Tuesday, April 15, 2025

Chapter: 8 Information Security and Cyber Law

 

8.1 Digital Society and Computer Ethics

  • Digital Society: A society where information and communication technologies (ICT) are widely used for communication, business, education, and governance.
  • Computer Ethics: Moral principles guiding the use of computers and technology, including:
    • Privacy: Protecting personal information.
    • Accuracy: Ensuring data integrity.
    • Property: Respecting intellectual property rights.
    • Accessibility: Ensuring fair access to technology.

8.2 Concept of Information Security

  • Information Security: Protecting data from unauthorized access, modification, or destruction.
  • Three key principles (CIA Triad):
    • Confidentiality: Restricting access to authorized users.
    • Integrity: Ensuring data is accurate and unaltered.
    • Availability: Ensuring data is accessible when needed.
  • Threats: Hacking, phishing, malware, insider threats.
  • Security Measures: Firewalls, encryption, strong passwords, regular updates.

8.3 Concept of Cybercrime

  • Cybercrime: Illegal activities involving computers and networks.
  • Types of Cybercrime:
    • Hacking and unauthorized access.
    • Identity theft and fraud.
    • Online scams and phishing.
    • Cyberbullying and harassment.
    • Ransomware and data breaches.

8.4 Malicious Software and Spam

  • Malicious Software (Malware): Programs designed to harm a system, including:
    • Virus: Self-replicating programs that attach to files.
    • Worm: Self-spreading malware that does not need a host file.
    • Trojan Horse: Disguised as legitimate software.
    • Spyware: Secretly collects user information.
    • Ransomware: Encrypts data and demands payment.
  • Spam: Unsolicited or unwanted emails, often used for phishing and spreading malware.

8.5 Protection from Cybercrime

  • Use Strong Passwords: Combination of letters, numbers, and symbols.
  • Enable Two-Factor Authentication (2FA): Extra security layer.
  • Install Antivirus and Firewalls: Protect against malware.
  • Avoid Phishing Scams: Do not click on suspicious links.
  • Regular Software Updates: Fix security vulnerabilities.

8.6 Intellectual Property Rights (IPR)

  • Intellectual Property: Creations of the mind, including inventions, artistic works, and software.
  • Types of IPR:
    • Copyright: Protects books, music, software, etc.
    • Patent: Protects inventions.
    • Trademark: Protects brand names and logos.
    • Trade Secret: Confidential business information.
  • Importance: Encourages innovation and protects creators' rights.

8.7 Concept of Digital Signature

  • Digital Signature: Electronic authentication method that ensures:
    • Authenticity: Confirms sender’s identity.
    • Integrity: Ensures data is unchanged.
    • Non-repudiation: Prevents denial of sending a document.
  • Uses: Secure transactions, online contracts, e-governance.

8.8 Concept of Cyber Law in Nepal

  • Cyber Law: Legal regulations related to cyber activities.
  • Key Aspects of Nepal’s Cyber Law:
    • Electronic Transactions Act (ETA) 2063 (2006):
      • Recognizes digital signatures.
      • Penalizes hacking, data theft, and online fraud.
      • Defines punishment for cybercrime offenses.

8.9 ICT Policy in Nepal

  • ICT Policy: Government framework for promoting information and communication technology.
  • Key Objectives:
    • Develop digital infrastructure.
    • Promote e-governance and digital literacy.
    • Strengthen cybersecurity measures.
    • Encourage innovation and digital entrepreneurship.

No comments:

Post a Comment