Chapter 8: Information Security and Cyber Law
Information Technology and its Social Impact
IT combines Information and Communication Technology to facilitate information flow globally. It impacts various fields like education, banking, healthcare, and industry. IT enables distant learning, quality control in production, and aids scientific research. However, it also brings challenges such as cybercrimes, data theft, and viruses, disrupting social peace and security.
Information Security:
IT security involves protecting networks from unauthorized access or malicious activities. It is essential for safeguarding data. Security objectives include:
- Confidentiality: Information is accessible only to authorized users.
- Integrity: Ensures data accuracy and prevents unauthorized tampering.
- Availability: Ensures information is accessible when required.
Cryptography:
Cryptography secures communication by converting readable data into unreadable format (encryption), which can only be returned to readable form (decryption) by authorized users.
- Encryption: Converting readable data into an unreadable format.
- Decryption: Returning unreadable data to a readable format by authorized users.
Digital Divide:
The Digital Divide refers to the gap between those with access to and knowledge of technology (computer-literate) and those without. This divide exists across urban vs. rural areas, education levels, and socioeconomic status. It has become a global issue with efforts to bridge this gap.
Computer or Cyber Ethics:
Cyber ethics involves a set of moral guidelines for computer professionals to prevent criminal activities. Some principles include:
- Do not steal or misuse others' data.
- Avoid spreading viruses or altering data.
- Do not use unauthorized software or access.
- Respect others' intellectual property and privacy.
Cyber Crime:
Cybercrime refers to illegal activities involving computers or the internet. Examples include:
- Stealing information or software piracy.
- Spreading viruses, hacking, or password guessing.
- Misusing electronic transactions.
- Cyberbullying or rude online comments.
Cyber Law:
Cyber Law governs the use of computers and the internet. It provides legal consequences for cybercrimes. In Nepal, the Electronic Transaction Ordinance, 2005 addresses crimes and enforces regulations related to:
- Digital signatures and intellectual property rights.
- Telecommunication, data protection, and privacy.
IT Policy of Nepal:
The IT Policy of Nepal aims to:
- Prioritize IT as a government sector.
- Promote knowledge-based industries and employment.
- Enhance public services through e-government.
- Increase international IT collaboration.
- Improve IT infrastructure, including the Government Integrated Data Center (GIDC).
- This condensed version captures the key concepts while maintaining the essential details.
Questions and Answers
1. What challenges are we facing to create digital society in the Nepalese context?
Nepal faces challenges like poor digital infrastructure, limited internet access in rural areas, lack of digital literacy, cybercrime risks, and insufficient government policies for digital transformation.
2. What is computer ethics? What are the commandments of computer ethics?
Computer ethics is the set of moral guidelines that govern the use of computers. The commandments include not using computers to harm others, steal, snoop, or spread false information. It also emphasizes respecting privacy, intellectual property, and others' work.
3. Discuss about the role of computer ethics in the formation of secure and reliable digital society.
Computer ethics promote responsible behavior among users, helping to prevent cybercrimes, protect privacy, and build a trustworthy digital environment for communication, commerce, and governance.
4. Explain the basic principles/components of information security.
The key components are Confidentiality (keeping data private), Integrity (ensuring data isn't altered), Availability (ensuring access to data), Authentication (verifying identity), and Non-repudiation (proof of action).
5. Define cyber law. What are the major fields of cyber law?
Cyber law is the legal framework that governs activities over digital platforms. Its major fields include cybercrime, digital signatures, data protection, intellectual property, and e-commerce regulations.
6. How do you know that your computer has been victim of malware attack?
Common signs include slow performance, pop-up ads, unknown programs running, unusual data usage, system crashes, or security software being disabled without your knowledge.
7. How can you protect you and your computer system from cybercrime?
Use strong passwords, install antivirus software, keep systems updated, avoid suspicious links, enable firewalls, and backup important data regularly.
8. What are the advantages and disadvantages of digital signature?
Advantages include authentication, integrity, time efficiency, and legal validity. Disadvantages include dependence on technology, cost, and the need for technical knowledge.
9. Explain various areas that are generally covered in cyber law.
Cyber law typically covers areas such as cybercrime, electronic transactions, data protection, privacy, intellectual property rights, and online fraud.
10. Explain cyber law in Nepal with major provisions included.
Cyber law in Nepal is governed by the Electronic Transaction Act 2063. It includes provisions for legal recognition of digital signatures, cybercrime punishments, e-commerce regulations, and establishment of a cyber tribunal.
11. List out the major objectives of ICT Policy 2072.
Major objectives include enhancing IT infrastructure, promoting digital literacy, expanding broadband access, supporting e-governance, increasing employment through IT, and encouraging public-private partnerships in ICT development.
12. Explain at least ten activities that are considered as cybercrime.
Cybercrimes include hacking, phishing, identity theft, cyberstalking, data breach, child pornography, spamming, online fraud, cyberbullying, and spreading malware.
13. What do you mean by malicious software? Explain any ten malicious software attack.
Malicious software (malware) refers to software designed to harm or exploit systems. Examples include virus, worm, trojan horse, spyware, adware, ransomware, rootkits, keyloggers, bots, and scareware.
14. Explain intellectual property along with its types in detail. What legal provisions we have in Nepal to preserve intellectual property rights?
Intellectual Property (IP) refers to creations of the mind protected by law. Types include Copyright (art, music), Patent (inventions), Trademark (brand names), and Trade Secrets (confidential info). In Nepal, the Copyright Act 2059 and the Patent, Design, and Trademark Act 2022 provide legal protections.
15. Explain digital signature along with its working mechanism.
A digital signature is an encrypted digital code that verifies the sender's identity and message integrity. It works using asymmetric cryptography: a private key to sign and a public key to verify.
16. Explain any ten policy included in ICT Policy 2072.
- Developing ICT infrastructure
- Promoting e-governance
- Expanding broadband
- Encouraging ICT education
- Ensuring cybersecurity
- Localizing content
- Establishing data centers
- Public-private partnerships
- Supporting research & innovation
- Promoting IT service exports