cyber law analyst certification

317 views
264 views

Published on

Vskills certification for Cyber Law Analyst assesses the candidate as per the company’s need for securing against internet related offenses. The certification tests the candidates on various areas in electronic signature, UNCITRAL, attribution, acknowledgement and dispatch of electronic records, certifying authority, IPR protection, international organization, COE, IT Act and judicial review.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
317
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

cyber law analyst certification

  1. 1. Certified Cyber Law Analyst VS-1154
  2. 2. Certified Cyber Law Analyst www.vskills.in CCCCertifiedertifiedertifiedertified Cyber Law AnalystCyber Law AnalystCyber Law AnalystCyber Law Analyst Certification CodeCertification CodeCertification CodeCertification Code VS-1154 Vskills certification for Cyber Law Analyst assesses the candidate as per the company’s need for securing against internet related offenses. The certification tests the candidates on various areas in electronic signature, UNCITRAL, attribution, acknowledgement and dispatch of electronic records, certifying authority, IPR protection, international organization, COE, IT Act and judicial review. Why should one take this certifWhy should one take this certifWhy should one take this certifWhy should one take this certification?ication?ication?ication? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Cyber Law Analyst Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certificatioWho will benefit from taking this certificatioWho will benefit from taking this certificatioWho will benefit from taking this certification?n?n?n? Job seekers looking to find employment in legal or IT departments of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification. Test DetailsTest DetailsTest DetailsTest Details • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee StructureFee StructureFee StructureFee Structure Rs. 4,000/- (Includes all taxes) Companies that hireCompanies that hireCompanies that hireCompanies that hire VskillsVskillsVskillsVskills Cyber Law AnalystCyber Law AnalystCyber Law AnalystCyber Law Analyst Cyber Law Analysts are in great demand. Companies specializing in legal or internet related services or IT are constantly hiring skilled Cyber Law Analysts. Various public and private companies also need Cyber Law Analysts for their legal or IT departments.
  3. 3. Certified Cyber Law Analyst www.vskills.in Table of ContentsTable of ContentsTable of ContentsTable of Contents 1.1.1.1. Understanding Internet and Cyber LawsUnderstanding Internet and Cyber LawsUnderstanding Internet and Cyber LawsUnderstanding Internet and Cyber Laws 1.1 Modem Era 1.2 Need for Cyber Laws 1.3 Historical Perspective 1.4 The Character and Use of Internet Technology 2.2.2.2. Conceptual FrameworkConceptual FrameworkConceptual FrameworkConceptual Framework 2.1 What is E-commerce? 2.2 Growth and Development of E-commerce 2.3 Various Modes of E-commerce 2.4 Mechanism Involved in the Operation of Internet 2.5 Types of Players in E-commerce 2.6 Web Development and Hosting Agreements 2.7 Web Hosting 2.8 The Problem of Internet Jurisdiction 2.9 Illustrative Cases 2.10 Type of Websites 3. The Role oThe Role oThe Role oThe Role of Electronic Signaturef Electronic Signaturef Electronic Signaturef Electronic Signature 3.1 Indian Economy 3.2 Basic Laws 3.3 Authentication of Digital Signature and Electronic Records 3.4 UNCITRAL 3.5 Securing Electronic Transactions 3.6 Hash Function Basics 3.7 Digital Signature’s Verification 3.8 Certifying Authorities and Electronic Signature under Indian Law 3.9 The Functions of Controller and Other Officers 3.10 Feasibility of Implementing Digital Signature 3.11 Security and Privacy of Digital Signatures 3.12 Private Key Escrow and Key Recovery System 3.13 Obligation of a Certifying Authority and Certificate Management 3.14 Security Threats 3.15 International Efforts 3.16 The Singapore Electronic Transaction Act, 1998 3.17 Different Approaches of Digital Signatures 4.4.4.4. Legal Aspects of Electronic RecordsLegal Aspects of Electronic RecordsLegal Aspects of Electronic RecordsLegal Aspects of Electronic Records 4.1 Electronic Records Recognition 4.2 The Position in the US and Australia 4.3 Electronic Records Retention in India 4.4 UNCITRAL Model Law for Retention 4.5 Attribution, Acknowledgement and Dispatch in India
  4. 4. Certified Cyber Law Analyst www.vskills.in 4.6 UNCITRAL on Attribution and Acknowledgement 4.7 Acknowledgement of Receipt in India 5.5.5.5. Certifying Authorities in IndiaCertifying Authorities in IndiaCertifying Authorities in IndiaCertifying Authorities in India 5.1 The Role of Certifying Authority (CA) 5.2 Functions and Appointment of Controller 5.3 License to Issue Digital Signature 5.4 Renewal and Suspension of CA License 5.5 Security Guidelines for CA 5.6 Surrender of License and Cessation as CA 5.7 CA and Disclosure of Information 5.8 Electronic Signature Certificate issuance and suspension by CA 5.9 Archiving and Revocation of Digital Signature Certificates 5.10 Rules of Compromise 5.11 Confidential Information and Access Rules 5.12 Duties of Subscribers 6.6.6.6. IPRIPRIPRIPR ProtectionProtectionProtectionProtection in Indiain Indiain Indiain India 6.1 The Domain Name Relevance in IPR 6.2 Cyberspace Squatting 6.3 Bad Faith and Domain Name Infringement 6.4 Some Complaints from India before WIPO 6.5 Protection of Copying in Cyberspace 6.6 Rights of Software Copyright Owners 6.7 Infringement of Copyright 6.8 Linking, Hyper-Linking and Framing 6.9 Remedies for Infringement 6.10 The Liabilities of an Internet Services Provider (ISP) 6.11 Cyberspace and the Protection of Patents in India 7.7.7.7. International Cyberspace LawsInternational Cyberspace LawsInternational Cyberspace LawsInternational Cyberspace Laws 7.1 United Nations Commission on International Trade Law 7.2 The Organization for Economic Cooperation Development (OECD) 7.3 World Trade Organisation (WTO) and E-Commerce 7.4 The World Intellectual Property Organisation (WIPO) and E-commerce 7.5 The Internet Corporation for Assigned Name and Numbers (ICANN) 7.6 Asia Pacific Economic Cooperation (APEC) 7.7 US Agencies for E-commerce Law and Policy 7.8 Internet Law and Forum 7.9 International Chamber of Commerce 7.10 Singapore Electronic Transactions Guidelines 8.8.8.8. Council of Europe’s (Council of Europe’s (Council of Europe’s (Council of Europe’s (COECOECOECOE)))) ConventionConventionConventionConvention 8.1 Domestic Measures on Child Pornography 8.2 Infringements of Copyrights and Related Rights Offences 8.3 Extradition under COE
  5. 5. Certified Cyber Law Analyst www.vskills.in 8.4 Mutual Assistance between the States 9.9.9.9. IT Act and Judicial ReviewIT Act and Judicial ReviewIT Act and Judicial ReviewIT Act and Judicial Review 9.1 Penalty and Compensation for Damage 9.2 Compensation for Failure to Protect Data 9.3 Penalty for Failure to Furnish Information 9.4 Adjudication of Disputes under the IT Act 9.5 Cyber Appellate Tribunal 9.6 Compounding of Contraventions and Recovery of Penalty 9.7 Appeal to the High Court under the IT Act 10.10.10.10. Important Offences under the Cyberspace LawImportant Offences under the Cyberspace LawImportant Offences under the Cyberspace LawImportant Offences under the Cyberspace Law 10.1 Obscenity and Pornography 10.2 Hacking 10.3 Other Offences 10.4 Violation of the Right Privacy 10.5 Violation of Privacy, Breach of Confidentially and Privacy 10.6 Terrorism 11.11.11.11. Offences under theOffences under theOffences under theOffences under the ITITITIT Act in IndiaAct in IndiaAct in IndiaAct in India 11.1 Cyber crimes offence by Intermediaries 11.2 Power of the Controller 11.3 Directions for Monitoring of Information 11.4 Collecting Traffic Data 11.5 Protected System Offences 11.6 The Misrepresentation Offence 11.7 Electronic Signature Certificate with False Particulars 11.8 Confiscation as Penalty 11.9 Compounding of Offences under the IT Act 11.10 Cognizance of Offences and Bail under the IT Act 11.11 Punishment for Abetment and Attempt to Commit Offences 11.12 Commission of Offences by Companies under the IT Act 11.13 The Power of Police to Enter and Search 11.14 Protection of Action Taken in a Goods Faith 11.15 Amendments to IT Act 12.12.12.12. Electronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT Act 12.1 Indian Evidence Act 12.2 Examiner of Electronic Evidence 12.3 Amendments to the Indian Evidence Act 1872, 12.4 The Appointment of National Nodal Agency 12.5 Indian Computer Emergency Response Team (CERT) 12.6 Electronic Cheques Laws 12.7 Advisory Committee 12.8 Security Practices and Sensitive Personal Information
  6. 6. Certified Cyber Law Analyst www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. Which of the following crimesWhich of the following crimesWhich of the following crimesWhich of the following crimes is done using a computer as the instrument?is done using a computer as the instrument?is done using a computer as the instrument?is done using a computer as the instrument? A. Computer manipulation B. Money laundering C. Data alteration D. Theft of services 2222.... Which of the following crimes targets a computer?Which of the following crimes targets a computer?Which of the following crimes targets a computer?Which of the following crimes targets a computer? A. Denial of service B. Money laundering C. Theft of services D. Intellectual property violations 3333.... Which of the following best defines computer abuse?Which of the following best defines computer abuse?Which of the following best defines computer abuse?Which of the following best defines computer abuse? A. Denial of service B. Money laundering C. An illegal act in which knowledge of computer technology is used to commit the act D. An intentional act involving a computer in which the perpetrator may have gained at the victim’s expense 4444.... What is a “Hacktivist”?What is a “Hacktivist”?What is a “Hacktivist”?What is a “Hacktivist”? A. Politically motivated hacker B. Denial of service attacker C. A proponent of Napster D. A person engaging in an intentional act involving a computer in which the person may have gained at the victim’s expense 5555.... Which of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner of a tangible asset?a tangible asset?a tangible asset?a tangible asset? A. Hacking B. Money laundering C. Manipulating the price of a stock D. Salami slice Answers: 1 (D), 2 (A), 3 (D), 4 (A), 5 (D)

×