Professional Documents
Culture Documents
UNIT-VI-Security and Law-Internet Gov and E-Mail Policy
UNIT-VI-Security and Law-Internet Gov and E-Mail Policy
Section 43
According this IT Act, if a person without the permission of the person in charge of
the computer system, accesses, downloads any data, introduces virus or causes denial of
access, will be liable for a penalty of up to rupees 10 million.
1. Vulnerability Assessment
Network and information security assessment services review all aspects of the data
and voice networks and provide recommendations to maximize security, reliability and
INTERNET GOVERNANCE
Governance of Internet can be categorized into four major areas.
1. The Infrastructure and Standardization
2. Legal
3. Economic
4. Development
1. The Infrastructure and Standardization: Standardization of the infrastructure at the
hardware level as well as at the software level is needed to enable the heterogeneous
technologies to work together. Telecommunication infrastructure, technical standards and
services (Internet Infrastructure), Transport Control Protocol/Internet Protocol (TCP/IP),
Root Server, Internet Service Providers (ISP), Internet Bandwidth Provider (IBP), Web
standards, Internet Security, encryption, spam.
2. Legal: Legal aspects involve issues such as legislation, social norms (customs), self-
regulation, jurisprudence, international regulation, jurisdiction, arbitration, trademark,
copyright, patents, cyber crimes, digital signature, privacy rights, data protection, and
Intellectual Property Rights (IPR).
3. Economic: Economic issues relate to e-commerce applications and are such as consumer
protection, taxation, customs, e-payment, e-banking, and e-money.
4. Development: [The Internet has grown for a long time without too much regulation.]
Defining protocols and standards had been for a long time the most developed regulatory
activity. [But as soon as business took its place the requirements changed.]
===*===
Why Securing e-Governance?
As India adopts e-governance with revenge, the need for Network and Information
security measures to protect vital data will be a major part of e-governance framework. The
security issue is to be addressed in the design of such framework. An e-governance project
Figure: The path of an e-mail message. The mail transfer program on the sender's computer
becomes a client of the remote mail server.
===*===
Internet Mail Protocols
Internet e-mail is based on standards known as mail protocols. Some of these
standards (mail Protocols) are:
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)
Internet Message Access Protocol (IMAP)
Multipurpose Internet Mail Extensions (MIME)
The SMTP specifies how messages are sent on the Internet. POP and IMAP define
how mail clients can access messages on a mail server, and the MIME standard lets the mail
Figure 10.3: The path of e-mail when POP is used to access a mailbox.
From the figure, a computer that has a mailbox must run two servers. A conventional
mail server accepts incoming e-mail and stores it in the appropriate mailbox. The mail can
arrive either directly from the original sender or from a mail gateway. A POP server allows a
user on a remote machine to access the mailbox.
If user relies on dial up telephone connection, the modem can be attached to his
computer. To receive e-mail, the user forms a dialup connection either to the mailbox
computer or to some other computer on the Internet. Once the user connects to a computer on
the Internet, the user can run a POP client to contact the server and access e-mail.
===*===
Difference between E-mail Server (POP) and SMTP Server:
E-mail Server (POP) SMTP Server
1 POP server uses the POP protocol It uses the SMTP protocol
2 The POP server only allows a user to It accepts a message from an arbitrary sender
access the mailbox after the user enters
authentication information (e.g.,
password) messages