called the National Cyber security Policy. The purpose of this
government body is to protect the public and private infrastructure from cyber-attacks.
The cyber security policy is a developing mission that caters to the entire field of Information
and Communication Technology (ICT) users and providers. It includes −
Home users
Small, medium, and large Enterprises
Government and non-government entities
It serves as an authority framework that defines and guides the activities associated with the
security of cyberspace. It allows all sectors and organizations in designing suitable cyber
security policies to meet their requirements. The policy provides an outline to effectively
protect information, information systems and networks.
It gives an understanding into the Government’s approach and strategy for security of cyber
space in the country. It also sketches some pointers to allow collaborative working across the
public and private sectors to safeguard information and information systems. Therefore, the
aim of this policy is to create a cyber security framework, which leads to detailed actions and
programs to increase the security carriage of cyberspace.
Cyber Law is the term used to describe the a law that deals with the issues
related to the Internet, technological and electronic elements,
communication technology, including computers, software, hardware and
information systems.
Cyber crime is a generic term that refers to all criminal activities done using
the medium of communication technology components, the Internet, cyber
space and the world wide web (www).
Cyber crimes can involve criminal activities that are traditional in nature,
such as theft, fraud, forgery, defamation and mischief, all of which are
subject to the Indian Penal Code.
Cyber crime has become a profession and the demographic of a typical
cyber criminal is changing rapidly, from one person to another person, from
those who are more traditionally associated with drug-trafficking, extortion
and money laundering.
Cyber law is concerned with every individual these days. This is primarily
because we all use internet in some or the other form daily. Internet is used
when we create any account online, while performing e-commerce
transactions, net banking, sending or receiving emails, surfing the net to
take out some important information, etc.
There are several advantages of Cyber Law to protect the individuals from getting
trapped in any cyber violations. The IT Act 2000 provides several guidelines in this
regard.
Organizations shall now be able to carry out e-commerce using the legal
infrastructure provided by the Act.
The Act throws open the doors for the entry of corporate companies in the
business of being Certifying Authorities for issuing Digital Signatures
Certificates.
Under the IT Act, 2000, it shall now be possible for corporates to have a
statutory remedy in case if anyone breaks into their computer systems or
network and cause loss.
The Act now allows Government to issue notification on the web thus
indicating e-governance.
The IT Act also addresses the important issues of security, which are so
critical to the success of electronic transactions.
(2) the laws of the state/nation that apply where the server hosting the
transaction is located, and
(3) the laws of the state/nation which apply to the person or business with whom
the transaction takes place.
Cyber Jurisprudence:
The Latin words jus and prudentia being mutated as jurisprudence in English has
been defined as "knowledge of law or knowledge of just and unjust.
Etymologically, no doubt this definition conforms to the word but it brings within
its compass every branch of law
Shrink wrap contracts are boilerplate or license agreements or other terms and
conditions which are packaged with the products. The usage of the product
deems the acceptance of the contract by the consumer. The term ‘Shrink Wrap’
describes the shrink wrap plastic wrapping which coats software boxes or the
terms and conditions which come with products on delivery.
The term "shrink-wrap" derives from the method by which software was
distributed as a package of installation disks and associated documentation sealed
by shrink-wrap cellophane. The accompanying end user license agreement was
often itself packaged in shrink-wrap cellophane and placed on the outside of the
package or included as the top most item in the package. Today, shrink-wrap
agreements can take a variety of forms and are found in both software and
hardware acquisitions. However, they all have a common structure: essentially
non-negotiable terms and conditions that accompany the product. The terms may
appear as part of the documentation accompanying the product, as part of an on-
line purchase process whereby the terms are displayed (and the purchaser,
potentially, required to affirmatively click an "accept" button as part of the
process), or presented to the purchaser on first use of the application as part of
the installation process.
2. Click Wrap Contracts:
The content and form of clickwrap agreements vary widely. Most clickwrap
agreements require the end-user to manifest his or her assent by clicking
an "ok" or "agree" button on a dialog box or pop-up window. A user
indicates rejection by clicking cancel or closing the window. Upon rejection,
the user cannot use or purchase the product or service. Classically, such a
take-it-or-leave-it contract was described as a "contract of adhesion, which
is a contract that lacks bargaining power, forcing one party to be favored
over the other".
The terms of service or license do not always appear on the same webpage
or window, but are always accessible before acceptance, such as through a
hyperlink embedded in the product's webpage or a pop-up screen prior to
installation. In order to be deemed to have accepted the terms of service,
the purchaser must be put on notice that certain terms of service may
apply. If the terms of service are not visible and/or accessible, courts have
found the notice requirement to be lacking and as such, the purchaser may
not be bound to the terms of the agreement. An analysis of the terms of
service of major consumer websites has found that they frequently contain
clauses that impede consumer rights in substantial and often unexpected
ways.