IT Act 2000 || Cyber Security || Cyber Security Course || roottechy

The information technology act 2000 is described or mention the term cyber crime. It can be globally considered as the gloomier face of Technology. The only difference between the traditional crime and a cyber crime is that cyber crime involves in crime related to computer.

it act 2000, cyber security, Cyber Security Course

IT Act 2000 By Indian Government 
9th June | Cyber Security
Some notification under the following points :

Traditional theft :
A thief brakes into Ram's house and steel an object kept in the house.

Hacking :
A cyber criminal or hacker sitting in his own house through his computer and hacks the computer of Ram and steals the data saved in Rams computer without physically touching the computer or entering in Rams house.

The Government of India enacted the information technology act with the some major objectives which are as follows :

To deliver lawful recognition for transactions through electronic data interchange and other means of electronic communication commonly referred to as Electronic Commerce or E-commerce.
The aim was to use replacement of paper based methods of communication and storage of information.

Cyberspace can be defined as an intricate in environment that involves interaction between people, software and services. It is maintained by the worldwide distribution of Information and Communication Technology devices and networks.

With the benefits carried by the technological advancement the cyberspace today has become a common pool used by citizens, business, critical information infrastructure military and government in fashion that makes it hard to induce clear boundaries among these different groups.

The cyberspace is anticipated to become even more Complex in upcoming years with increase in networks and devices connected to it.

Cyber Security denotes the Technologies and procedure intended to safeguard computer network  and data from unlawful admittance, weaknesses, and attacks transported through the internet by cyber delinquent.

To cyber security standard that deliver a model for creating, applying, functioning, monitoring, reviewing, preserving and improving an information security management system.

The purpose of this government body is to protect the public and private infrastructure from cyber attacks.

The cyber security policy is developing mission that caters to the the entire field of Information and Communication Technology (ICT) uses and providers.


 If You Follow The LAW,
The LAW Would Follow You


 This Included: it act 2000, cyber security, Cyber Security Course