Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Internal 2 CS

1. What are the challenges to Indian Law and cybercrime scenario in India? (unit 3)
1. **Definition of Cybercrime**: The Indian law doesn't explicitly define the term
"cybercrime" but addresses it within Chapter XI of the Indian ITA 2000. Instead of using the
term "cybercrime," the law outlines various offenses related to computer and electronic
systems, including tampering with computer source code, unauthorized access, publication of
lascivious information, failure to decrypt information in certain situations, breach of
confidentiality and privacy, misrepresentation, and publication of false digital signature
certificates.

2. **Challenges with Legal Framework**: There are shortcomings in the legal system
regarding cybercrimes in India. Many cybercrimes go unreported due to fear of harassment or
lack of awareness among the population. Additionally, law enforcement agencies often lack
the necessary training and resources to effectively combat cybercrimes. There's a call for
dedicated cybercrime courts, improved training for law enforcement, and better enforcement
of existing laws.

3. **Need for Improvement**: It's emphasized that enacting laws alone isn't sufficient;
effective enforcement is crucial. Law enforcement agencies need to be better equipped with
technical knowledge and resources to address cybercrimes. There's a need for continuous
training for judges, lawyers, and law enforcement personnel to keep up with evolving cyber
threats.

4. **Encouraging Reporting and Confidence**: People should be encouraged to report


cybercrimes without fear of harassment. Law enforcement agencies need to establish trust
with the public and adopt a tech-savvy and friendly image to encourage reporting.
Confidentiality of those reporting cybercrimes should be maintained to build trust.

5. **Debatable Effectiveness of Laws**: While Indian cyber laws address some cybercrimes,
they may not cover all emerging threats. Enforcement agencies face challenges due to the lack
of advanced forensic tools and resources. The effectiveness of the law depends on the
commitment and resources available for enforcement.

2. Discuss about the weak areas of the ITA 2000.


1. **Conflict of Jurisdiction**: The ITA 2000 doesn't specify which jurisdiction should
handle certain cybercrimes, potentially leading to confusion and overlapping enforcement.

2. **Domain Name Issues**: The law doesn't clarify ownership rights and responsibilities
regarding domain names, leaving a legal vacuum in this area.

3. **Intellectual Property Rights (IPR) Protection**: The ITA 2000 doesn't adequately
address the protection of intellectual property rights in the online sphere, such as copyrights,
trademarks, and patents, leaving loopholes for exploitation.

4. **Exhaustiveness of Cybercrime Offenses**: The law's provisions regarding cybercrimes


are limited and outdated, failing to encompass emerging cyber threats like cyberstalking,
cyber harassment, and cyberdefamation.
5. **E-Commerce Issues**: The ITA 2000 overlooks crucial aspects of e-commerce
regulation, including privacy protection and content regulation, which are essential for
maintaining a secure and trustworthy online marketplace.

6. **Regulation of Electronic Payments**: The law doesn't provide clear guidelines for
regulating electronic payments or include provisions for negotiable instruments, potentially
hindering the growth of e-commerce and causing uncertainty in financial sectors.

7. **Antitrust Issues**: Antitrust matters, which are significant in ensuring fair competition
in the digital sphere, are not addressed by the ITA 2000, leaving a gap in regulatory oversight.

8. **Implementation Concerns**: The ITA 2000 lacks clear directives for its implementation,
and the low level of internet penetration and limited computer literacy among law
enforcement officials further complicates its enforcement. Amendments to the law may be
necessary to address these implementation challenges effectively.

3. Discuss about social marketing: security risks and perils for organizations.
1. **Growing Significance of Social Media Marketing**: Social media marketing has
gained prominence in the industry, with platforms like Facebook, LinkedIn, Twitter,
YouTube, and MySpace being widely used by organizations for communication and
promotion.

1. Facebook is used by 37% of the organizations.

2. LinkedIn is used by 36% of the organizations.

3. Twitter is used by 36% of the organizations.

4. You Tube is used by 22% of the organizations.

5. MySpace is used by 6% of the organizations.

2. **Data Breach Offenses and Security Risks**: There's a rise in data breach incidents
globally, including in India, due to the widespread use of the internet. Cybercriminals exploit
various channels such as the web, email, instant messaging, and VoIP to launch sophisticated
attacks aimed at stealing sensitive information for financial gain.

3. **Evolution of Security Threats**: While phishing remains a significant threat, malicious


content is increasingly found on legitimate websites, making security attacks more data-
centric.

4. **Privacy Threats in Social Media Marketing**: The use of social media marketing
exposes organizations to privacy threats, including the potential exposure of sensitive
personal information (PI) and confidential business data if proper precautions aren't taken.

4. **Definition and Purpose of Social Media Marketing**: Social media marketing involves
using platforms like LinkedIn, Facebook, Orkut, MySpace, etc., to enhance visibility on the
internet and promote products and services. It's also valuable for building social and business
networks and exchanging ideas and knowledge.

5. a) Write the key challenges of emerging new information threats to organizations. assignment
b) Discuss about cost of cybercrimes and IPR issues: lessons for organizations.

6. Why should organizations have incident response systems?


7. a) Discuss about protecting people’s privacy in the organizations.
1. **Sensitive Nature of Personal Information (PI/SPI) **: People consider their Personally
Identifiable Information (PI) and Sensitive Personal Information (SPI) to be highly sensitive.
They are wary of being monitored in terms of their activities and movements, both online and
offline.

2. **Tracking Citizens and Monitoring Transactions**: The question of whether it will be


possible for India to track its citizens is raised, highlighting the controversial nature of
tracking and monitoring people's online transactions. While RFID technology has been
successful in tracking objects, using it to track humans is highly controversial due to privacy
concerns.

3. **Human Challenges in Privacy and Security**: Human resource areas present some of the
most complex challenges in information security and privacy protection. Insider threats,
driven by factors like greed, pose significant risks, including data theft.

4. **National Identification Systems**: The text compares the US Social Security Number
system with India's UID Project, which aims to create a multipurpose national identity card.
The UID Project, managed by the Unique Identification Authority of India (UIDAI), intends
to address various issues like electoral fraud, embezzlement, illegal immigration, and
terrorism.

5. **Challenges and Benefits of UID Project**: While the UID Project aims to streamline
identification processes and curb corruption, there are concerns about the centralization of
identity information and potential privacy breaches. Fragmented identity databases in India
have led to bribery, denial of services, and poverty, which the UID Project seeks to alleviate
by linking various identity documents to a single database.

b) Write examples of cybersecurity incidents and the ITIL perspectives.


8. Define public key certificate.
A public-key certificate is a digital document issued by one entity (usually a Certificate
Authority or CA) confirming that the public key and other information of another entity have
specific validity and authenticity.

A digital signature is an electronic mark used to ensure the integrity of data. When tied to the
identity of the signer using a security token like X.509 certificates, a digital signature can
provide non-repudiation, meaning the signer cannot deny signing the document.

An X.509 Certificate contains details about the certificate subject and the certificate issuer
(the CA). It is encoded using Abstract Syntax Notation One (ASN.1), a standard syntax for
describing network messages. The primary purpose of a certificate is to link an identity with a
public key value, thus enabling secure communication and authentication in digital
environments. A certificate includes:
1. X.509 version information;
2.a serial number that uniquely identifies the certificate;
3. a common name that identifies the subject;
4. the public key associated with the common name;
5.the name of the user who created the certificate, known as the subject name;
6. information about the certificate issuer;
7. signature of the issuer;
8. information about the algorithm used to sign the certificate;
9. some optional X.509 version 3 extensions. For example, an extension exists that
distinguishes between CA certificates and end-entity certificates.

9. List the type of insiders.


Insider threats in cyber security are threats posed by individuals from within an organisation,
such as current or former employees, contractors and partners. These individuals have the
potential to misuse access to networks and assets to wittingly or unwittingly disclose, modify
and delete sensitive information.
Insiders in cybersecurity can be categorized into several types based on their level of access,
motives, and behavior. Here are some common types of insiders:

1. **Malicious Insiders**: These individuals intentionally misuse their access privileges to


steal sensitive information, sabotage systems, or cause harm to the organization. Their
motives may include financial gain, revenge, or ideological reasons.

2. **Careless Insiders**: Careless insiders inadvertently compromise security through


negligent actions or oversight, such as falling victim to phishing scams, sharing passwords, or
mishandling sensitive data. While their intentions may not be malicious, their actions can still
result in security breaches.

3. **Compromised Insiders**: Compromised insiders are employees whose credentials or


access privileges have been compromised by external attackers. Attackers may use techniques
like phishing, social engineering, or malware to gain unauthorized access through
compromised accounts.

4. **Disgruntled Employees**: Disgruntled employees may pose a risk to cybersecurity if


they feel mistreated, undervalued, or dissatisfied with their job. Their actions may range from
leaking sensitive information to sabotaging systems out of resentment or revenge.

5. **Third-Party Insiders**: Third-party insiders include contractors, vendors, or business


partners who have access to the organization's systems or data. While they may not be directly
employed by the organization, they still pose a risk if their access is not properly managed or
monitored.

6. **Accidental Insiders**: Accidental insiders unintentionally cause security incidents due to


errors or misunderstandings, such as misconfigurations, accidental data leaks, or unintended
exposures of sensitive information.

7. **Privileged Insiders**: Privileged insiders have elevated access privileges within the
organization, such as system administrators or IT personnel. While necessary for their roles,
these individuals pose a higher risk if their privileges are misused or compromised.

Understanding the different types of insiders allows organizations to implement appropriate


security controls, monitoring mechanisms, and employee awareness programs to mitigate
insider threats and safeguard against potential security breaches.

10. What is social computing?


Social computing is also known as "Web 2.0" - it empowers people to use Web-based public
products and services.
Social computing is much more than just individual networking and entertainment.
It helps thousands of people across the globe to support their work, health, learning, getting
entertained and citizenship tasks in a number of innovative ways.
In the modern era, we are "constantly connected," business is "24X7" - the business where
world never sleeps.
People carry anxieties in a competitive business world. In such a milieu, people and
organizations are appreciating the "power of social media."
Business is taken forward based on how connections are made through social networks. In
this process, a lot of information gets exchanged and some of that could be confidential,
Personally Identifiable Information (PI)/SPI, etc. This would be a gold mine for
the cybercriminals.
In a way, social computing is related to social media marketing because business leaders in
product development, marketing and sales view social computing as an integral part of the
evolving enterprise channel strategy.

11. What is Data privacy and data protection?


Data privacy refers to the right of individuals to control how their personal information is
collected, used, shared, and stored by organizations and entities. It encompasses the rules,
policies, and practices that govern the handling of personal data, ensuring that individuals'
privacy rights are respected and upheld. Data privacy concerns the protection of sensitive
information such as names, addresses, social security numbers, financial records, health
information, and any other data that can be used to identify an individual.

Data protection, on the other hand, refers to the measures and mechanisms put in place to
safeguard personal data from unauthorized access, misuse, alteration, destruction, or
disclosure. Data protection involves implementing security controls, encryption, access
controls, data minimization, and other technical and organizational measures to mitigate the
risks associated with data breaches and unauthorized access to personal information.

In summary, while data privacy focuses on the rights of individuals regarding their personal
data, data protection is about implementing safeguards and security measures to ensure that
personal data is kept safe and secure from unauthorized access or misuse. Both concepts are
essential components of modern data management practices and are often regulated by laws
and regulations to ensure compliance and accountability.

12. Discuss about the positive aspects of the ITA 2000.


1. **Recognition of Electronic Communication**: The ITA 2000 brought significant progress
by legally recognizing electronic formats, including emails, as valid forms of communication
and evidence in courts, thereby modernizing the legal framework.

2. **Facilitation of E-Commerce**: The enactment of the ITA 2000 provided a legal


infrastructure for the corporate sector to engage in E-Commerce, overcoming previous
barriers that hindered the growth of online commercial transactions in India.

3. **Legal Validity of Digital Signatures**: Companies can now use digital signatures for
online transactions, as the ITA 2000 grants legal validity and sanction to such digital
signatures, facilitating secure and legally binding electronic transactions.

4. **Statutory Remedy for Data Breaches**: Under the ITA 2000, corporations have recourse
if their computer systems or networks are breached, leading to damages or data theft. The law
provides for monetary remedies, allowing companies to seek compensation not exceeding a
specified limit.

5. **Definition and Redress of Cybercrimes**: The ITA 2000 defines various cybercrimes,
offering legal redress for issues that were previously unaddressed. Corporate entities now
have legal avenues to pursue in cases of cybercrime, enhancing overall cybersecurity
measures and accountability.

In summary, the ITA 2000 represents a significant step forward in modernizing India's legal
framework to accommodate the growing digital landscape, facilitate electronic transactions,
and address cybercrimes, thereby promoting a more secure and legally compliant
environment for businesses and individuals alike.

13. Define cyber terrorism.


Cyber terrorists are individuals or groups who use technology, particularly the internet and
computer systems, to carry out acts of terrorism, such as launching cyber-attacks, spreading
propaganda, or disrupting critical infrastructure, with the intent to cause fear, chaos, or harm
to society or governments.
Cyber terrorists employ various techniques, including hacking, malware distribution, denial-
of-service attacks, and social engineering, to target digital systems, networks, and information
infrastructure. Their objectives typically involve disrupting government operations, causing
financial harm to businesses, instilling fear among the public, or advancing ideological or
political agendas.

These individuals or groups may operate independently or as part of larger terrorist


organizations. Their actions can result in significant economic losses, compromise of
sensitive data, disruption of essential services, and even loss of life in extreme cases.

14. What are high priority incidents?


High-priority incidents refer to incidents that pose significant risks or threats to an
organization's operations, assets, or reputation. These incidents typically require immediate
attention and response to mitigate their impact and prevent further harm. High-priority
incidents can vary depending on the nature of the organization, its industry, and its specific
risk profile, but some common examples include:

1. Data breaches: Unauthorized access or exposure of sensitive or confidential information,


such as customer data, intellectual property, or financial records.

2. Cyber attacks: Malicious activities aimed at disrupting systems, stealing data, or causing
damage to IT infrastructure, including ransomware attacks, distributed denial-of-service
(DDoS) attacks, and phishing campaigns.

3. Network intrusions: Unauthorized access to computer networks or systems, potentially


leading to data theft, sabotage, or espionage.

4. System outages: Unexpected disruptions or failures in critical systems or services,


impacting business operations, customer service, or revenue generation.

5. Compliance violations: Breaches of legal or regulatory requirements, such as data


protection laws, industry standards, or contractual obligations, which can result in fines, legal
action, or reputational damage.

6. Physical security incidents: Security breaches, thefts, vandalism, or other incidents


affecting physical assets, facilities, or personnel.

Organizations typically establish incident response processes and protocols to identify,


prioritize, and address high-priority incidents promptly and effectively. This may involve
activating incident response teams, implementing containment measures, conducting forensic
investigations, notifying stakeholders, and implementing remediation measures to prevent
future incidents. The goal is to minimize the impact of high-priority incidents and restore
normal operations as quickly as possible.

You might also like