It is possible to describe cyberspace as an intricate environment involving interactions between people, software, and services. It maintains the worldwide distribution of devices and networks for information and communication technology.
Today, with the advantages of technological developments, cyberspace has become a popular pool used by people, businesses, critical information infrastructure, the military and governments in a way that makes it impossible for these various entities to establish clear boundaries. Cyberspace is expected to become much more difficult in the coming years, with the growth in connected networks and devices.
Cybersecurity refers to the technologies and procedures designed to secure computers, networks, and data from cyber criminals' unlawful entry, vulnerabilities, and attacks transported over the Internet.
ISO 27001 (ISO27001) is the international standard for cybersecurity that provides a model for the creation , implementation, function, monitoring , review, maintenance and improvement of an information security management system.
A plan outline called the National Cybersecurity Policy is issued by the Ministry of Communication and Information Technology under the government of India. The aim of this government body is to protect against cyber attacks on public and private infrastructure.
The cybersecurity policy is a growth task that caters to the entire area of users and providers of Information and Communication Technology (ICT).
It acts as an authority structure that describes and guides cyberspace security-related activities. It helps all sectors and organisations to fulfil their requirements in the design of appropriate cybersecurity policies. To effectively protect information, information systems and networks, the policy provides an outline.
It offers an understanding of the government's approach to cyber space security in the country and its strategy. It also describes several measures to enable collaborative work to safeguard information and information systems across the public and private sectors. Therefore, the objective of this policy is to establish a structure for cybersecurity, leading to comprehensive measures and programs aimed at increasing the security of cyberspace shipping.
The term Cyber Crime is not identified or mentioned in the Information Technology Act 2000 or in any legislation in the country. It can be viewed globally as the gloomier face of technology. The only difference between a conventional crime and a cyber crime is that a computer-related crime involves cyber-crime. Let us see the example below to better understand it.
Traditional Theft - A thief breaks into Ram 's house and steals an item kept in the house.
Hacking - A cyber criminal / hacker sitting in his own home, hacks Ram 's computer from his computer, steals the data stored in Ram 's computer without accessing the computer physically or entering Ram 's house.
The terms are described by the I.T. Act, 2000-
You need to know these laws to understand the definition of cyber crime. In a cyber crime, the object of the offence or target is either the computer or the data contained in the computer.
The prevailing and possible threats in the field of cybersecurity are among the most severe challenges of the 21st century. Threats come from all kinds of sources and are characterised by disruptive activities affecting individuals , businesses, national infrastructure, and governments alike.
The implications of these threats express a significant risk for the following -
It is easily possible to conceal malicious use of information technology. The origins or the identity of the criminal is hard to determine. It is not even an easy task to find out the motive for the disruption. Only from the goal, the impact, or other circumstantial evidence can the offenders of these activities be worked out. Threat actors can operate from virtually anywhere with considerable freedom.
The causes for disruption may be something like −
The origins of these threats are criminals, terrorists, and even the state itself. Different kinds of malicious instruments and approaches are used by criminals and hackers. Every day, with criminal activities taking new shapes, the risk of harmful behaviour propagates.
The lack of user knowledge of information security, which may be a basic school-going kid, a system administrator, a developer, or even a company's CEO, leads to a variety of cyber vulnerabilities.
The awareness policy describes the following measures and initiatives for user awareness, education and training purposes-
The Government of India has implemented the Information Technology Act with some of the following major objectives -
Consequently, the Information Technology Act of 2000 was enacted as Act No.21 of 2000. On June 9, 2000, the I. T. Act obtained the President 's approval and it became effective on October 17 , 2000. India became the 12th nation in the world to introduce a cyber law regime by adopting this Cyber Legislation.
Cybersecurity is the following task -
To create a cyberspace that is safe and robust for citizens, companies and the government.