Hy ,
Information Technology Act, 2000
(i) The act regulates use of computers, computer systems, computer networks and also data and information in electronic format.
(ii) The act lists down among other things, following as offences:
Tampering with computer source documents.
Hacking with computer system
Act of cyber terrorism i.e. accessing a protected system with the intention of threatening the unity, integrity, sovereignty or security of country.
Cheating using computer resource etc.
Strategies under National Cyber Policy, 2013
Creating a secure cyber ecosystem.
Creating mechanisms for security threats and responses to the same through national systems and processes.
National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.
Securing e-governance by implementing global best practices, and wider use of Public Key Infrastructure.
Protection and resilience of critical information infrastructure with the National Critical Information Infrastructure Protection Centre (NCIIPC) operating as the nodal agency.
Hopes this helps.
Wish you luck
College Comparison based on Courses, Placement, Rank, Fee
Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile