.
Information Security
Information security, sometimes shortened too InfoSec, is the practice of protecting information by reducing information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized inappropriate access to data, or the unlawful use, disclosure, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.
Legal issues in Information Security
- It is true that any business operates in a legal environment.
- Liability, copyright, jurisdiction etc. are some of the legal issues related to information security.
Issues of copyright and trademarks
- Internet Copyright and trademark violation fall under intellectual property law.
- Intellectual property includes software, music, videos, books, trademarks, copyright and web pages.
- Copyright is ownership of an original work created by the author.
- Trademark represents a symbol or picture that identifies the product or service is intellectual property.
Issue of jurisdiction
- Jurisdiction is the official power to make legal decisions and judgements.
- The internet is beyond geographic borders, there are no laws or border on the internet.
- Different countries have a different legal system, criminal laws and consumer protection laws which makes e-commerce business difficult to run business over the internet.
Cyber Crime
- Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network.
- It is criminal activity that either targets or uses a computer, a computer network or a networked device.
- In this, computer is the object of the crime or is used as a tool to commit an offense.
- The illegal activities such as committing fraud, harassment, abuse, stealing identities and intellectual property, or violating privacy etc. are the example of cyber-crime.
- Cybercrime may threaten a person, company or a nation's security and financial health.
- A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device.
- Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
- Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money.
- Cybercrime can also be carried out by individuals or organizations.
- Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others might be novice hackers.
- Rarely, cybercrime aims to damage computers for reasons other than profit. These could be political or personal.
Types of cyber crime
Hacking
- It is an illegal practice by which a hacker breaches the computer’s security system of someone for personal interest.
Unwarranted mass-surveillance
- Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime.
Child grooming
- It is the practice of establishing an emotional connection with a child especially for the purpose of child-trafficking and child prostitution.
Copyright infringement
- If someone infringes someone’s protected copyright without permission and publishes that with his own name, is known as copyright infringement.
Money laundering
- Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system.
Cyber-extortion
- When a hacker hacks someone’s email server, or computer system and demands money to reinstate the system, it is known as cyber-extortion.
Cyber-terrorism
- Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber-terrorism.
Online Scams
- These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” and when clicked on can cause malware to interfere and compromise information.
Comments
Post a Comment