SlideShare a Scribd company logo
1 of 68
2 . Cyber Law & Ethics – Part 2
By exza IT CenterFor Online Exam Questions visit : ITonlineExam.com
Notes for Topics
 Cyber Law
 IT Act 2000 and definitions of terms
 Encryption & Digital Signature
 Ten Commandments of Computing
 Cyber Security
 Intellectual Property Rights
 Copyright & Fairuse
 Freeware & Shareware software
 Open Source Software
 Public Domain Software
Cyber Law
 With widespread usage of Internet, there is
an increase in cyber crime.
Cyber crimes such as spreading computer
virus, hacking, online financial frauds, email
spamming, phishing, etc.
To get remedy of all these cyber crimes, IT
Act in India was finally articulated.
The Information Technology Act 2000 in year
2000 and its amendment in the year 2008.
Cyber Law
 Cyber law deals with issues
generated by the use of
computer and internet Cyber
law examines the
technological aspects of law.
The name Information
Technology Act has been
suggested because it is the
law which governs
information processing.
exza IT Center
IT Act of India 2000 Definitions
 IT Act 2000 is an Act to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic communication
i.e. legal recognitions for transactions carried out by E-
commerce.
 E-Commerce is paperless method for carrying out
transactions using electronic data exchange, electronic
filing and electronic storage of information.
exza IT Center
IT Act of India 2000 Definitions
 IT Act 2000 is an Act to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic communication
i.e. legal recognitions for transactions carried out by E-
commerce.
 E-Commerce is paperless method for carrying out
transactions using electronic data exchange, electronic
filing and electronic storage of information.
exza IT Center
IT Act of India 2000 Definitions
 IT Act 2000 is an Act to provide legal recognition for
transactions carried out by means of electronic data
interchange and other means of electronic communication
i.e. legal recognitions for transactions carried out by E-
commerce.
 E-Commerce is paperless method for carrying out
transactions using electronic data exchange, electronic
filing and electronic storage of information.
exza IT Center
IT Act of India 2000 Definitions
1. Access: means gaining entry into,
instructing or communicating with the logical,
arithmetical, or memory function resources of a
computer, computer system or computer
network.
IT Act of India 2000 Definitions
2. Addressee: means a person who is
intended by the originator to receive the
electronic record but does not include any
intermediary.
IT Act of India 2000 Definitions
3.Computer: means any electronic magnetic,
optical or other high-speed data processing device
or system which performs logical, arithmetic, and
memory functions by manipulations of electronic,
magnetic or optical impulses, and includes all
input, output, processing, storage, computer
software, or communication facilities which are
connected or related to the computer in a computer
system or computer network.
IT Act of India 2000 Definitions
4. Computer network: means the
interconnection of one or more computers
through-
(i) the use of satellite, microwave, terrestrial line
or other communication media and
(ii) terminals or a complex consisting of two or
more interconnected computers whether or
not the interconnection is continuously
maintained.
IT Act of India 2000 Definitions
5. Computer Resource: means computer,
computer system, computer network, data and
computer database software.
IT Act of India 2000 Definitions
6. Computer System: means a device or
collection of devices, containing computer programs,
instructions, input data and output data, that performs
logic, arithmetic, data storage and retrieval communication
control and other functions.
IT Act of India 2000 Definitions
7. Data: means a representation of information,
knowledge, facts, concepts or which are being prepared or
have been prepared in a form, storage and retrieval and
communication or telecommunication from or within a
computer.
IT Act of India 2000 Definitions
8. Information: includes data, text, images, sound,
voice, codes, computer programs, software and databases
or micro film or computer generated micro fiche
IT Act of India 2000 Definitions
Before moving on to next set of terms
used in IT Act, we will see some
concepts which are required to
understand the terms.
exza IT Center
What is Encryption?
 Encryption is the conversion of electronic data into another
form, called ciphertext, which cannot be easily understood
by anyone except authorized parties.
Digital Signature
The purpose of digital signature is to
provide authenticity to user for Information.
It is a safeguard for information or data.
Digital signatures secure your data by
encoding it.
It is a mathematical technique used to
validate the authenticity and integrity of a
message, software or digital document.
exza IT Center
Digital Signature
The digital equivalent of a handwritten signature or
stamped seal, but offering far more inherent security.
A digital signature is intended to solve the problem of
tampering and impersonation in digital
communications.
Digital signatures can provide the added assurances
of evidence to origin, identity and status of an
electronic document, transaction or message, as well
as acknowledging informed consent by the signer.
Digital signatures have the same legal significance as
the more traditional forms of signed documents.
Digital Signature
The IT act 2000 has provided a legal recognition to
digital signature.
It uses public key cryptography.
Subscriber means a person in whose name the Digital
Signature Certificate is issued: the initial electronic
record was affixed with the digital signature by the use of
private key corresponding to the public key of the
subscriber.
Any person by using public key of the subscriber can
verify the electronic record.
The private key and the public key are unique to the
subscriber and constitute a functioning key pair
exza IT Center
Electronic Records
Attribution of Electronic records
An electronic record shall be attributed to the
originator—
 if it was sent by the original himself.
 by a person who had the authority to act on behalf of the
originator in respect of that electronic record.
 by an information system programmed by or on behalf of
the originator to operate automatically.
Digital Signature
Digital signature uses public key cryptography.
In public key cryptography one can make a encryption
key public without sacrificing the secrecy of the
information or decryption key.
Electronic Records
Acknowledgment of Receipt
Acknowledgment does not mean the acceptance.
Acknowledgment just signifies that the message has
been received. An acknowledgment may be given by—
 any communication by the addressee, automated or
otherwise
 any conduct of the addressee, sufficient to indicate to the
originator that the electronic record has been received.
exza IT Center
Electronic Records
Time and place of Dispatch & receipt of
electronic record
Dispatch of an electronic record" includes successful
communication of an electronic record to the intended
addressee.
 if the originator or the addresses has more than one place of
business, the principal place of business, should be the place of
business
 if the originator the addressee does not have a place of
business, his usual place of residence should be deemed to be
the place of business.
 usual place of residence in relation to a body corporate, means
the place where it is registered.
Ten Commandments of
Computing
Ten Commandments of
Computing
These are ethics principles written in statements.
Commandments of computing guides computer users and
professional about do’s and don’ts
1. Thou shalt not use a computer to harm ether people
2. Thou shalt not interfere with other people's computer work
3. Thou shalt not snoop around the other people's computer
files.
4. Thou shalt not use a computer for the purpose of steal
Ten Commandments of
Computing
5. Thou shalt not use a computer to bear a false witness.
6. Thou shalt not copy or use the software for which Thou
has not paid.
7. Thou shalt not use other people's computer resources
without authorization or proper compensation.
8. Thou shalt not copy or use or other people's intellectual
output
9. Thou shalt think about social consequence of the program
one is writing or the system one is designing.
10.Thou shalt always use a computer by means that show
due considerations and due respect for one’s fellow
humans. exza IT Center
What is Cyber Security?
Cyber Security is the body of technologies,
processes and practices
designed to protect networks, computers,
programs and data from attack, damage or
unauthorized access.
In a computing context, security includes both
cybersecurity and physical security.
Cyber Security
 Security is organizational concerns.
 The virus attacks, unethical hackers, crackers may
damage or corrupt or destroy or disclose information.
 "Security" is the quality or state of being protected from
unauthorized access or uncontrolled losses or effects.
 There are security procedures like passwords, encryption,
firewalls, digital signatures, antivirus, SSL (Secure Socket
Layers) to protect information.
Still it is impossible to achieve the absolute security in day to
day practice.
Cyber Security
The duty of day-to-day securing an electronic
record rests with the creator,
It's the responsibility of recipient to verify the
secured electronic record.
Intellectual Property Rights
Intellectual Property Rights
Intellectual Property Rights
 The intellectual property right consists of copyright,
trademarks patent, design and geographical indications.
 A person or a company can protect the rights against
infringers.
exza IT Center
Intellectual Property Rights
 IPR incudes following points:
1. Copyright
2. Fair Use
exza IT Center
Copyright
 Copyright is an intellectual property right attached to
original works in which the right exists with originator or
creator.
 Copyright is a form of protection provided by the law to the
authors of "original works of authorship".
 If you do any work originally, then you can place the
copyright symbol © next to your name.
Copyright
 Copyright law is useful for authorship determination,
duration of protection and requirement for transfer of right
to others.
 The copyright act can be applied to original literary work
including computer programs, databases, dramatic work,
musical work, Artistic work and Cinematograph of films.
exza IT Center
Fair Use
 Fair Use is the exceptional case of copyright which allows
copying of a limited amount of materials in certain cases
without permission of the copyright owner.
 Even for this use, whether a specific use is fair or not
depend on number of factors such as purpose, nature,
amount and effect.
exza IT Center
Intellectual Property Rights
Click on the given below link to learn how to avoid Copyright
Infringement
http://www.wikihow.com/Avoid-Copyright-Infringement
Shareware, Freeware and
Public Domain Software
 The distribution of software can be categorized into:
1. Shareware
2. Freeware
3. Public Domain Software
exza IT Center
Shareware
 Shareware programs can be freely distributed and freely
tested.
 This program can be shared with other user with owner's
permission.
 A trail period generally 30 days is given to test those
programs. After this trial period, the user who wants to
keep using the program has to register or pay a fee.
 The software which are made available with magazines
are normally of this type.
exza IT Center
Shareware
Software given in Magazine CDs are Shareware
Freeware
 Freeware is termed as free software that allow everyone to
copy, redistribute and modify it with free of cost.
 Its copyright is with the authors.
 Freeware is programming that is offered at no cost.
 Linux is an example of freeware.
exza IT Center
Open Source Software
 Open-source software (OSS) is computer software with its
source code made available with a license in which the
copyright holder provides the rights to study, change, and
distribute the software to anyone and for any purpose.
 Open-source software may be developed in a collaborative
public manner.
exza IT Center
Open Source Software
There are four sorts of freedom involved with open source
software: -
 You don't have to pay to download, install or use it, and it
is issued under a license which means you will always be
able to use it free-of-charge.
 - You are allowed to modify and add to the source code of
the software at will.
 - You are also allowed to redistribute the software either in
its original or modified forms. You are allowed to charge for
the software if you so desire.
 - You are allowed to use the software for any legal
purpose, including commercial enterprises.
Website to download
Open Source Software
sourceforge.net
Public Domain Software
 Public-domain software is software that has been placed in
the public domain:
 in other words, there is absolutely no ownership such as
copyright, trademark, or patent.
 It implies that the authors have waived copyright over the
software.
 Software in the public domain can be modified, distributed,
or sold even without any attribution by anyone.
 It can be incorporated into new works without paying
royalties for the original material.
exza IT Center
Thank You
See you in the next video
www.ITonlineExam.com
HSCITnotes.blogspot.in
Email: exzanet@gmail.com,
vikassawant@live.com
exza IT Center
Thank You
See you in the next video
For Online Exam Questions visit ITonlineExam.com

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 

What's hot (20)

Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Similar to HSC IT - Cyber Law and Ethics part 2

Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
Diya Mirza
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
Suryadev Maity
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
Anubhav
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
SuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
shahulgk
 

Similar to HSC IT - Cyber Law and Ethics part 2 (20)

IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
It act
It actIt act
It act
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 
Class it act
Class it actClass it act
Class it act
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

HSC IT - Cyber Law and Ethics part 2

  • 1. 2 . Cyber Law & Ethics – Part 2 By exza IT CenterFor Online Exam Questions visit : ITonlineExam.com
  • 2. Notes for Topics  Cyber Law  IT Act 2000 and definitions of terms  Encryption & Digital Signature  Ten Commandments of Computing  Cyber Security  Intellectual Property Rights  Copyright & Fairuse  Freeware & Shareware software  Open Source Software  Public Domain Software
  • 3. Cyber Law  With widespread usage of Internet, there is an increase in cyber crime. Cyber crimes such as spreading computer virus, hacking, online financial frauds, email spamming, phishing, etc. To get remedy of all these cyber crimes, IT Act in India was finally articulated. The Information Technology Act 2000 in year 2000 and its amendment in the year 2008.
  • 4. Cyber Law  Cyber law deals with issues generated by the use of computer and internet Cyber law examines the technological aspects of law. The name Information Technology Act has been suggested because it is the law which governs information processing. exza IT Center
  • 5. IT Act of India 2000 Definitions  IT Act 2000 is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication i.e. legal recognitions for transactions carried out by E- commerce.  E-Commerce is paperless method for carrying out transactions using electronic data exchange, electronic filing and electronic storage of information. exza IT Center
  • 6. IT Act of India 2000 Definitions  IT Act 2000 is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication i.e. legal recognitions for transactions carried out by E- commerce.  E-Commerce is paperless method for carrying out transactions using electronic data exchange, electronic filing and electronic storage of information. exza IT Center
  • 7. IT Act of India 2000 Definitions  IT Act 2000 is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication i.e. legal recognitions for transactions carried out by E- commerce.  E-Commerce is paperless method for carrying out transactions using electronic data exchange, electronic filing and electronic storage of information. exza IT Center
  • 8. IT Act of India 2000 Definitions 1. Access: means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.
  • 9. IT Act of India 2000 Definitions 2. Addressee: means a person who is intended by the originator to receive the electronic record but does not include any intermediary.
  • 10. IT Act of India 2000 Definitions 3.Computer: means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. IT Act of India 2000 Definitions 4. Computer network: means the interconnection of one or more computers through- (i) the use of satellite, microwave, terrestrial line or other communication media and (ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained.
  • 16.
  • 17.
  • 18. IT Act of India 2000 Definitions 5. Computer Resource: means computer, computer system, computer network, data and computer database software.
  • 19. IT Act of India 2000 Definitions 6. Computer System: means a device or collection of devices, containing computer programs, instructions, input data and output data, that performs logic, arithmetic, data storage and retrieval communication control and other functions.
  • 20. IT Act of India 2000 Definitions 7. Data: means a representation of information, knowledge, facts, concepts or which are being prepared or have been prepared in a form, storage and retrieval and communication or telecommunication from or within a computer.
  • 21. IT Act of India 2000 Definitions 8. Information: includes data, text, images, sound, voice, codes, computer programs, software and databases or micro film or computer generated micro fiche
  • 22. IT Act of India 2000 Definitions Before moving on to next set of terms used in IT Act, we will see some concepts which are required to understand the terms. exza IT Center
  • 23. What is Encryption?  Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.
  • 24.
  • 25. Digital Signature The purpose of digital signature is to provide authenticity to user for Information. It is a safeguard for information or data. Digital signatures secure your data by encoding it. It is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. exza IT Center
  • 26. Digital Signature The digital equivalent of a handwritten signature or stamped seal, but offering far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide the added assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed consent by the signer. Digital signatures have the same legal significance as the more traditional forms of signed documents.
  • 27.
  • 28. Digital Signature The IT act 2000 has provided a legal recognition to digital signature. It uses public key cryptography. Subscriber means a person in whose name the Digital Signature Certificate is issued: the initial electronic record was affixed with the digital signature by the use of private key corresponding to the public key of the subscriber. Any person by using public key of the subscriber can verify the electronic record. The private key and the public key are unique to the subscriber and constitute a functioning key pair
  • 30. Electronic Records Attribution of Electronic records An electronic record shall be attributed to the originator—  if it was sent by the original himself.  by a person who had the authority to act on behalf of the originator in respect of that electronic record.  by an information system programmed by or on behalf of the originator to operate automatically.
  • 31. Digital Signature Digital signature uses public key cryptography. In public key cryptography one can make a encryption key public without sacrificing the secrecy of the information or decryption key.
  • 32. Electronic Records Acknowledgment of Receipt Acknowledgment does not mean the acceptance. Acknowledgment just signifies that the message has been received. An acknowledgment may be given by—  any communication by the addressee, automated or otherwise  any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received. exza IT Center
  • 33. Electronic Records Time and place of Dispatch & receipt of electronic record Dispatch of an electronic record" includes successful communication of an electronic record to the intended addressee.  if the originator or the addresses has more than one place of business, the principal place of business, should be the place of business  if the originator the addressee does not have a place of business, his usual place of residence should be deemed to be the place of business.  usual place of residence in relation to a body corporate, means the place where it is registered.
  • 35. Ten Commandments of Computing These are ethics principles written in statements. Commandments of computing guides computer users and professional about do’s and don’ts 1. Thou shalt not use a computer to harm ether people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around the other people's computer files. 4. Thou shalt not use a computer for the purpose of steal
  • 36. Ten Commandments of Computing 5. Thou shalt not use a computer to bear a false witness. 6. Thou shalt not copy or use the software for which Thou has not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not copy or use or other people's intellectual output 9. Thou shalt think about social consequence of the program one is writing or the system one is designing. 10.Thou shalt always use a computer by means that show due considerations and due respect for one’s fellow humans. exza IT Center
  • 37. What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.
  • 38. Cyber Security  Security is organizational concerns.  The virus attacks, unethical hackers, crackers may damage or corrupt or destroy or disclose information.  "Security" is the quality or state of being protected from unauthorized access or uncontrolled losses or effects.  There are security procedures like passwords, encryption, firewalls, digital signatures, antivirus, SSL (Secure Socket Layers) to protect information. Still it is impossible to achieve the absolute security in day to day practice.
  • 39.
  • 40.
  • 41. Cyber Security The duty of day-to-day securing an electronic record rests with the creator, It's the responsibility of recipient to verify the secured electronic record.
  • 44.
  • 45. Intellectual Property Rights  The intellectual property right consists of copyright, trademarks patent, design and geographical indications.  A person or a company can protect the rights against infringers. exza IT Center
  • 46.
  • 47.
  • 48.
  • 49. Intellectual Property Rights  IPR incudes following points: 1. Copyright 2. Fair Use exza IT Center
  • 50. Copyright  Copyright is an intellectual property right attached to original works in which the right exists with originator or creator.  Copyright is a form of protection provided by the law to the authors of "original works of authorship".  If you do any work originally, then you can place the copyright symbol © next to your name.
  • 51. Copyright  Copyright law is useful for authorship determination, duration of protection and requirement for transfer of right to others.  The copyright act can be applied to original literary work including computer programs, databases, dramatic work, musical work, Artistic work and Cinematograph of films. exza IT Center
  • 52.
  • 53. Fair Use  Fair Use is the exceptional case of copyright which allows copying of a limited amount of materials in certain cases without permission of the copyright owner.  Even for this use, whether a specific use is fair or not depend on number of factors such as purpose, nature, amount and effect. exza IT Center
  • 54.
  • 55. Intellectual Property Rights Click on the given below link to learn how to avoid Copyright Infringement http://www.wikihow.com/Avoid-Copyright-Infringement
  • 56. Shareware, Freeware and Public Domain Software  The distribution of software can be categorized into: 1. Shareware 2. Freeware 3. Public Domain Software exza IT Center
  • 57.
  • 58. Shareware  Shareware programs can be freely distributed and freely tested.  This program can be shared with other user with owner's permission.  A trail period generally 30 days is given to test those programs. After this trial period, the user who wants to keep using the program has to register or pay a fee.  The software which are made available with magazines are normally of this type. exza IT Center
  • 59. Shareware Software given in Magazine CDs are Shareware
  • 60.
  • 61. Freeware  Freeware is termed as free software that allow everyone to copy, redistribute and modify it with free of cost.  Its copyright is with the authors.  Freeware is programming that is offered at no cost.  Linux is an example of freeware. exza IT Center
  • 62.
  • 63. Open Source Software  Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.  Open-source software may be developed in a collaborative public manner. exza IT Center
  • 64. Open Source Software There are four sorts of freedom involved with open source software: -  You don't have to pay to download, install or use it, and it is issued under a license which means you will always be able to use it free-of-charge.  - You are allowed to modify and add to the source code of the software at will.  - You are also allowed to redistribute the software either in its original or modified forms. You are allowed to charge for the software if you so desire.  - You are allowed to use the software for any legal purpose, including commercial enterprises.
  • 65.
  • 66. Website to download Open Source Software sourceforge.net
  • 67. Public Domain Software  Public-domain software is software that has been placed in the public domain:  in other words, there is absolutely no ownership such as copyright, trademark, or patent.  It implies that the authors have waived copyright over the software.  Software in the public domain can be modified, distributed, or sold even without any attribution by anyone.  It can be incorporated into new works without paying royalties for the original material. exza IT Center
  • 68. Thank You See you in the next video www.ITonlineExam.com HSCITnotes.blogspot.in Email: exzanet@gmail.com, vikassawant@live.com exza IT Center Thank You See you in the next video For Online Exam Questions visit ITonlineExam.com

Editor's Notes

  1. Message digests (also called hashes ) are commonly 128 bits to 160 bits in length and provide a digital identifier for each digital file or document. Message digest functions are mathematical functions that process information to produce a different message digest for each unique document. A cryptographic hash function is a hash function which takes an input (or 'message') and returns a fixed-size alphanumeric string. The string is called the 'hash value', 'message digest', 'digital fingerprint', 'digest' or 'checksum').
  2. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender can not easily repudiate it later. The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit
  3. How digital signatures work Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing. PRO+ Content Find more PRO+ content and other member only offers, here. Buyer's Handbook The digital certificate: How it works, which to buy E-Handbook Trusted? Certificate authority risks and how to manage them The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication). A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. A digital certificate, an electronic document that contains the digital signature of the certificate-issuing authority, binds together a public key with an identity and can be used to verify a public key belongs to a particular person or entity.
  4. Hashing: Finally, hashing is a form of cryptographic security which differs from encryption. Whereas encryption is a two step process used to first encrypt and then decrypt a message, hashing condenses a message into an irreversible fixed-length value, or hash. o create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature.
  5. How digital signatures work Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing. PRO+ Content Find more PRO+ content and other member only offers, here. Buyer's Handbook The digital certificate: How it works, which to buy E-Handbook Trusted? Certificate authority risks and how to manage them The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication). A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. A digital certificate, an electronic document that contains the digital signature of the certificate-issuing authority, binds together a public key with an identity and can be used to verify a public key belongs to a particular person or entity.
  6. How digital signatures work Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Using a public key algorithm such as RSA, one can generate two keys that are mathematically linked: one private and one public. To create a digital signature, signing software (such as an email program) creates a one-way hash of the electronic data to be signed. The private key is then used to encrypt the hash. The encrypted hash -- along with other information, such as the hashing algorithm -- is the digital signature. The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing. PRO+ Content Find more PRO+ content and other member only offers, here. Buyer's Handbook The digital certificate: How it works, which to buy E-Handbook Trusted? Certificate authority risks and how to manage them The value of the hash is unique to the hashed data. Any change in the data, even changing or deleting a single character, results in a different value. This attribute enables others to validate the integrity of the data by using the signer's public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn't changed since it was signed. If the two hashes don't match, the data has either been tampered with in some way (integrity) or the signature was created with a private key that doesn't correspond to the public key presented by the signer (authentication). A digital signature can be used with any kind of message -- whether it is encrypted or not -- simply so the receiver can be sure of the sender's identity and that the message arrived intact. Digital signatures make it difficult for the signer to deny having signed something (non-repudiation) -- assuming their private key has not been compromised -- as the digital signature is unique to both the document and the signer, and it binds them together. A digital certificate, an electronic document that contains the digital signature of the certificate-issuing authority, binds together a public key with an identity and can be used to verify a public key belongs to a particular person or entity.