Advertisement
Guest User

LCSP Level 1 : Session 1

a guest
Mar 18th, 2019
151
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.19 KB | None | 0 0
  1. Lecture 1:
  2.  
  3. Introduction :
  4.  
  5. INFORMATION SECURITY
  6. ----------------------
  7.  
  8.  
  9.  
  10.  
  11.  
  12.  
  13.  
  14.  
  15.  
  16.  
  17.  
  18.  
  19.  
  20.  
  21.  
  22.  
  23. Data
  24. It is raw facts and figures. Data can be anything.
  25. Text
  26. Number
  27. Image
  28. Audio
  29. Video
  30. Data itself, a single piece of data never makes a sense.
  31.  
  32. Information : Processed data or collection of data is called to be an information.
  33.  
  34. Security : To protect and secure from leakage and breaches.
  35.  
  36. Information Security : Covering up all the security aspects related to Information Technology.
  37.  
  38.  
  39. What is CIA ?
  40.  
  41. Confidentiality : If Ansul sent a message to anyone message should be confidential in nature.
  42. Integrity : If A send a message to be message should not be tampered.
  43. Availability : Intended user can avail service eg. User of Flipcart should always be able to use flipkart.
  44.  
  45.  
  46.  
  47. TYPES OF INFORMATION
  48. ====================
  49.  
  50. 1. Confidentials INformation - Aadhar Cards, Passwords, Birth Certificates, PAN Cards etc.
  51. 2. Financial Information - Financial Statements, Bank Details, Login Credentials for banking poractices etc.
  52. 3. Health Information - Policies, Diseases etc.
  53. 4. Personal Information - Address, Phone Numbers, DOBs etc.
  54.  
  55. --------------------------------------------------------------
  56.  
  57. ETHICAL HACKING / CYBER SECURITY
  58. =================================
  59.  
  60.  
  61.  
  62.  
  63.  
  64.  
  65.  
  66.  
  67. Ethical - Means legal practices which should be performed.
  68.  
  69. Hacking - Hacking means accessing any data, information or any system with the permission of individual.
  70.  
  71. Hackers - Hackers are the most skilled and technical people who are profiecient in understanding the technical aspects.
  72.  
  73. --------------------------------------------------------------
  74.  
  75. TYPES OF HACKERS
  76. =================
  77.  
  78. 1. BLACK HAT HACKERS - They are really bad people, which brings chaos and destruction to the cyber society. They have only one thing in mind.... Money. Parents wala person, usually comes in newspaper Eg. Shadow Brokers
  79.  
  80. 2. WHITE HAT HACKERS -They are good people, who work for the welfare of the organisation. They work for the security only.. EG. Rahul Tyagi
  81.  
  82. 3. GREY HAT HACKERS - These are those hackers who hacks and gains resources for the sake of the society and culture.
  83. Eg. Anonymous, Edward Snowden etc.
  84.  
  85. ----------------------------------------------------------------------
  86.  
  87. Other Categories
  88. ================
  89.  
  90. 1. Script Kiddies - These are those people who steals the programs, ideas or any other method of hacking and perform hacks without any knoweledge.
  91.  
  92. 2. Noobz - These are the new born technical babies who just arrived in the field of cyber security, trying to learn something new in the world of cyber.
  93.  
  94. 3. Crackers - They are not the hackers but they are very very good at cracking the passwords. File passwords, Folder password, OS password, Email password.
  95.  
  96.  
  97. ----------------------------------------------------------------------
  98.  
  99.  
  100.  
  101. Ques: Why people hack or what is the main motive of the hackers or crackers to indulge into this field ?
  102.  
  103. 1.Hobby
  104. 2.Defame (Revenge)
  105. 3.Stealing information
  106. 4.Leaking information
  107. 5.Political motives
  108. 6.For SECURTIY REASONS i.e. securing digital space :)
  109.  
  110.  
  111.  
  112.  
  113.  
  114.  
  115.  
  116.  
  117.  
  118.  
  119. Cyber Terrorism
  120. =================
  121. Terrorist have found a new way for indulging into disruptive activities through digital space.
  122. Email conversation ---> telephonic conversation --> gaming platform.
  123.  
  124. https://duo.com/decipher/debunking-myths-do-terrorists-use-game-consoles-to-communicate-with-each-other
  125.  
  126. cyber terrorism means to damage information, computer systems and data that result in harm against non-combatant targets.
  127.  
  128. CASE 26/11 ---> NATGrid formation
  129.  
  130. ***___Cyber Laws___*
  131.  
  132. ** Section 43:
  133. Penalty and compensation for damage to computer and computer system.
  134.  
  135. ** Section 65:Tempering with computer source Documents.
  136. Changing and altering the documents which are available.
  137. Imprisonment upto 3 years and Fine upto 200,000 INR.
  138.  
  139. ** Section 66: Computer Related Offences.
  140.  
  141. SECTION 66 A - Punishment for sending offensive messages through communication service.
  142. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  143.  
  144. SECTION 66 B - Dishonestly receiving and retaining any stolen computer resource or communication device is also made punishable by amendment.
  145. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  146.  
  147. SECTION 66 C - Identity Theft (Driving license, adhar card etc)
  148. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  149.  
  150. SECTION 66 D - Cheating by false Personation by using computer resource or communication device. (telecallers)
  151. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  152.  
  153. SECTION 66 E - Violation of Privacy
  154. Imprisonment upto 3 years and Fine upto 200,000 INR or both.
  155.  
  156.  
  157. SECTION 66 F - Punishment to cyber terrorism
  158. Data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.
  159.  
  160. ** Section 67: Punishment for publishing or transmitting obscene material in electronic from.
  161.  
  162. ** Section 71: Penalty for misrepresentation.
  163. If you have uploaded your ID card, and given the wrong name and address,then again it is a crime.
  164. Imprisonment to Two years, or with fine of 1,00,000 INR, or with both.
  165.  
  166. ** Section 72: Breaching of Confidentiality and Privacy
  167. I have some personal stuff in my hard disk drive and on google drive, If someone any how gets the access of those files without my permission, Then again it is a crime.
  168. Right To Privacy.
  169. Imprisonment for Ten Years, or with fine, or with both.
  170.  
  171. ** Section 73:Penalty for publishing electronic signature certificate false in certain particular.Signature Forgery.
  172.  
  173. Imprisonment for upto two years, or with fine upto 1,00,000 INR, or with both.
  174.  
  175.  
  176. Helpful link : https://lucideustech.blogspot.com/2018/02/a-basic-guide-to-indian-it-amendment.html
  177.  
  178.  
  179. Anshul Pandey : 9915076930
  180.  
  181. Email Id : anshul.p@lucideustech.com
  182.  
  183. https://pastebin.com/WeZeMZDR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement