0% found this document useful (0 votes)
22 views3 pages

Untitled Document

Computer system security notes

Uploaded by

temp790648
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views3 pages

Untitled Document

Computer system security notes

Uploaded by

temp790648
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Cybercrimes
Cybercrime refers to any criminal activity that involves a computer, network, or internet.
Examples include hacking, identity theft, online fraud, and cyberbullying. These crimes can
affect individuals, businesses, or governments.

2. Cyber Stalking
Cyberstalking is when someone uses the internet to harass or threaten others repeatedly.
This can include sending threatening messages, tracking someone's online activity, or
posting harmful content.

3. Botnets
A botnet is a group of computers controlled by cybercriminals without the owners'
knowledge. These computers, known as "zombies," can be used to perform malicious
activities such as sending spam emails or launching cyberattacks.

4. Cyber Forensics and Digital Evidence


Cyber forensics involves gathering, analyzing, and preserving digital evidence from
computers, networks, or mobile devices. It is used in criminal investigations and to solve
legal disputes. Digital evidence can include emails, documents, files, and logs that can prove
or disprove allegations.

5. Forensics Analysis of E-Mail


This is the process of investigating email communications to find evidence. For example,
investigators might look at email headers, timestamps, and content to track the source of an
attack or to prove fraud.

6. Digital Forensics Life Cycle


The Digital Forensics Life Cycle refers to the steps taken during a digital forensic
investigation. These typically include:

Identification of potential evidence.


Collection of digital evidence.
Examination of evidence for useful data.
Analysis of the evidence to draw conclusions.
Reporting findings and conclusions.

7. Privacy Threats
Privacy threats are risks to individuals’ personal data that could be exposed or misused.
These can include identity theft, surveillance, data breaches, or unauthorized access to
private information.

8. Challenges in Computer Forensics


Computer forensics faces several challenges, such as:

The complexity of different devices and systems.


Encryption that protects data.
The sheer volume of data to sift through.
Legal issues around evidence collection and privacy concerns.

9. Introduction to Security Policies and Cyber Laws


Security policies define the rules and guidelines for protecting digital assets in an
organization. Cyber laws refer to the legal rules governing internet use, including issues like
online fraud, hacking, and privacy rights.

10. Need for an Information Security Policy


An Information Security Policy outlines the measures an organization takes to protect its
data and systems from threats. It’s essential to safeguard sensitive information, prevent
cybercrimes, and comply with legal requirements.

11. Introduction to Indian Cyber Law


Indian Cyber Law deals with the legal framework governing digital activities in India. It
addresses cybercrimes, data protection, and online transactions. The Information
Technology Act, 2000, is the main law governing cyber activities in India.

12. Objective and Scope of the Digital Personal Data Protection Act 2023
The Digital Personal Data Protection Act, 2023, aims to protect individuals’ personal data
from misuse and unauthorized access. It sets guidelines for how organizations collect, store,
and process personal information.

13. Intellectual Property Issues


Intellectual property refers to creations of the mind, such as inventions, designs, or artistic
works. Issues arise when these rights are violated, such as unauthorized use, copying, or
selling of intellectual property without permission.

14. Overview of Intellectual Property Legislation in India


In India, intellectual property is protected through laws such as:

Patents: Protect inventions.


Copyrights: Protect creative works like music, books, and software.
Trademarks: Protect brand names, logos, and symbols.

15. Patent, Copyright, Trademarks


Patent: A legal right granted for a new invention, giving the inventor exclusive rights for a
period (usually 20 years).
Copyright: Protects original works of authorship such as literature, music, and software.
Trademark: A symbol, word, or logo used to identify goods or services, protecting the brand
identity.

You might also like