Skip to main content

🎓 New resources added daily! Join over 50,000 students using Padandas

Course Advertisement
Educational Resources Ad

Information security and cyber law NEB : Class 11 Computer Science NEB Notes


Subject

Information security and cyber law NEB : Class 11 Computer Science NEB Notes

Learn Information security and cyber law in Computer Science with comprehensive educational content from Padandas.

Mar 25, 2026
12,299

Information security and cyber law NEB  : Class 11 Computer Science NEB Notes

Documents 1 document

Information Security and Cyber Law Handwritten PDF by Aasis : Computer Science Class 11 NEB Notes

Padandas EDU • Notes

Chapter: 8 Information security & cyber law

# Digital society:

A modern, progressive society that is formed as a result of the adoption and integration of information and communication technologies (ICT) at home, work, education and recreation and supported by advanced telecommunications and wireless connectivity systems and solutions.

# Computer ethics:

Computer ethics is a set of commonly agreed principles that govern the use of computers.

The most common computer ethics are as follows:

  • Respect the privacy of others.
  • Respect the integrity of the computing systems.
  • Always identify the user actually.
  • Respect copyrights & licenses.
  • Respect the intellectual property of others.
  • Exhibit responsible, sensible use of computer hardware, software & data.

# Computer virus:

A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself.

→ Software or malware:

It is a kind of program that designed to harm your devices in any way. Computer virus is a type of malware. Other types of malware include spyware, rootkits, and worms. Once your device is infected with malware, it will disrupt your computer in various ways depending on its type. Some malware are:

→ Spyware:

Spyware is a program that has been used to spy or track your activity on your device. It can gather confidential information, such as passwords & bank account information, and send it another entire account without your consent.

→ Rootkits:

Rootkit is a collection of computer programs that may unauthorized control your device from the root or admin level, hence the term ‘rootkit’.

→ Worm:

Worm is similar to a virus. The only difference is worm is a standalone software that does not need a host.

→ Spamming:

Spam is defined as unwanted & unsolicited message sent to an enormous list of recipients. Spam may or may not be malware. Spam can turn into Malware when it contains a malicious program that accesses your device when you open the email attachments or links.

– Causes of viruses

  1. Visiting an infected websites.
  2. Opening spam email or email attachments.
  3. Downloading free games, toolbars, media players and other system utilities.
  4. Sharing music, files or photos with other users.

– Safety measures for computer viruses

  1. Use antivirus software.
  2. Do not use pirated software.
  3. Scan the mail & the unknown file of the Internet before using it.
  4. Do not use infected removable storage devices like pendrive, optical disk, memory card, etc.
  5. Use the user password system to avoid unauthorized use of computer.

→ Cyber crime:

Cyber crime is a crime committed by people through the use of computer & internet.

– Some effects of computer crime:

  1. Physical theft of computer & the other equipment.
  2. Altering the original webpage.
  3. The privacy of computer can be lost due to unauthorized access.
  4. New type of computer crime can attack software or programmes.

– Different safety measures from computer crime:

  1. Use latest antivirus software.
  2. Use password system in your computer.
  3. Back up your computer regularly.
  4. Protect your computer from power related problems.

→ Cyber law:

The laws or rules formed & adapted by government or organization to control computer crime that are preferred by the people.

* Why cyber law is necessary?

Cyber law is necessary due to following reasons:

  1. To reduce cyber crime.
  2. To solve the problems related with e-business.
  3. To legalize electronic transaction.
  4. To take advantages of globalization due to context of cyber space of it’s department.

## Cryptography:

It is the science for providing security to the information. It is the main component of modern security technologies use to protect information & resources on both open & closed network associated with converting plane text into cyber text & vice versa.

Cryptography not only protect data from theft but can also be used for authentication. The types of cryptography are:

1. Symmetric/private/secret cryptography:

Both sender & receiver shares a single key. The sender use this key to encrypt plane text & send the cipher text to the receiver on other side. The receiver applies the same key to decrypt the message & change into plain-text.

2. Public key cryptography:

This is the most revolutionary concept in cryptography. In public key cryptography two keys published & private keys are used. Public key made freely distributed while private key remain secret. The public key is used for encryption and private key is used for decryption.

* Differences bet. public key & private key

  Private key Public key
1. Same key is used for encryption & decryption. Their key must be secret. Different keys are used for encryption & decryption.
2. Encryption & decryption process is faster than public keys. Encryption & decryption process is slower than private key.
3. It cannot be used for systems to achieve confidently. It can also be used for digital signature or authentication system.
4. It is reliable when the no. of user involves less communication or few communication. It is also reliable when the no. of user involves large communication.
5. Eg: transposition cipher. Eg: RSA algorithm.

→ Digital signature:

A digital signature is the digital identity of sender that uniquely identified the particular sender electrically OR Digital signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery.

→ Intellectual property law:

It refers to work created by inventors, authors & artists. Such as ideas, inventions, literary creations, business model, computer program codes & notes.

It deals with laws to protect & enforce right of the creators & owners of inventions, ideas, design, literary creations & other works.

→ ICT policy in Nepal

It is an umbrella technology term that converts all the technical media for processing & communicating information. The growth of information technology IT & telecommunication technology give birth to ICT policy. ICT policy could be implemented in many sectors ranging from business, education, health, public service delivery, public officials, business & citizens can work together to harness the transformative power of the ICT to move services more efficient & effective.

Objective

  1. Make IT accessible to the general public increase employment through it.
  2. Build a knowledge based society.
  3. Establish knowledge based industries.

About National Examinations Board

This content is part of Computer Science offered by National Examinations Board. This institution is committed to providing high-quality educational resources.

Frequently Asked Questions

This content is carefully structured to build understanding progressively, starting with fundamentals and advancing to more complex concepts.

Yes, once you have access, you can revisit this Information security and cyber law content as many times as you need.

Practice exercises and examples are integrated throughout the content to reinforce your understanding of Information security and cyber law.

Ready to Master Information security and cyber law NEB : Class 11 Computer Science NEB Notes?

Continue your learning journey in Class 11 Computer Science Notes - NEB Syllabus, Questions & Answers and explore more comprehensive educational content.