000 03377nam a22002417a 4500
003 OSt
005 20250425113115.0
008 250424b |||||||| |||| 00| 0 eng d
020 _a9789351194736
040 _cAIMIT LIBRARY
082 _21st
_a005.8
_bTRIS
100 _aTripathi, Surya Prakash.
_9208775
245 _aIntroduction to information security and cyber laws /
_cBy Surya Prakash Tripathi ...[et.al.].
250 _a1st ed.
260 _aNew Delhi :
_bDreamtech Press ,
_c2024.
300 _axii,212 p.;
_bPB
_c24.5 cm.
500 _aThe rapid growth of Information and Communication Technology (ICT) has raised the bar for the security requirements also. Lots of data is received, stored, processed, and transmitted. Therefore, its security is extremely important. The Information Security and Cyber Law book helps you to understand the major aspects of information security, including information assurance, cybercrime, threats to the security of information systems, risk assessment and countermeasures. This book covers details about the ways in which you can mitigate risks and overcome the issues that may cause harms to an information system’s security. The book also provides you knowledge of various laws, such as patent law and copy right law, which have been constituted in the field of information security.
505 _a Contents : Chapter 1: Introduction to Information Systems and Security 1.1 Information Systems 1.2 Types of IS 1.3 Development of IS 1.4 Introduction to Information Security 1.5 Need for Information Security 1.6 Threats to Information Systems 1.7 Information Assurance 1.8 Cyber Security Chapter 2: Introduction to Application Security and Counter Measures 2.1 Introduction to Application Security 2.2 Data Security Considerations 2.3 Security Technologies 2.4 Security Threats 2.5 Security Threats to E-Commerce 2.6 E-Cash and Electronic Payment System 2.7 Credit/Debit/Smart Cards 2.8 Digital Signature 2.9 Cryptography and Encryption Chapter 3: Introduction to Security Measures 3.1 Secure Information System Development 3.2 Application Development Security 3.3 Information Security Governance and Risk Management 3.4 Security Architecture and Design 3.5 Security Issues in Hardware, Data Storage, and Downloadable Devices 3.6 Physical Security of IT Assets 3.7 Backup Security Measures Chapter 4: Introduction to Security Policies and Cyber Laws 4.1 Need for an Information Security Policy 4.2 Information Security Standards - ISO 4.3 Introducing Various Security Policies and Their Review Process 4.4 Introduction to Indian Cyber Law 4.5 Objective and Scope of the IT Act, 2000 4.6 Intellectual Property Issues 4.7 Overview of Intellectual-Property- Related Legislation in India 4.8 Patent 4.9 Copyright 4.10 Law Related to Semiconductor Layout and Design 4.11 Software License
_rPraveen Kumar Shukla is member of Senior Lecturer & Head of Department at Department of Information Technology in Babu Banarasi Das Northern India Institute of Technology
650 _aIntroduction to application security and counter measures
_9208776
650 _aIntroduction to security policies and cyber laws
_9208777
650 _aIntroduction to security measures
_9208778
942 _2ddc
_cBK
_e1st
_k005.8 TRIS
999 _c234229
_d234229