SlideShare a Scribd company logo
Security Aspects and Intellectual
Property Rights
Dr. NGPASC
COIMBATORE | INDIA
Dr. N.G.P. ARTS AND SCIENCE COLLEGE
(An Autonomous Institution, Affiliated to Bharathiar University, Coimbatore)
Approved by Government of Tamil Nadu and Accredited by NAAC with 'A' Grade (2nd Cycle)
Dr. N.G.P.- Kalapatti Road, Coimbatore-641048, Tamil Nadu, India
Web: www.drngpasc.ac.in | Email: info@drngpasc.ac.in | Phone: +91-422-2369100
Dr. R. Prema
Associate Professor in
Commerce CA
D a t a S e c u r i t y
Dr. NGPASC
COIMBATORE | INDIA
Data security refers to the process of
protecting data from unauthorized access
and data corruption throughout its lifecycle. Data
security includes data encryption, hashing, tokenization,
and key management practices that protect data across
all applications and platforms.
Dr. NGPASC
COIMBATORE | INDIA
Data Security
Dr. NGPASC
COIMBATORE | INDIA
Fundamentals Data Security requirements
Basic
Security
Standards
Confidentiality Integrity Availability
1.Privacy of Communications
2. Storage of Sensitive Data
Safely
3. Authenticated users
4. Access Control
 Encryption
 Strong Passwords
 Strong Firewall
 Antivirus Protection
 Monitoring Diligently
Dr. NGPASC
COIMBATORE | INDIA
Data Security Precautions
Dr. NGPASC
COIMBATORE | INDIA
Cyber Law – Governance
Encryption is a process that encodes a message or file so
that it can be only be read by certain
people. Encryption uses an algorithm to scramble,
or encrypt, data and then uses a key for the receiving
party to unscramble, or decrypt, the information.
Encryption is defined as the conversion of something to
code or symbols so that its contents cannot be
understood if intercepted. When a confidential email
needs to be sent and you use a program that obscures its
content, this is an example of encryption. Cryptography.
Dr. NGPASC
COIMBATORE | INDIA
Encryption
 Identity of users
 Unauthorized transmission
 Integrity of the data
 Users take responsibility for data
 Communication secret
Dr. NGPASC
COIMBATORE | INDIA
Advantages of Encryption Technology
Dr. NGPASC
COIMBATORE | INDIA
Means of Encryption of Data
Encryption
Symmetric
Encryption
Public key
Encryption
1. Public Key
2. Private Key
 Set of servers
 Software
 Protocols
 Application programs
Dr. NGPASC
COIMBATORE | INDIA
Public key infrastructure
Digital signatures are based on public key cryptography, also known
as asymmetric cryptography. Using a public key algorithm, such as
RSA, one can generate two keys that are mathematically linked: one
private and one public.
Dr. NGPASC
COIMBATORE | INDIA
Digital Signature
 Added security- A digital signature offers more security than an
electronic signature.
 A high standard-The PKI standard is common to DocuSign and
its peer companies in the digital signature industry.
 Global acceptance and legal compliance.
 Long-term retention and access.
 Independent verification.
 Valid for 1-2 years
 Authenticity
 No alternations
 MCA21, E-Filling, E-Tendering
Dr. NGPASC
COIMBATORE | INDIA
Features of Digital Signature
Section 17 – Appointment of the Controller and other officers
The Central Government may appoint a Controller of Certifying
Authorities after notifying the Official Gazette. They may also
appoint Deputy Controllers and Assistant Controllers as it deems fit.
The Controller discharges his responsibilities subject to the
general control and also directions of the Central Government
 The Deputy Controllers and Assistant Controllers shall perform
the functions assigned to them by the Controller under the general
superintendence and also control of the Controller.
Dr. NGPASC
COIMBATORE | INDIA
Regulation of Certifying Authorities
The qualifications, experience and terms and conditions of
service of Controller, Deputy Controllers, and Assistant Controllers
shall be such as may be prescribed by the Central Government.
The Head Office and Branch Office of the office of the Controller
shall be at such places as the Central Government may specify, and
these may be established at such places as the Central Government
may think fit.
There shall be a seal of the Office of the Controller.
Dr. NGPASC
COIMBATORE | INDIA
Regulation of Certifying Authorities
Supervise the activities of the Certifying Authorities and also certify their
public keys
Lay down the standards that the Certifying Authorities follow
Specify the following:
qualifications and also experience requirements of the employees of all
Certifying Authorities
conditions that the Certifying Authorities must follow for conducting
business
the content of the printed, written, and also
visual materials and advertisements in respect of the digital signature and
the public key
the form and content of a digital signature certificate and the key
the form and manner in which the Certifying Authorities maintain
accounts
terms and conditions for the appointment of auditors and their
remuneration
Dr. NGPASC
COIMBATORE | INDIA
Functions of Controller
Facilitate the Certifying Authority to establish an electronic system, either
solely or jointly with other Certifying Authorities and its regulation
Specify the manner in which the Certifying Authorities deal with the
subscribers
Resolve any conflict of interests between the Certifying Authorities and the
subscribers
Lay down the duties of the Certifying Authorities
Maintain a database containing the disclosure record of every Certifying
Authority with all the details as per regulations. Further, this database is
accessible to the public.
Dr. NGPASC
COIMBATORE | INDIA
Functions of Controller
Simple
Basic
Advanced and Qualified
Dr. NGPASC
COIMBATORE | INDIA
Types of Digital Signature
Components of DS Certificate
Use of digital Signature Certificate
Credentials required with Application form
Dr. NGPASC
COIMBATORE | INDIA
Digital Signature
19

More Related Content

What's hot

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
Kanhaiya Kumar
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
Network Intelligence India
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
PAYAL SINHA
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture Notes
FellowBuddy.com
 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
 
overview of electronic payment system
overview of electronic payment system overview of electronic payment system
overview of electronic payment system
Kavitha Ravi
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
e-commerce and internet banking
e-commerce and internet bankinge-commerce and internet banking
e-commerce and internet banking
Arushi Grover
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integration
Anil Chaurasiya
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 

What's hot (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
It act 2000
It act 2000It act 2000
It act 2000
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture Notes
 
Cyber law
Cyber lawCyber law
Cyber law
 
overview of electronic payment system
overview of electronic payment system overview of electronic payment system
overview of electronic payment system
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
e-commerce and internet banking
e-commerce and internet bankinge-commerce and internet banking
e-commerce and internet banking
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Electronic Delivery channels integration
Electronic Delivery channels integrationElectronic Delivery channels integration
Electronic Delivery channels integration
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 

Similar to Cyber law - Security aspects and Intellectual Property rights

Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Mufaddal Nullwala
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
IRJET Journal
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
IRJET Journal
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
IRJET Journal
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
IJECEIAES
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
JustinFinch11
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
itnewsafrica
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
Hernan Huwyler, MBA CPA
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured Securing Originals on BlockChain Technology
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
Pankaj Nandurkar
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanAsad Zaman
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CloudIDSummit
 

Similar to Cyber law - Security aspects and Intellectual Property rights (20)

Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 
Fake Certificate Detection by using Blockchain
Fake Certificate Detection by using BlockchainFake Certificate Detection by using Blockchain
Fake Certificate Detection by using Blockchain
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Master Class Cyber Compliance
Master Class Cyber Compliance Master Class Cyber Compliance
Master Class Cyber Compliance
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 

More from premarhea

Alignment.pdf
Alignment.pdfAlignment.pdf
Alignment.pdf
premarhea
 
MS Office 2013.pdf
MS Office 2013.pdfMS Office 2013.pdf
MS Office 2013.pdf
premarhea
 
Business Application Software.pdf
Business Application Software.pdfBusiness Application Software.pdf
Business Application Software.pdf
premarhea
 
Business income
Business incomeBusiness income
Business income
premarhea
 
Forms of organisation non-corporate enterprises
Forms of organisation   non-corporate enterprisesForms of organisation   non-corporate enterprises
Forms of organisation non-corporate enterprises
premarhea
 
Professional income
Professional incomeProfessional income
Professional income
premarhea
 
Professional income
Professional incomeProfessional income
Professional income
premarhea
 
Business income
Business incomeBusiness income
Business income
premarhea
 
Forms of organisation - non-corporate enterprises
Forms of organisation - non-corporate enterprisesForms of organisation - non-corporate enterprises
Forms of organisation - non-corporate enterprises
premarhea
 
Nature of business
Nature of businessNature of business
Nature of business
premarhea
 
Residential status problems
Residential status   problemsResidential status   problems
Residential status problems
premarhea
 
Residential status
Residential statusResidential status
Residential status
premarhea
 
Residential status
Residential statusResidential status
Residential status
premarhea
 
Scope of TI problems
Scope of TI  problemsScope of TI  problems
Scope of TI problems
premarhea
 
Scope of Total Income
Scope of Total IncomeScope of Total Income
Scope of Total Income
premarhea
 
Residential status
Residential statusResidential status
Residential status
premarhea
 
Introduction to tax
Introduction to taxIntroduction to tax
Introduction to tax
premarhea
 
Unit v
Unit vUnit v
Unit v
premarhea
 
Capital Structure
Capital StructureCapital Structure
Capital Structure
premarhea
 
Capital budgeting
Capital budgetingCapital budgeting
Capital budgeting
premarhea
 

More from premarhea (20)

Alignment.pdf
Alignment.pdfAlignment.pdf
Alignment.pdf
 
MS Office 2013.pdf
MS Office 2013.pdfMS Office 2013.pdf
MS Office 2013.pdf
 
Business Application Software.pdf
Business Application Software.pdfBusiness Application Software.pdf
Business Application Software.pdf
 
Business income
Business incomeBusiness income
Business income
 
Forms of organisation non-corporate enterprises
Forms of organisation   non-corporate enterprisesForms of organisation   non-corporate enterprises
Forms of organisation non-corporate enterprises
 
Professional income
Professional incomeProfessional income
Professional income
 
Professional income
Professional incomeProfessional income
Professional income
 
Business income
Business incomeBusiness income
Business income
 
Forms of organisation - non-corporate enterprises
Forms of organisation - non-corporate enterprisesForms of organisation - non-corporate enterprises
Forms of organisation - non-corporate enterprises
 
Nature of business
Nature of businessNature of business
Nature of business
 
Residential status problems
Residential status   problemsResidential status   problems
Residential status problems
 
Residential status
Residential statusResidential status
Residential status
 
Residential status
Residential statusResidential status
Residential status
 
Scope of TI problems
Scope of TI  problemsScope of TI  problems
Scope of TI problems
 
Scope of Total Income
Scope of Total IncomeScope of Total Income
Scope of Total Income
 
Residential status
Residential statusResidential status
Residential status
 
Introduction to tax
Introduction to taxIntroduction to tax
Introduction to tax
 
Unit v
Unit vUnit v
Unit v
 
Capital Structure
Capital StructureCapital Structure
Capital Structure
 
Capital budgeting
Capital budgetingCapital budgeting
Capital budgeting
 

Recently uploaded

ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 

Recently uploaded (20)

ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 

Cyber law - Security aspects and Intellectual Property rights

  • 1. Security Aspects and Intellectual Property Rights Dr. NGPASC COIMBATORE | INDIA Dr. N.G.P. ARTS AND SCIENCE COLLEGE (An Autonomous Institution, Affiliated to Bharathiar University, Coimbatore) Approved by Government of Tamil Nadu and Accredited by NAAC with 'A' Grade (2nd Cycle) Dr. N.G.P.- Kalapatti Road, Coimbatore-641048, Tamil Nadu, India Web: www.drngpasc.ac.in | Email: info@drngpasc.ac.in | Phone: +91-422-2369100 Dr. R. Prema Associate Professor in Commerce CA
  • 2. D a t a S e c u r i t y Dr. NGPASC COIMBATORE | INDIA
  • 3. Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms. Dr. NGPASC COIMBATORE | INDIA Data Security
  • 4. Dr. NGPASC COIMBATORE | INDIA Fundamentals Data Security requirements Basic Security Standards Confidentiality Integrity Availability 1.Privacy of Communications 2. Storage of Sensitive Data Safely 3. Authenticated users 4. Access Control
  • 5.  Encryption  Strong Passwords  Strong Firewall  Antivirus Protection  Monitoring Diligently Dr. NGPASC COIMBATORE | INDIA Data Security Precautions
  • 6. Dr. NGPASC COIMBATORE | INDIA Cyber Law – Governance
  • 7. Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. When a confidential email needs to be sent and you use a program that obscures its content, this is an example of encryption. Cryptography. Dr. NGPASC COIMBATORE | INDIA Encryption
  • 8.  Identity of users  Unauthorized transmission  Integrity of the data  Users take responsibility for data  Communication secret Dr. NGPASC COIMBATORE | INDIA Advantages of Encryption Technology
  • 9. Dr. NGPASC COIMBATORE | INDIA Means of Encryption of Data Encryption Symmetric Encryption Public key Encryption 1. Public Key 2. Private Key
  • 10.  Set of servers  Software  Protocols  Application programs Dr. NGPASC COIMBATORE | INDIA Public key infrastructure
  • 11. Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm, such as RSA, one can generate two keys that are mathematically linked: one private and one public. Dr. NGPASC COIMBATORE | INDIA Digital Signature
  • 12.  Added security- A digital signature offers more security than an electronic signature.  A high standard-The PKI standard is common to DocuSign and its peer companies in the digital signature industry.  Global acceptance and legal compliance.  Long-term retention and access.  Independent verification.  Valid for 1-2 years  Authenticity  No alternations  MCA21, E-Filling, E-Tendering Dr. NGPASC COIMBATORE | INDIA Features of Digital Signature
  • 13. Section 17 – Appointment of the Controller and other officers The Central Government may appoint a Controller of Certifying Authorities after notifying the Official Gazette. They may also appoint Deputy Controllers and Assistant Controllers as it deems fit. The Controller discharges his responsibilities subject to the general control and also directions of the Central Government  The Deputy Controllers and Assistant Controllers shall perform the functions assigned to them by the Controller under the general superintendence and also control of the Controller. Dr. NGPASC COIMBATORE | INDIA Regulation of Certifying Authorities
  • 14. The qualifications, experience and terms and conditions of service of Controller, Deputy Controllers, and Assistant Controllers shall be such as may be prescribed by the Central Government. The Head Office and Branch Office of the office of the Controller shall be at such places as the Central Government may specify, and these may be established at such places as the Central Government may think fit. There shall be a seal of the Office of the Controller. Dr. NGPASC COIMBATORE | INDIA Regulation of Certifying Authorities
  • 15. Supervise the activities of the Certifying Authorities and also certify their public keys Lay down the standards that the Certifying Authorities follow Specify the following: qualifications and also experience requirements of the employees of all Certifying Authorities conditions that the Certifying Authorities must follow for conducting business the content of the printed, written, and also visual materials and advertisements in respect of the digital signature and the public key the form and content of a digital signature certificate and the key the form and manner in which the Certifying Authorities maintain accounts terms and conditions for the appointment of auditors and their remuneration Dr. NGPASC COIMBATORE | INDIA Functions of Controller
  • 16. Facilitate the Certifying Authority to establish an electronic system, either solely or jointly with other Certifying Authorities and its regulation Specify the manner in which the Certifying Authorities deal with the subscribers Resolve any conflict of interests between the Certifying Authorities and the subscribers Lay down the duties of the Certifying Authorities Maintain a database containing the disclosure record of every Certifying Authority with all the details as per regulations. Further, this database is accessible to the public. Dr. NGPASC COIMBATORE | INDIA Functions of Controller
  • 17. Simple Basic Advanced and Qualified Dr. NGPASC COIMBATORE | INDIA Types of Digital Signature
  • 18. Components of DS Certificate Use of digital Signature Certificate Credentials required with Application form Dr. NGPASC COIMBATORE | INDIA Digital Signature
  • 19. 19