One of the most extensive and coolest presentations i have made so far on the IT act in India, its implementation and an overview of cyber crimes in India
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
Professional Issues in IT - Intellectual Property Basics
Reference : Tavani, Herman T., “Ethics and technology: controversies, questions, and strategies for ethical computing” , 4th Edition.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
The internet is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is cyber crime- illegal activity committed on the internet.
Professional Issues in IT - Intellectual Property Basics
Reference : Tavani, Herman T., “Ethics and technology: controversies, questions, and strategies for ethical computing” , 4th Edition.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
Abdul Kader Baba CIO, Infrastructure South Africa on Managing Cybersecurity Risks and Compliance Requirements in the Public Sector at Public Sector Cybersecurity. #PublicSec2024
2023 es el año de la irrupción generalizada de la Inteligencia Artificial, y las empresas y los usuarios se están beneficiando de ellas; sin embargo los atacantes también lo hacen y aprovechan generando ataques cada vez más sofisticados, que impactan una superficie de ataque extendida en muchos vectores. Cómo entender la ciberseguridad en esta realidad y prevenir los ataques para evitar su impacto en nuestras vidas
Technology Disruption in the New Normal, Digital Inclusion and the LawBenjamin Ang
Technology disruption has swept through legal practice and the justice system, as it has in every other aspect of life in our new normal of remote work and online access. While digital transformation has been hugely beneficial to our society, there are new legal and cybersecurity questions that we need to grapple with as we continue to serve the public. Among the public, varying levels of digital capability and access raise new issues of digital inclusion for us to address in policy and operations. This talk seeks to raise awareness of these issues and to develop ideas for practical application.
This is a book review of the book titled 'Smart things to know about change' done for the first semester of my MMS degree. Very proud of this one and how it came out :)
Impact of microfinance on the indian economyMeghana Bhogle
This is a presentation i made for my first year as a management student. An overview of micro-credit and it's advantages as also the various organizations that help facilitate the same
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
4. INTRODUCTION
Cyber Crime is any criminal activity done using computers and the
Internet
The focus of the IT Act 2000 was recognition of electronic records and
facilitation of e –commerce
However, the amended IT Act 2008 focuses on Cyber Terrorism and to a
significant extent, Cyber Crime
Issues related to electronic transactions, digital signatures, hacking and
network service providers are covered
5. DEFINITIONS
Access
Computer
Computer Network
Information
Data
Electronic Record
6. MOST COMMON CYBER CRIMES
Phishing
Hacking
Publishing of Obscene Content
Cyber Squatting
Cyber Defamation
7. DIGITAL SIGNATURES
• It is a mathematical scheme for demonstrating the authenticity of a
digital message or document
• Section 3A: Any subscriber may authenticate electronic records by
Electronic Signatures
• Now ‘Digital Signature’ has been made a subset of ‘Electronic Signature’
• Ensures Authentication, Integrity and Non-repudiation
8.
9. LICENSED CAs IN INDIA
Safescrypt (www.safescrypt.com)
NIC (www.nic.in)
IDRBT (www.idrbtca.org.in)
TCS (www.tcs-ca.tcs.co.in)
MTNL Trustline (www.mtnltrustline.com)
GNFC (www.ncodesolutions.com)
e-Mudhra CA (www.e-Mudhra.com)
11. RELEVANT SECTIONS OF THE IT ACT
• Section 66 :
• Hacking and gaining unauthorized access
• Any person who dishonestly, fraudulently indulges in actions as
mentioned in Section 43
• Section 67 :
• Publishing content in electronic form which is obscene
• Any person who circulates/publishes sexually explicit/pornographic
content in electronic form
13. VALIDITY OUTSIDE INDIA
• Section 75 :
• Act to apply for offence or contravention committed outside India
• The provision for the act shall also apply to any offence or
contravention committed outside India by any person irrespective of
his nationality
15. NETWORK PROVIDERS
• Section 79 :
• Network Service providers not to be liable in certain cases
• An intermediary shall not be liable for any third party information data
or communication link made available or hosted by him; subject to
some conditions.
19. STATISTICS
CYBER CRIMES 2009 2010 % change
Cases Arrested Cases Arrested Cases Arrested
1. Tampering computer 21 6 64 79 204 1216.7
source documents
2. Hacking with computer system
a. Loss and damage to 115 63 346 233 200.8 269.8
computer resource
b. Hacking 118 44 164 61 38.9 38.6
3. Publication and 139 141 328 361 135.9 156
transmission of obscene
material
TOTAL (Including Other 420 288 966 799 128.4 177.4
Cases)
20. ADVANTAGES OF THE ACT
Empowers the government departments to accept filing, creating and
retention of official documents in the digital format
The Act legalizes the e-mail as a mode of communication
Digital Signatures and Digital Records can be used as legal and valid
proof for launching litigation in a court of law
Provides statutory remedy to corporates in case the crime against the
accused for breaking into their computer systems or network and
damaging and copying the data is proven
21. LOOPHOLES IN THE ACT
Inapplicability
Digital Signatures: Recognizes only PKI System
Powers of Adjudicating Officers unclear.
Possible Violation of Fundamental Rights
Misuse of Police Powers
No IPR Protection Guaranteed
No mention of ‘Spamming’
22. AWARENESS SURVEY ANALYSIS
Received Spam Mail? What did you do about it?
Deleted
No Marked it after
13% as spam opening
29% it
21%
Deleted
Yes it
87% without
opening
it
50%
Do you check for Secured
Which is NOT a Cyber Crime? Connections?
No
Spamming 10%
13%
Unaware of
Sniffing such a
12% concept
17%
Phishing
5% Biting Yes
67% 73%
Hacking
3%
23. NASSCOM
• Objective:
• To build a growth led and sustainable technology and business services
sector in the country.
• Functions:
• Partnership with the government
• Research on IT and ITES protection of intellectual property
rights
• Reinforce the brand equity of Indian IT and ITES industries
• Increase talent pool in India
• Case-study: Nasscom vs. Ajay Sood & Others
24. ROLE OF IT IN INDIAN BANKING SECTOR
• A paradigm shift.
• Internet has emerged as an important medium for delivery of banking
products & services.
• The Information Technology Act, 2000 has given legal recognition to
creation, transmission and retention of an electronic (or magnetic) data
to be treated as valid proof in a court of law
• Some Technology products in Banking sector include:
• Net Banking
• Online payment of Excise and Service Tax
25. ADVANTAGES TO BANKING SECTOR
• Improved the factors in service quality like:
responsiveness, communication and access.
• It’s generally secure
• Provides 24 hour access
• Allows access to one’s account from virtually
anywhere
• Enhances speed and reliability of financial operations
• Facilitates newer delivery channels like:
• ATMs
• Mobile Banking
• Use of De-mat accounts helps users trade shares online
26. COMBATING CYBER CRIME
• Spam – Filters for E-mails
• Regular Backup of Important data
• Periodic Virus Scan, Malware Scan & Spyware Scan.
• Avoid publishing personal details online.
• While transacting online:
• Check for Valid SSL Certificate
• Check for secured connection (HTTPS)
• In case of any attack or suspicion, do not hesitate to lodge a complaint
with the Cyber Crime Investigation Cell in your city.
• Visit: http://infosecawareness.in/cyber-crime-cells-in-india to find
your nearest CCIC.
27. CONCLUSION
The IT Act is a comprehensive piece of legislation which aims at policing
some of the activities over the Internet
Awareness regarding these cyber laws must be created
Trained law enforcement officials for effective enforcement
Overhaul of judicial system and entire mechanism to deliver justice at
quick speed
Stringent punishments to kill the motive of the criminals
The Act is not the end but only a beginning to a
plethora of legislation that still needs to be formed.