SlideShare uma empresa Scribd logo
1 de 25
I
T

A
C
T
TECHNOLOGY –THE NEW AGE

 Technology is the mover of
  change, economies, governance
  and thought processes. Coming
  of technology has paved the way
  for growth of new vistas and
  horizons.
INTERNET



           Extranet


                         Internet
                        interface
   ENVIRONMENT




Supplier



                      The Business



                                     Customer
IT Act, 2000

 Enacted on 17th May
  2000- India is 12th
  nation in the world to
  adopt cyber laws
 IT Act is based on
  Model law on e-
  commerce adopted
  by UNCITRAL
Objectives of the IT Act

To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
   other means of electronic communication, commonly
   referred to as "electronic commerce“
 To facilitate electronic filing of documents with
   Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
   Act,1872, the Banker’s Books Evidence Act 1891,Reserve
   Bank of India Act ,1934
 Electronic document produced Electronic World
  by a computer. Stored in digital
  form, and cannot be perceived
  without using a computer
   It can be deleted, modified
     and rewritten without leaving
     a mark
   Integrity of an electronic
     document is “genetically”
     impossible to verify
   A copy is indistinguishable
     from the original
   It can’t be sealed in the
     traditional way, where the
     author affixes his signature
 The functions of identification,
  declaration, proof of electronic
  documents carried out using a
  digital signature based on
  cryptography.
Electronic Commerce
 EC transactions over the
  Internet include
   Formation of Contracts
   Delivery of Information
    and Services
   Delivery of Content
 Future of Electronic
  Commerce depends on
  “the trust that the
    transacting parties place
    in the security of the
    transmission and content
    of their communications”
AUTHENTICATION OF
ELECTRONIC RECORDS

 Any    subscriber may authenticate an
  electronic record
 Authentication by affixing his digital
  signature.
 Any person by the use of a public key of
  the subscriber can verify the electronic
  record.
Electronic World

 Digital signatures created and verified using
  cryptography
 Public key System based on Asymmetric keys
   An algorithm generates two different and related
    keys
     Public key
     Private Key
   Private key used to digitally sign.
   Public key used to verify.
Public Key Infrastructure

 Allow parties to have free access to the signer’s
  public key
 This assures that the public key corresponds to the
  signer’s private key
   Trust between parties as if they know one another
 Parties with no trading partner agreements,
  operating on open networks, need to have highest
  level of trust in one another
Section 3 Defines Digital
Signatures
 The authentication to be affected by use of
  asymmetric crypto system and hash function
 The private key and the public key are unique
  to the subscriber and constitute functioning
  key pair
 Verification of electronic record possible
Certificate based Key
         Management
         CA

                     CA A B
                                Operated by trusted-third
                                 party - CA
                                Provides Trading Partners
                                 Certificates
                                Notarises the relationship
User A               User B
                                 between a public key and
              CA A               its owner
                              CA B
Essential steps of the digital signature process
 STEP 1 The signatory is the authorized holder a unique
    cryptographic key pair;
   STEP 2 The signatory prepares a data message (for example, in the
    form of an electronic mail message) on a computer;
   STEP 3 The signatory prepares a “message digest”, using a secure
    hash algorithm. Digital signature creation uses a hash result derived
    from and unique to the signed message;
   STEP 4 The signatory encrypts the message digest with the private
    key. The private key is applied to the message digest text using a
    mathematical algorithm. The digital signature consists of the
    encrypted message digest,
   STEP 5 The signatory typically attaches or appends its digital
    signature to the message;
   STEP 6 The signatory sends the digital signature and the
    (unencrypted or encrypted) message to the relying party
    electronically;
Essential steps of the digital signature process
 STEP 7 The relying party uses the signatory’s public key to verify the
  signatory’s digital signature. Verification using the signatory’s public
  key provides a level of technical assurance that the message came
  exclusively from the signatory;
 STEP 8 The relying party also creates a “message digest” of the
  message, using the same secure hash algorithm;
 STEP 9 The relying party compares the two message digests. If they
  are the same, then the relying party knows that the message has not
  been altered after it was signed. Even if one bit in the message has
  been altered after the message has been digitally signed, the message
  digest created by the relying party will be different from the message
  digest created by the signatory;
 STEP 10 Where the certification process is resorted to, the relying
  party obtains a certificate from the certification service provider
  (including through the signatory or otherwise), which confirms the
  digital signature on the signatory’s message. The certificate contains
  the public key and name of the signatory (and possibly additional
  information), digitally signed by the certification service provider.
Regulations and controls
  Licensing Certifying Authorities (CAs) under section
   21 of the IT Act and exercising supervision over their
   activities.
  Certifying the public keys of the CAs, i.e. their
   Digital Signature Certificates more commonly
   known as Public Key Certificates (PKCs).
  Laying down the standards to be maintained by the
   CAs,
  Addressing the issues related to the licensing
   process
Civil Wrongs under IT Act
 Chapter IX of IT Act, Section 43
 Whoever without permission of owner of the computer
   Secures access (mere U/A access)
     Not necessarily through a network
   Downloads, copies, extracts any data
   Introduces or causes to be introduced any viruses or
    contaminant
   Damages or causes to be damaged any computer resource
     Destroy, alter, delete, add, modify or rearrange
     Change the format of a file
   Disrupts or causes disruption of any computer resource
     Preventing normal continuance of computer
Civil Wrongs under IT Act (Contd.)
 Denies or causes denial of access by any means
   Denial of service attacks
 Assists any person to do any thing above
   Rogue Websites, Search Engines, Insiders providing
    vulnerabilities
 Charges the services availed by a person to the account of
  another person by tampering or manipulating any
  computer resource
   Credit card frauds, Internet time thefts
 Liable to pay damages not exceeding Rs. One crore to the
  affected party
Data diddling: changing data prior or
during input into a computer
 Section 66 and 43(d) of the I.T. Act covers the offence of
  data diddling
 Penalty: Not exceeding Rs. 1 crore
  Case in point :
  NDMC Electricity Billing Fraud Case: A private
  contractor who was to deal with receipt and accounting
  of electricity bills by the NDMC, Delhi. Collection of
  money, computerized accounting, record maintenance
  and remittance in his bank who misappropriated huge
  amount of funds by manipulating data files to show less
  receipt and bank remittance.
TYPES OF CYBER CRIMES
   Cyber terrorism
   Cyber pornography
   Defamation
   Cyber stalking (section 509 IPC)         Crime against Government
   Sale of illegal articles-narcotics,
    weapons, wildlife
   Online gambling
   Intellectual Property crimes- software     Crime against persons
    piracy, copyright infringement,
    trademarks violations, theft of computer
    source code
   Email spoofing
                                               Crime against property
   Forgery
   Phising
   Credit card frauds
TYPES OF CYBER CRIMES




                          Cyber crimes



                                             Denial of
          Informatio    E-mail     Salami                Trojan
Hacking                                      Service
               n       bombing     attacks               attacks
                                              attacks
             Theft
Section 65: Source Code
 Most important asset of software companies
 “Computer Source Code" means the listing of
  programmes, computer commands, design
  and layout
 Ingredients
    Knowledge or intention
    Concealment, destruction, alteration
    computer source code required to be kept or
     maintained by law
 Punishment
    imprisonment up to three years and / or
    fine up to Rs. 2 lakh
Section 66: Hacking

• Ingredients
   – Intention or Knowledge to cause wrongful loss
     or damage to the public or any person
   – Destruction, deletion, alteration, diminishing
     value or utility or injuriously affecting
     information residing in a computer resource
• Punishment
   – imprisonment up to three years, and / or
   – fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
  Section 66 covers data theft aswell as data alteration
Sec. 67. Pornography
 Ingredients
    Publishing or transmitting or causing to be published
    in the electronic form,
    Obscene material
 Punishment
    On first conviction
     imprisonment of either description up to five years and
     fine up to Rs. 1 lakh
   On subsequent conviction
     imprisonment of either description up to ten years and
     fine up to Rs. 2 lakh
 Section covers
   Internet Service Providers,
   Search engines,
   Pornographic websites
 Cognizable, Non-Bailable
There are many causes that I am prepared to die
  for but no causes that I am prepared to kill for.

     -let us not kill somebody’s business by hacking

Truth does not pay homage to any society, ancient
   or modern. Society has to pay homage to Truth
                       or die.

Mais conteúdo relacionado

Mais procurados

Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000Leo Lukose
 
Digital signature
Digital signatureDigital signature
Digital signatureRenu Verma
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentationbrettlieberman
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01Damrongsak Kobtakul
 
Electronic Records and Signatures
Electronic Records and SignaturesElectronic Records and Signatures
Electronic Records and SignaturesClientSide
 

Mais procurados (20)

Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000
 
Digital signature
Digital signatureDigital signature
Digital signature
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
 
Electronic Records and Signatures
Electronic Records and SignaturesElectronic Records and Signatures
Electronic Records and Signatures
 

Semelhante a It act

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 

Semelhante a It act (20)

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Class it act
Class it actClass it act
Class it act
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Cyber
CyberCyber
Cyber
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 

Mais de Yogesh Thawait

Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstructionYogesh Thawait
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property lawYogesh Thawait
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightYogesh Thawait
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)Yogesh Thawait
 
Securties contract act
Securties contract actSecurties contract act
Securties contract actYogesh Thawait
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtelYogesh Thawait
 

Mais de Yogesh Thawait (13)

C.f
C.fC.f
C.f
 
Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstruction
 
Sebi
SebiSebi
Sebi
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property law
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers right
 
Idra,1951
Idra,1951Idra,1951
Idra,1951
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)
 
Consumer
ConsumerConsumer
Consumer
 
Competition act,2002
Competition act,2002Competition act,2002
Competition act,2002
 
Securties contract act
Securties contract actSecurties contract act
Securties contract act
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Mis 3
Mis 3Mis 3
Mis 3
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtel
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

It act

  • 2.
  • 3. TECHNOLOGY –THE NEW AGE  Technology is the mover of change, economies, governance and thought processes. Coming of technology has paved the way for growth of new vistas and horizons.
  • 4. INTERNET Extranet Internet interface ENVIRONMENT Supplier The Business Customer
  • 5. IT Act, 2000  Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws  IT Act is based on Model law on e- commerce adopted by UNCITRAL
  • 6. Objectives of the IT Act To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 7.  Electronic document produced Electronic World by a computer. Stored in digital form, and cannot be perceived without using a computer  It can be deleted, modified and rewritten without leaving a mark  Integrity of an electronic document is “genetically” impossible to verify  A copy is indistinguishable from the original  It can’t be sealed in the traditional way, where the author affixes his signature  The functions of identification, declaration, proof of electronic documents carried out using a digital signature based on cryptography.
  • 8. Electronic Commerce  EC transactions over the Internet include  Formation of Contracts  Delivery of Information and Services  Delivery of Content  Future of Electronic Commerce depends on “the trust that the transacting parties place in the security of the transmission and content of their communications”
  • 9. AUTHENTICATION OF ELECTRONIC RECORDS  Any subscriber may authenticate an electronic record  Authentication by affixing his digital signature.  Any person by the use of a public key of the subscriber can verify the electronic record.
  • 10. Electronic World  Digital signatures created and verified using cryptography  Public key System based on Asymmetric keys  An algorithm generates two different and related keys  Public key  Private Key  Private key used to digitally sign.  Public key used to verify.
  • 11. Public Key Infrastructure  Allow parties to have free access to the signer’s public key  This assures that the public key corresponds to the signer’s private key  Trust between parties as if they know one another  Parties with no trading partner agreements, operating on open networks, need to have highest level of trust in one another
  • 12. Section 3 Defines Digital Signatures  The authentication to be affected by use of asymmetric crypto system and hash function  The private key and the public key are unique to the subscriber and constitute functioning key pair  Verification of electronic record possible
  • 13. Certificate based Key Management CA CA A B  Operated by trusted-third party - CA  Provides Trading Partners Certificates  Notarises the relationship User A User B between a public key and CA A its owner CA B
  • 14. Essential steps of the digital signature process  STEP 1 The signatory is the authorized holder a unique cryptographic key pair;  STEP 2 The signatory prepares a data message (for example, in the form of an electronic mail message) on a computer;  STEP 3 The signatory prepares a “message digest”, using a secure hash algorithm. Digital signature creation uses a hash result derived from and unique to the signed message;  STEP 4 The signatory encrypts the message digest with the private key. The private key is applied to the message digest text using a mathematical algorithm. The digital signature consists of the encrypted message digest,  STEP 5 The signatory typically attaches or appends its digital signature to the message;  STEP 6 The signatory sends the digital signature and the (unencrypted or encrypted) message to the relying party electronically;
  • 15. Essential steps of the digital signature process  STEP 7 The relying party uses the signatory’s public key to verify the signatory’s digital signature. Verification using the signatory’s public key provides a level of technical assurance that the message came exclusively from the signatory;  STEP 8 The relying party also creates a “message digest” of the message, using the same secure hash algorithm;  STEP 9 The relying party compares the two message digests. If they are the same, then the relying party knows that the message has not been altered after it was signed. Even if one bit in the message has been altered after the message has been digitally signed, the message digest created by the relying party will be different from the message digest created by the signatory;  STEP 10 Where the certification process is resorted to, the relying party obtains a certificate from the certification service provider (including through the signatory or otherwise), which confirms the digital signature on the signatory’s message. The certificate contains the public key and name of the signatory (and possibly additional information), digitally signed by the certification service provider.
  • 16. Regulations and controls  Licensing Certifying Authorities (CAs) under section 21 of the IT Act and exercising supervision over their activities.  Certifying the public keys of the CAs, i.e. their Digital Signature Certificates more commonly known as Public Key Certificates (PKCs).  Laying down the standards to be maintained by the CAs,  Addressing the issues related to the licensing process
  • 17. Civil Wrongs under IT Act  Chapter IX of IT Act, Section 43  Whoever without permission of owner of the computer  Secures access (mere U/A access)  Not necessarily through a network  Downloads, copies, extracts any data  Introduces or causes to be introduced any viruses or contaminant  Damages or causes to be damaged any computer resource  Destroy, alter, delete, add, modify or rearrange  Change the format of a file  Disrupts or causes disruption of any computer resource  Preventing normal continuance of computer
  • 18. Civil Wrongs under IT Act (Contd.)  Denies or causes denial of access by any means  Denial of service attacks  Assists any person to do any thing above  Rogue Websites, Search Engines, Insiders providing vulnerabilities  Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource  Credit card frauds, Internet time thefts  Liable to pay damages not exceeding Rs. One crore to the affected party
  • 19. Data diddling: changing data prior or during input into a computer  Section 66 and 43(d) of the I.T. Act covers the offence of data diddling  Penalty: Not exceeding Rs. 1 crore Case in point : NDMC Electricity Billing Fraud Case: A private contractor who was to deal with receipt and accounting of electricity bills by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance.
  • 20. TYPES OF CYBER CRIMES  Cyber terrorism  Cyber pornography  Defamation  Cyber stalking (section 509 IPC) Crime against Government  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software Crime against persons piracy, copyright infringement, trademarks violations, theft of computer source code  Email spoofing Crime against property  Forgery  Phising  Credit card frauds
  • 21. TYPES OF CYBER CRIMES Cyber crimes Denial of Informatio E-mail Salami Trojan Hacking Service n bombing attacks attacks attacks Theft
  • 22. Section 65: Source Code  Most important asset of software companies  “Computer Source Code" means the listing of programmes, computer commands, design and layout  Ingredients  Knowledge or intention  Concealment, destruction, alteration  computer source code required to be kept or maintained by law  Punishment  imprisonment up to three years and / or  fine up to Rs. 2 lakh
  • 23. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration
  • 24. Sec. 67. Pornography  Ingredients  Publishing or transmitting or causing to be published  in the electronic form,  Obscene material  Punishment  On first conviction  imprisonment of either description up to five years and  fine up to Rs. 1 lakh  On subsequent conviction  imprisonment of either description up to ten years and  fine up to Rs. 2 lakh  Section covers  Internet Service Providers,  Search engines,  Pornographic websites  Cognizable, Non-Bailable
  • 25. There are many causes that I am prepared to die for but no causes that I am prepared to kill for. -let us not kill somebody’s business by hacking Truth does not pay homage to any society, ancient or modern. Society has to pay homage to Truth or die.