SlideShare ist ein Scribd-Unternehmen logo
1 von 25
I
T

A
C
T
TECHNOLOGY –THE NEW AGE

 Technology is the mover of
  change, economies, governance
  and thought processes. Coming
  of technology has paved the way
  for growth of new vistas and
  horizons.
INTERNET



           Extranet


                         Internet
                        interface
   ENVIRONMENT




Supplier



                      The Business



                                     Customer
IT Act, 2000

 Enacted on 17th May
  2000- India is 12th
  nation in the world to
  adopt cyber laws
 IT Act is based on
  Model law on e-
  commerce adopted
  by UNCITRAL
Objectives of the IT Act

To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and
   other means of electronic communication, commonly
   referred to as "electronic commerce“
 To facilitate electronic filing of documents with
   Government agencies and E-Payments
 To amend the Indian Penal Code, Indian Evidence
   Act,1872, the Banker’s Books Evidence Act 1891,Reserve
   Bank of India Act ,1934
 Electronic document produced Electronic World
  by a computer. Stored in digital
  form, and cannot be perceived
  without using a computer
   It can be deleted, modified
     and rewritten without leaving
     a mark
   Integrity of an electronic
     document is “genetically”
     impossible to verify
   A copy is indistinguishable
     from the original
   It can’t be sealed in the
     traditional way, where the
     author affixes his signature
 The functions of identification,
  declaration, proof of electronic
  documents carried out using a
  digital signature based on
  cryptography.
Electronic Commerce
 EC transactions over the
  Internet include
   Formation of Contracts
   Delivery of Information
    and Services
   Delivery of Content
 Future of Electronic
  Commerce depends on
  “the trust that the
    transacting parties place
    in the security of the
    transmission and content
    of their communications”
AUTHENTICATION OF
ELECTRONIC RECORDS

 Any    subscriber may authenticate an
  electronic record
 Authentication by affixing his digital
  signature.
 Any person by the use of a public key of
  the subscriber can verify the electronic
  record.
Electronic World

 Digital signatures created and verified using
  cryptography
 Public key System based on Asymmetric keys
   An algorithm generates two different and related
    keys
     Public key
     Private Key
   Private key used to digitally sign.
   Public key used to verify.
Public Key Infrastructure

 Allow parties to have free access to the signer’s
  public key
 This assures that the public key corresponds to the
  signer’s private key
   Trust between parties as if they know one another
 Parties with no trading partner agreements,
  operating on open networks, need to have highest
  level of trust in one another
Section 3 Defines Digital
Signatures
 The authentication to be affected by use of
  asymmetric crypto system and hash function
 The private key and the public key are unique
  to the subscriber and constitute functioning
  key pair
 Verification of electronic record possible
Certificate based Key
         Management
         CA

                     CA A B
                                Operated by trusted-third
                                 party - CA
                                Provides Trading Partners
                                 Certificates
                                Notarises the relationship
User A               User B
                                 between a public key and
              CA A               its owner
                              CA B
Essential steps of the digital signature process
 STEP 1 The signatory is the authorized holder a unique
    cryptographic key pair;
   STEP 2 The signatory prepares a data message (for example, in the
    form of an electronic mail message) on a computer;
   STEP 3 The signatory prepares a “message digest”, using a secure
    hash algorithm. Digital signature creation uses a hash result derived
    from and unique to the signed message;
   STEP 4 The signatory encrypts the message digest with the private
    key. The private key is applied to the message digest text using a
    mathematical algorithm. The digital signature consists of the
    encrypted message digest,
   STEP 5 The signatory typically attaches or appends its digital
    signature to the message;
   STEP 6 The signatory sends the digital signature and the
    (unencrypted or encrypted) message to the relying party
    electronically;
Essential steps of the digital signature process
 STEP 7 The relying party uses the signatory’s public key to verify the
  signatory’s digital signature. Verification using the signatory’s public
  key provides a level of technical assurance that the message came
  exclusively from the signatory;
 STEP 8 The relying party also creates a “message digest” of the
  message, using the same secure hash algorithm;
 STEP 9 The relying party compares the two message digests. If they
  are the same, then the relying party knows that the message has not
  been altered after it was signed. Even if one bit in the message has
  been altered after the message has been digitally signed, the message
  digest created by the relying party will be different from the message
  digest created by the signatory;
 STEP 10 Where the certification process is resorted to, the relying
  party obtains a certificate from the certification service provider
  (including through the signatory or otherwise), which confirms the
  digital signature on the signatory’s message. The certificate contains
  the public key and name of the signatory (and possibly additional
  information), digitally signed by the certification service provider.
Regulations and controls
  Licensing Certifying Authorities (CAs) under section
   21 of the IT Act and exercising supervision over their
   activities.
  Certifying the public keys of the CAs, i.e. their
   Digital Signature Certificates more commonly
   known as Public Key Certificates (PKCs).
  Laying down the standards to be maintained by the
   CAs,
  Addressing the issues related to the licensing
   process
Civil Wrongs under IT Act
 Chapter IX of IT Act, Section 43
 Whoever without permission of owner of the computer
   Secures access (mere U/A access)
     Not necessarily through a network
   Downloads, copies, extracts any data
   Introduces or causes to be introduced any viruses or
    contaminant
   Damages or causes to be damaged any computer resource
     Destroy, alter, delete, add, modify or rearrange
     Change the format of a file
   Disrupts or causes disruption of any computer resource
     Preventing normal continuance of computer
Civil Wrongs under IT Act (Contd.)
 Denies or causes denial of access by any means
   Denial of service attacks
 Assists any person to do any thing above
   Rogue Websites, Search Engines, Insiders providing
    vulnerabilities
 Charges the services availed by a person to the account of
  another person by tampering or manipulating any
  computer resource
   Credit card frauds, Internet time thefts
 Liable to pay damages not exceeding Rs. One crore to the
  affected party
Data diddling: changing data prior or
during input into a computer
 Section 66 and 43(d) of the I.T. Act covers the offence of
  data diddling
 Penalty: Not exceeding Rs. 1 crore
  Case in point :
  NDMC Electricity Billing Fraud Case: A private
  contractor who was to deal with receipt and accounting
  of electricity bills by the NDMC, Delhi. Collection of
  money, computerized accounting, record maintenance
  and remittance in his bank who misappropriated huge
  amount of funds by manipulating data files to show less
  receipt and bank remittance.
TYPES OF CYBER CRIMES
   Cyber terrorism
   Cyber pornography
   Defamation
   Cyber stalking (section 509 IPC)         Crime against Government
   Sale of illegal articles-narcotics,
    weapons, wildlife
   Online gambling
   Intellectual Property crimes- software     Crime against persons
    piracy, copyright infringement,
    trademarks violations, theft of computer
    source code
   Email spoofing
                                               Crime against property
   Forgery
   Phising
   Credit card frauds
TYPES OF CYBER CRIMES




                          Cyber crimes



                                             Denial of
          Informatio    E-mail     Salami                Trojan
Hacking                                      Service
               n       bombing     attacks               attacks
                                              attacks
             Theft
Section 65: Source Code
 Most important asset of software companies
 “Computer Source Code" means the listing of
  programmes, computer commands, design
  and layout
 Ingredients
    Knowledge or intention
    Concealment, destruction, alteration
    computer source code required to be kept or
     maintained by law
 Punishment
    imprisonment up to three years and / or
    fine up to Rs. 2 lakh
Section 66: Hacking

• Ingredients
   – Intention or Knowledge to cause wrongful loss
     or damage to the public or any person
   – Destruction, deletion, alteration, diminishing
     value or utility or injuriously affecting
     information residing in a computer resource
• Punishment
   – imprisonment up to three years, and / or
   – fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
  Section 66 covers data theft aswell as data alteration
Sec. 67. Pornography
 Ingredients
    Publishing or transmitting or causing to be published
    in the electronic form,
    Obscene material
 Punishment
    On first conviction
     imprisonment of either description up to five years and
     fine up to Rs. 1 lakh
   On subsequent conviction
     imprisonment of either description up to ten years and
     fine up to Rs. 2 lakh
 Section covers
   Internet Service Providers,
   Search engines,
   Pornographic websites
 Cognizable, Non-Bailable
There are many causes that I am prepared to die
  for but no causes that I am prepared to kill for.

     -let us not kill somebody’s business by hacking

Truth does not pay homage to any society, ancient
   or modern. Society has to pay homage to Truth
                       or die.

Weitere ähnliche Inhalte

Was ist angesagt?

Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000Leo Lukose
 
Digital signature
Digital signatureDigital signature
Digital signatureRenu Verma
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentationbrettlieberman
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01Damrongsak Kobtakul
 
Electronic Records and Signatures
Electronic Records and SignaturesElectronic Records and Signatures
Electronic Records and SignaturesClientSide
 

Was ist angesagt? (20)

Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000
 
Digital signature
Digital signatureDigital signature
Digital signature
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
 
Electronic Records and Signatures
Electronic Records and SignaturesElectronic Records and Signatures
Electronic Records and Signatures
 

Ähnlich wie It act

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 

Ähnlich wie It act (20)

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Class it act
Class it actClass it act
Class it act
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Cyber
CyberCyber
Cyber
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 

Mehr von Yogesh Thawait

Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstructionYogesh Thawait
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property lawYogesh Thawait
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightYogesh Thawait
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)Yogesh Thawait
 
Securties contract act
Securties contract actSecurties contract act
Securties contract actYogesh Thawait
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtelYogesh Thawait
 

Mehr von Yogesh Thawait (13)

C.f
C.fC.f
C.f
 
Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstruction
 
Sebi
SebiSebi
Sebi
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property law
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers right
 
Idra,1951
Idra,1951Idra,1951
Idra,1951
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)
 
Consumer
ConsumerConsumer
Consumer
 
Competition act,2002
Competition act,2002Competition act,2002
Competition act,2002
 
Securties contract act
Securties contract actSecurties contract act
Securties contract act
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Mis 3
Mis 3Mis 3
Mis 3
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtel
 

Kürzlich hochgeladen

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Kürzlich hochgeladen (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

It act

  • 2.
  • 3. TECHNOLOGY –THE NEW AGE  Technology is the mover of change, economies, governance and thought processes. Coming of technology has paved the way for growth of new vistas and horizons.
  • 4. INTERNET Extranet Internet interface ENVIRONMENT Supplier The Business Customer
  • 5. IT Act, 2000  Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws  IT Act is based on Model law on e- commerce adopted by UNCITRAL
  • 6. Objectives of the IT Act To provide legal recognition for transactions:-  Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“  To facilitate electronic filing of documents with Government agencies and E-Payments  To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 7.  Electronic document produced Electronic World by a computer. Stored in digital form, and cannot be perceived without using a computer  It can be deleted, modified and rewritten without leaving a mark  Integrity of an electronic document is “genetically” impossible to verify  A copy is indistinguishable from the original  It can’t be sealed in the traditional way, where the author affixes his signature  The functions of identification, declaration, proof of electronic documents carried out using a digital signature based on cryptography.
  • 8. Electronic Commerce  EC transactions over the Internet include  Formation of Contracts  Delivery of Information and Services  Delivery of Content  Future of Electronic Commerce depends on “the trust that the transacting parties place in the security of the transmission and content of their communications”
  • 9. AUTHENTICATION OF ELECTRONIC RECORDS  Any subscriber may authenticate an electronic record  Authentication by affixing his digital signature.  Any person by the use of a public key of the subscriber can verify the electronic record.
  • 10. Electronic World  Digital signatures created and verified using cryptography  Public key System based on Asymmetric keys  An algorithm generates two different and related keys  Public key  Private Key  Private key used to digitally sign.  Public key used to verify.
  • 11. Public Key Infrastructure  Allow parties to have free access to the signer’s public key  This assures that the public key corresponds to the signer’s private key  Trust between parties as if they know one another  Parties with no trading partner agreements, operating on open networks, need to have highest level of trust in one another
  • 12. Section 3 Defines Digital Signatures  The authentication to be affected by use of asymmetric crypto system and hash function  The private key and the public key are unique to the subscriber and constitute functioning key pair  Verification of electronic record possible
  • 13. Certificate based Key Management CA CA A B  Operated by trusted-third party - CA  Provides Trading Partners Certificates  Notarises the relationship User A User B between a public key and CA A its owner CA B
  • 14. Essential steps of the digital signature process  STEP 1 The signatory is the authorized holder a unique cryptographic key pair;  STEP 2 The signatory prepares a data message (for example, in the form of an electronic mail message) on a computer;  STEP 3 The signatory prepares a “message digest”, using a secure hash algorithm. Digital signature creation uses a hash result derived from and unique to the signed message;  STEP 4 The signatory encrypts the message digest with the private key. The private key is applied to the message digest text using a mathematical algorithm. The digital signature consists of the encrypted message digest,  STEP 5 The signatory typically attaches or appends its digital signature to the message;  STEP 6 The signatory sends the digital signature and the (unencrypted or encrypted) message to the relying party electronically;
  • 15. Essential steps of the digital signature process  STEP 7 The relying party uses the signatory’s public key to verify the signatory’s digital signature. Verification using the signatory’s public key provides a level of technical assurance that the message came exclusively from the signatory;  STEP 8 The relying party also creates a “message digest” of the message, using the same secure hash algorithm;  STEP 9 The relying party compares the two message digests. If they are the same, then the relying party knows that the message has not been altered after it was signed. Even if one bit in the message has been altered after the message has been digitally signed, the message digest created by the relying party will be different from the message digest created by the signatory;  STEP 10 Where the certification process is resorted to, the relying party obtains a certificate from the certification service provider (including through the signatory or otherwise), which confirms the digital signature on the signatory’s message. The certificate contains the public key and name of the signatory (and possibly additional information), digitally signed by the certification service provider.
  • 16. Regulations and controls  Licensing Certifying Authorities (CAs) under section 21 of the IT Act and exercising supervision over their activities.  Certifying the public keys of the CAs, i.e. their Digital Signature Certificates more commonly known as Public Key Certificates (PKCs).  Laying down the standards to be maintained by the CAs,  Addressing the issues related to the licensing process
  • 17. Civil Wrongs under IT Act  Chapter IX of IT Act, Section 43  Whoever without permission of owner of the computer  Secures access (mere U/A access)  Not necessarily through a network  Downloads, copies, extracts any data  Introduces or causes to be introduced any viruses or contaminant  Damages or causes to be damaged any computer resource  Destroy, alter, delete, add, modify or rearrange  Change the format of a file  Disrupts or causes disruption of any computer resource  Preventing normal continuance of computer
  • 18. Civil Wrongs under IT Act (Contd.)  Denies or causes denial of access by any means  Denial of service attacks  Assists any person to do any thing above  Rogue Websites, Search Engines, Insiders providing vulnerabilities  Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource  Credit card frauds, Internet time thefts  Liable to pay damages not exceeding Rs. One crore to the affected party
  • 19. Data diddling: changing data prior or during input into a computer  Section 66 and 43(d) of the I.T. Act covers the offence of data diddling  Penalty: Not exceeding Rs. 1 crore Case in point : NDMC Electricity Billing Fraud Case: A private contractor who was to deal with receipt and accounting of electricity bills by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance.
  • 20. TYPES OF CYBER CRIMES  Cyber terrorism  Cyber pornography  Defamation  Cyber stalking (section 509 IPC) Crime against Government  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software Crime against persons piracy, copyright infringement, trademarks violations, theft of computer source code  Email spoofing Crime against property  Forgery  Phising  Credit card frauds
  • 21. TYPES OF CYBER CRIMES Cyber crimes Denial of Informatio E-mail Salami Trojan Hacking Service n bombing attacks attacks attacks Theft
  • 22. Section 65: Source Code  Most important asset of software companies  “Computer Source Code" means the listing of programmes, computer commands, design and layout  Ingredients  Knowledge or intention  Concealment, destruction, alteration  computer source code required to be kept or maintained by law  Punishment  imprisonment up to three years and / or  fine up to Rs. 2 lakh
  • 23. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, Section 66 covers data theft aswell as data alteration
  • 24. Sec. 67. Pornography  Ingredients  Publishing or transmitting or causing to be published  in the electronic form,  Obscene material  Punishment  On first conviction  imprisonment of either description up to five years and  fine up to Rs. 1 lakh  On subsequent conviction  imprisonment of either description up to ten years and  fine up to Rs. 2 lakh  Section covers  Internet Service Providers,  Search engines,  Pornographic websites  Cognizable, Non-Bailable
  • 25. There are many causes that I am prepared to die for but no causes that I am prepared to kill for. -let us not kill somebody’s business by hacking Truth does not pay homage to any society, ancient or modern. Society has to pay homage to Truth or die.