ICT role in 21st century education and it's challenges.
HSC IT - Cyber Law and Ethics part 2
1. 2 . Cyber Law & Ethics – Part 2
By exza IT CenterFor Online Exam Questions visit : ITonlineExam.com
2. Notes for Topics
Cyber Law
IT Act 2000 and definitions of terms
Encryption & Digital Signature
Ten Commandments of Computing
Cyber Security
Intellectual Property Rights
Copyright & Fairuse
Freeware & Shareware software
Open Source Software
Public Domain Software
3. Cyber Law
With widespread usage of Internet, there is
an increase in cyber crime.
Cyber crimes such as spreading computer
virus, hacking, online financial frauds, email
spamming, phishing, etc.
To get remedy of all these cyber crimes, IT
Act in India was finally articulated.
The Information Technology Act 2000 in year
2000 and its amendment in the year 2008.
4. Cyber Law
Cyber law deals with issues
generated by the use of
computer and internet Cyber
law examines the
technological aspects of law.
The name Information
Technology Act has been
suggested because it is the
law which governs
information processing.
exza IT Center
5. IT Act of India 2000 Definitions
IT Act 2000 is an Act to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic communication
i.e. legal recognitions for transactions carried out by E-
commerce.
E-Commerce is paperless method for carrying out
transactions using electronic data exchange, electronic
filing and electronic storage of information.
exza IT Center
6. IT Act of India 2000 Definitions
IT Act 2000 is an Act to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic communication
i.e. legal recognitions for transactions carried out by E-
commerce.
E-Commerce is paperless method for carrying out
transactions using electronic data exchange, electronic
filing and electronic storage of information.
exza IT Center
7. IT Act of India 2000 Definitions
IT Act 2000 is an Act to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic communication
i.e. legal recognitions for transactions carried out by E-
commerce.
E-Commerce is paperless method for carrying out
transactions using electronic data exchange, electronic
filing and electronic storage of information.
exza IT Center
8. IT Act of India 2000 Definitions
1. Access: means gaining entry into,
instructing or communicating with the logical,
arithmetical, or memory function resources of a
computer, computer system or computer
network.
9. IT Act of India 2000 Definitions
2. Addressee: means a person who is
intended by the originator to receive the
electronic record but does not include any
intermediary.
10. IT Act of India 2000 Definitions
3.Computer: means any electronic magnetic,
optical or other high-speed data processing device
or system which performs logical, arithmetic, and
memory functions by manipulations of electronic,
magnetic or optical impulses, and includes all
input, output, processing, storage, computer
software, or communication facilities which are
connected or related to the computer in a computer
system or computer network.
11.
12.
13.
14.
15. IT Act of India 2000 Definitions
4. Computer network: means the
interconnection of one or more computers
through-
(i) the use of satellite, microwave, terrestrial line
or other communication media and
(ii) terminals or a complex consisting of two or
more interconnected computers whether or
not the interconnection is continuously
maintained.
16.
17.
18. IT Act of India 2000 Definitions
5. Computer Resource: means computer,
computer system, computer network, data and
computer database software.
19. IT Act of India 2000 Definitions
6. Computer System: means a device or
collection of devices, containing computer programs,
instructions, input data and output data, that performs
logic, arithmetic, data storage and retrieval communication
control and other functions.
20. IT Act of India 2000 Definitions
7. Data: means a representation of information,
knowledge, facts, concepts or which are being prepared or
have been prepared in a form, storage and retrieval and
communication or telecommunication from or within a
computer.
21. IT Act of India 2000 Definitions
8. Information: includes data, text, images, sound,
voice, codes, computer programs, software and databases
or micro film or computer generated micro fiche
22. IT Act of India 2000 Definitions
Before moving on to next set of terms
used in IT Act, we will see some
concepts which are required to
understand the terms.
exza IT Center
23. What is Encryption?
Encryption is the conversion of electronic data into another
form, called ciphertext, which cannot be easily understood
by anyone except authorized parties.
24.
25. Digital Signature
The purpose of digital signature is to
provide authenticity to user for Information.
It is a safeguard for information or data.
Digital signatures secure your data by
encoding it.
It is a mathematical technique used to
validate the authenticity and integrity of a
message, software or digital document.
exza IT Center
26. Digital Signature
The digital equivalent of a handwritten signature or
stamped seal, but offering far more inherent security.
A digital signature is intended to solve the problem of
tampering and impersonation in digital
communications.
Digital signatures can provide the added assurances
of evidence to origin, identity and status of an
electronic document, transaction or message, as well
as acknowledging informed consent by the signer.
Digital signatures have the same legal significance as
the more traditional forms of signed documents.
27.
28. Digital Signature
The IT act 2000 has provided a legal recognition to
digital signature.
It uses public key cryptography.
Subscriber means a person in whose name the Digital
Signature Certificate is issued: the initial electronic
record was affixed with the digital signature by the use of
private key corresponding to the public key of the
subscriber.
Any person by using public key of the subscriber can
verify the electronic record.
The private key and the public key are unique to the
subscriber and constitute a functioning key pair
30. Electronic Records
Attribution of Electronic records
An electronic record shall be attributed to the
originator—
if it was sent by the original himself.
by a person who had the authority to act on behalf of the
originator in respect of that electronic record.
by an information system programmed by or on behalf of
the originator to operate automatically.
31. Digital Signature
Digital signature uses public key cryptography.
In public key cryptography one can make a encryption
key public without sacrificing the secrecy of the
information or decryption key.
32. Electronic Records
Acknowledgment of Receipt
Acknowledgment does not mean the acceptance.
Acknowledgment just signifies that the message has
been received. An acknowledgment may be given by—
any communication by the addressee, automated or
otherwise
any conduct of the addressee, sufficient to indicate to the
originator that the electronic record has been received.
exza IT Center
33. Electronic Records
Time and place of Dispatch & receipt of
electronic record
Dispatch of an electronic record" includes successful
communication of an electronic record to the intended
addressee.
if the originator or the addresses has more than one place of
business, the principal place of business, should be the place of
business
if the originator the addressee does not have a place of
business, his usual place of residence should be deemed to be
the place of business.
usual place of residence in relation to a body corporate, means
the place where it is registered.
35. Ten Commandments of
Computing
These are ethics principles written in statements.
Commandments of computing guides computer users and
professional about do’s and don’ts
1. Thou shalt not use a computer to harm ether people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around the other people's computer
files.
4. Thou shalt not use a computer for the purpose of steal
36. Ten Commandments of
Computing
5. Thou shalt not use a computer to bear a false witness.
6. Thou shalt not copy or use the software for which Thou
has not paid.
7. Thou shalt not use other people's computer resources
without authorization or proper compensation.
8. Thou shalt not copy or use or other people's intellectual
output
9. Thou shalt think about social consequence of the program
one is writing or the system one is designing.
10.Thou shalt always use a computer by means that show
due considerations and due respect for one’s fellow
humans. exza IT Center
37. What is Cyber Security?
Cyber Security is the body of technologies,
processes and practices
designed to protect networks, computers,
programs and data from attack, damage or
unauthorized access.
In a computing context, security includes both
cybersecurity and physical security.
38. Cyber Security
Security is organizational concerns.
The virus attacks, unethical hackers, crackers may
damage or corrupt or destroy or disclose information.
"Security" is the quality or state of being protected from
unauthorized access or uncontrolled losses or effects.
There are security procedures like passwords, encryption,
firewalls, digital signatures, antivirus, SSL (Secure Socket
Layers) to protect information.
Still it is impossible to achieve the absolute security in day to
day practice.
39.
40.
41. Cyber Security
The duty of day-to-day securing an electronic
record rests with the creator,
It's the responsibility of recipient to verify the
secured electronic record.
45. Intellectual Property Rights
The intellectual property right consists of copyright,
trademarks patent, design and geographical indications.
A person or a company can protect the rights against
infringers.
exza IT Center
51. Copyright
Copyright law is useful for authorship determination,
duration of protection and requirement for transfer of right
to others.
The copyright act can be applied to original literary work
including computer programs, databases, dramatic work,
musical work, Artistic work and Cinematograph of films.
exza IT Center
52.
53. Fair Use
Fair Use is the exceptional case of copyright which allows
copying of a limited amount of materials in certain cases
without permission of the copyright owner.
Even for this use, whether a specific use is fair or not
depend on number of factors such as purpose, nature,
amount and effect.
exza IT Center
54.
55. Intellectual Property Rights
Click on the given below link to learn how to avoid Copyright
Infringement
http://www.wikihow.com/Avoid-Copyright-Infringement
56. Shareware, Freeware and
Public Domain Software
The distribution of software can be categorized into:
1. Shareware
2. Freeware
3. Public Domain Software
exza IT Center
57.
58. Shareware
Shareware programs can be freely distributed and freely
tested.
This program can be shared with other user with owner's
permission.
A trail period generally 30 days is given to test those
programs. After this trial period, the user who wants to
keep using the program has to register or pay a fee.
The software which are made available with magazines
are normally of this type.
exza IT Center
61. Freeware
Freeware is termed as free software that allow everyone to
copy, redistribute and modify it with free of cost.
Its copyright is with the authors.
Freeware is programming that is offered at no cost.
Linux is an example of freeware.
exza IT Center
62.
63. Open Source Software
Open-source software (OSS) is computer software with its
source code made available with a license in which the
copyright holder provides the rights to study, change, and
distribute the software to anyone and for any purpose.
Open-source software may be developed in a collaborative
public manner.
exza IT Center
64. Open Source Software
There are four sorts of freedom involved with open source
software: -
You don't have to pay to download, install or use it, and it
is issued under a license which means you will always be
able to use it free-of-charge.
- You are allowed to modify and add to the source code of
the software at will.
- You are also allowed to redistribute the software either in
its original or modified forms. You are allowed to charge for
the software if you so desire.
- You are allowed to use the software for any legal
purpose, including commercial enterprises.
67. Public Domain Software
Public-domain software is software that has been placed in
the public domain:
in other words, there is absolutely no ownership such as
copyright, trademark, or patent.
It implies that the authors have waived copyright over the
software.
Software in the public domain can be modified, distributed,
or sold even without any attribution by anyone.
It can be incorporated into new works without paying
royalties for the original material.
exza IT Center
68. Thank You
See you in the next video
www.ITonlineExam.com
HSCITnotes.blogspot.in
Email: exzanet@gmail.com,
vikassawant@live.com
exza IT Center
Thank You
See you in the next video
For Online Exam Questions visit ITonlineExam.com
Editor's Notes
Message digests (also called hashes ) are commonly 128 bits to 160 bits in length and provide a digital identifier for each digital file or document. Message digest functions are mathematical functions that process information to produce a different message digest for each unique document.
A cryptographic hash function is a hash function which takes an input (or 'message') and returns a fixed-size alphanumeric string. The string is called the 'hash value', 'message digest', 'digital fingerprint', 'digest' or 'checksum').
A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later.
The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient
The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit
How digital signatures work
Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.
PRO+
Content
Find more PRO+ content and other member only offers, here.
Buyer's Handbook
The digital certificate: How it works, which to buy
E-Handbook
Trusted? Certificate authority risks and how to manage them
The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication).
A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. A digital certificate, an electronic document that contains the digital signature of the certificate-issuing authority, binds together a public key with an identity and can be used to verify a public key belongs to a particular person or entity.
Hashing: Finally, hashing is a form of cryptographic security which differs from encryption. Whereas encryption is a two step process used to first encrypt and then decrypt a message, hashing condenses a message into an irreversible fixed-length value, or hash.
o create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature.
How digital signatures work
Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.
PRO+
Content
Find more PRO+ content and other member only offers, here.
Buyer's Handbook
The digital certificate: How it works, which to buy
E-Handbook
Trusted? Certificate authority risks and how to manage them
The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication).
A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. A digital certificate, an electronic document that contains the digital signature of the certificate-issuing authority, binds together a public key with an identity and can be used to verify a public key belongs to a particular person or entity.
How digital signatures work
Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.
PRO+
Content
Find more PRO+ content and other member only offers, here.
Buyer's Handbook
The digital certificate: How it works, which to buy
E-Handbook
Trusted? Certificate authority risks and how to manage them
The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication).
A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. A digital certificate, an electronic document that contains the digital signature of the certificate-issuing authority, binds together a public key with an identity and can be used to verify a public key belongs to a particular person or entity.