The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Confidentiality and Privacy Controls
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
INFORMATION TECHNOLOGY ACT 2000 AN OVERVIEW. PRESENTATION OVERVIEW Need for the law Legal issues regarding offer, Acceptance and conclusion of contract.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Saad Haj Bakry, PhD, CEng, FIEE 1 Security Challenges and Protection Measures Saad Haj Bakry, PhD, CEng, FIEE P RESENTATIONS IN N ETWORK S ECURITY.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Creating Trust in Electronic Environment - IT Act 2000 Deputy Controller (Technology) Controller of Certifying Authorities Ministry of Communications &
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Law & Islamic Ethics
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Course: Government Process Re-engineering Day 3 Session 3: Legal and Policy Framework for GPR.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
CSE 4482, Fall 2009, D Chan Session 2 – Common Security Techniques.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Internet Information ISYS 105B. What is the Internet? Comprised of network of computers Started in 1969 by U.S. Defense Dept.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Cryptography, Authentication and Digital Signatures
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Jeopardy: Digital Citizenship Please use presentation mode!
1 7. Technology & the Internet E-Commerce. 2 Information Management Monitor performance & track customers/competitors through –Databases Electronic warehouses.
Digital Signatures, Message Digest and Authentication Week-9.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 5 Electronic Commerce.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Lesson 15 : Networks And The Internet
The Internet, The Web, and Electronic Commerce Chapter 2.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Unit-6 Introduction to E-Commerce Prepared By:-Prof H.M.Patel.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Unit 3 Section 6.4: Internet Security
Legal And Policy Framework
Digital Signature.
Pooja programmer,cse department
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
One Time Signature.
The Internet: Encryption & Public Keys
Electronic Payment Security Technologies
Presentation transcript:

The Information Technology Act 2000

Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet, Intranet, Extranet Data Security Data Security Poaching Poaching Morphology Morphology

Terms (Contd) Hacking Hacking Ethical Hacking Ethical Hacking Netizen Netizen ISP ISP Search Engines Search Engines WILFER WILFER SPAM SPAM Cyber Espionage Cyber Espionage Domain Names Domain Names

Definitions Access: Gaining entry into, instructing or communicating with the logical, arithmetical or memory function of a Computer. Access: Gaining entry into, instructing or communicating with the logical, arithmetical or memory function of a Computer. COMPUTER; Conversion Of Mental Power Used for Technology, Education and Resources. COMPUTER; Conversion Of Mental Power Used for Technology, Education and Resources. VIRUS : Vital Information Resource Under Siege VIRUS : Vital Information Resource Under Siege

Originator: One who originates the message Originator: One who originates the message Addressee: To whom the message is addressed to. Addressee: To whom the message is addressed to. Affixing Digital Signature: Key Pair Affixing Digital Signature: Key Pair Private Key- Creates Digital Signature Private Key- Creates Digital Signature Public Key – Verifies Digital Signature Public Key – Verifies Digital Signature (a.k.a Asymmetric Crypto System)

Electronic Records Authentication of Electronic Records: Authentication of Electronic Records: Hash Function: An algorithm that maps or translates one set of bits into another so that it yields the same result everytime. Hash Function: An algorithm that maps or translates one set of bits into another so that it yields the same result everytime. EDI: Transfer of structured Data EDI: Transfer of structured Data By agreed message standards By agreed message standards From one Computer System to another From one Computer System to another By Electronic Means By Electronic Means

E-Governance Legal recognition of electronic records Legal recognition of electronic records Legal recognition of Digital Signature Legal recognition of Digital Signature Use of E-records and Digital signature in Government and its Agencies Use of E-records and Digital signature in Government and its Agencies Retention of E-records Retention of E-records Publication of rules, regulations in E- Gazette Publication of rules, regulations in E- Gazette

Duties of Subscribers Generating Key Pair Generating Key Pair Acceptance of Digital Signature Acceptance of Digital Signature Control of Private Key Control of Private Key

Offences/Penalties Penalty for damage to Computer, computer system etc., (Virus, Disruption, Deletion, Hacking) Penalty for damage to Computer, computer system etc., (Virus, Disruption, Deletion, Hacking) Penalty for failure to furnish information, returns etc., Penalty for failure to furnish information, returns etc., Tampering with computer source documents Tampering with computer source documents Penalty for misrepresentation Penalty for misrepresentation Penalty for breach of confidentiality and privacy Penalty for breach of confidentiality and privacy Publication for fraudulent purpose Publication for fraudulent purpose