Unit 6
Unit 6
IN INFORMATION SECURITY
• Introduction
•Law and Ethics in Information Security
•Organizational Liability and the Need for Counsel
•Policy Versus Law
•Cyber Crime
•Cyber-crime on the rise
•Cyber law of India
•Need for cyber law in India
Introduction
1. Legal Issues
• These relate to laws and regulations that
govern how information is used, stored, and
protected. Organizations must comply to avoid
penalties or legal action.
• Examples:
• Data Protection Laws (e.g., GDPR, HIPAA):
Organizations must protect personal data like names,
medical records, or financial details.
Example: A hospital must secure patient records; leaking
them could lead to legal action.
• Cybercrime Laws: Hacking, phishing, and unauthorized
access are criminal offenses.
Example: A person accessing a company’s server
without permission can be prosecuted under cybercrime
laws.
• Ethical Issues
• These concern what is morally right or wrong,
even if not covered by law. Ethics guide
behavior in ambiguous situations.
• Examples:
• Privacy: Even if it's not illegal, reading
someone’s emails without consent is unethical.
Example: An employee accessing a colleague’s
email without permission.
• Honesty in Research or Reporting: Modifying
security test results to look better is unethical.
Example: A consultant lying about a system’s
vulnerability assessment.
• Professional Issues
• These are standards set by professional
bodies to ensure responsible and trustworthy
conduct by members in the field.
• Examples:
• Adhering to Codes of Conduct: Professionals like CISSPs
or members of ACM/IEEE must follow codes about
confidentiality, integrity, and responsible behavior.
Example: Not disclosing confidential client data even
after leaving the job.
• Competence: Professionals must only work within their
area of expertise.
Example: A network admin shouldn’t handle advanced
cryptography tasks without proper knowledge.
• Law and Ethics in Information Security
Law in Information Security
• Laws provide a formal framework to protect
data, systems, and users. They are legally
enforceable, and violating them can result in
penalties, fines, or imprisonment.
Key Areas:
• Data Protection Laws: Regulate how personal
information is collected, used, and stored.
• Example:
• GDPR (General Data Protection Regulation) in the EU
requires companies to protect personal data.
If a company shares user data without consent, it can
be fined millions (as Facebook and Google have
experienced).
Policy
• A policy is an internal rule or guideline set by an
organization to guide behavior and operations. It’s not
legally binding by itself but can lead to disciplinary
action within the organization if broken.
• Example:
• A company might have an Email Usage Policy that
bans employees from using work email for personal
communication.
If someone breaks this rule, they might be warned,
suspended, or fired—but not taken to court.
Real-Life Combined Example:
• A company must follow GDPR law (external)
and may also have a Data Handling Policy
(internal).
If an employee mishandles customer data:
• They may face internal discipline for breaking
policy.
• The company could face legal action under
GDPR.
• Cyber Crimes
• Cyber crime refers to illegal activities carried
out using computers, networks, or the
internet.
• These crimes target individuals, organizations,
or even governments, often involving theft,
fraud, or data breaches.
Types of Cyber Crimes & Real-Life Examples:
• Hacking
Unauthorized access to computer systems or
networks.
Example: In 2014, Sony Pictures was hacked—
confidential data and unreleased movies were leaked.
• Phishing
Sending fake emails or messages to trick users into
revealing personal info.
Example: A fake “bank” email tricks a user into
entering their login details on a scam website.
• Identity Theft
Stealing personal info to impersonate someone and
commit fraud.
Example: Hackers steal credit card data and use it to make
purchases.
• Ransomware Attacks
Malware locks a victim’s files and demands payment to
unlock them.
Example: The WannaCry attack (2017) affected thousands
of computers worldwide, especially in hospitals.
• Cyberbullying
Harassing or threatening someone online
through messages or social media.
Example: Repeatedly sending abusive
messages to someone on Instagram or
Facebook.
• Cyber crime is a growing threat with serious
consequences. It includes any criminal activity
involving digital systems, and it can cause
financial loss, data exposure, and emotional
harm.
• Which of these is an example of
cyberbullying?
A. Sending threatening messages via social
media
B. Hacking a bank server
C. Writing code to protect data
D. Downloading free antivirus
• What is the main motive behind most financial
cyber crimes?
A. Entertainment
B. Political activism
C. Profit or financial gain
D. Legal protection
Which of the following is a crime that involves
stealing someone’s identity to commit fraud
online?
A. Ransomware
B. Cyberbullying
C. Identity theft
D. Piracy
• A company password policy is considered a:
A. Public law
B. Government regulation
C. Corporate policy
D. Cyber crime
• What happens if an employee breaks an
internal policy?
A. They go to jail
B. They face internal disciplinary action
C. They must report to the government
D. They change the law
• Which of the following is not a reason to hire
legal counsel in information security?
A. To comply with regulations
B. To fight hackers physically
C. To draft privacy policies
D. To manage legal risks after a breach
• If an organization fails to secure customer data
and a breach occurs, who may be held
responsible?
A. Only the customer
B. The IT department only
C. The organization as a whole
D. Internet Service Provider
• Which law is specifically aimed at protecting
personal data in the European Union?
A. HIPAA
B. PCI DSS
C. GDPR
D. DMCA
• Which of the following best describes ethics in
information security?
A. Rules enforced by the government
B. Software development guidelines
C. Personal standards of right and wrong
behavior
D. Technical policies for IT staff
• Sending fake emails to trick users into giving
sensitive information is known as:
A. Spamming
B. Hacking
C. Phishing
D. Snooping
• What type of cyber crime involves locking data
and demanding money to unlock it?
A. Phishing
B. Hacking
C. Ransomware
D. Spoofing
• An internal rule in a company, such as an
internet usage guideline, is an example of a:
A. Law
B. Regulation
C. Policy
D. Statute
• Why do organizations need legal counsel in
information security?
A. To train employees on programming
B. To ensure compliance with laws and
manage legal risks
C. To block websites
D. To fix hardware issues
• What is organizational liability in the context
of information security?
A. Responsibility for software updates
B. Legal responsibility for security breaches or
data mishandling
C. Assigning passwords to users
D. Following employee code of conduct
• Which of the following is an example of an
ethical issue in information security?
A. Hacking into a system
B. Respecting user privacy
C. Breaching a copyright law
D. Installing antivirus software
• Laws are enforced by:
A. Company managers
B. Employees
C. Government authorities
D. IT professionals