Seminar on Information Technology Acts
 IT act chapter 8
 Conventional Crime
 Cyber Crime Issue
Generating key pair .
Acceptance of Digital Signature
Certificate.
Control of private key.
Where any Digital Signature Certificate, the public
key of which corresponds to the private
key of that subscriber which is to be listed in the
Digital Signature Certificate has been accepted by
a subscriber, then, the subscriber shall generate the
key pair by applying the security procedure.
 A subscriber shall be deemed to have accepted a Digital
Signature Certificate if he publishes or authorizes the
publication of a Digital Signature Certificate—
1. To one or more persons.
2. In a repository, or otherwise demonstrates his approval of
the Digital Signature Certificate in any manner.
 By accepting a Digital Signature Certificate the subscriber
certifies to all who reasonably rely on the information
contained in the Digital Signature Certificate
 Every subscriber shall exercise reasonable care to retain
control of the private key corresponding to the public key
listed in his Digital Signature Certificate.
 take all steps to prevent its disclosure to a person not
authorised to affix the digital signature of the subscriber.
 If the private key corresponding to the public key listed in
the Digital Signature Certificate has been compromised,
then, the subscriber shall communicate the same without
any delay to the Certifying Authority.
 Conventional crimes are those traditional, illegal behaviors
that most people think of as crime. Most crime is
conventional crime.
 Conventional crime includes murder, rape, assault, robbery,
burglary and theft. Cybercrime is just a conventional crime
committed with high-tech devices.
 Computer crime, or Cybercrime, refers to any crime
that involves a computer and a network.
Crimes that use computer networks or devices to
advance other ends include:
 Cyber stalking
 Fraud and identity theft
 Information warfare
 Phishing scams
 The InformationTechnology Act 2000 was passed by
the Parliament of India in May 2000, aiming to curb cyber
crimes and provide a legal framework for e-
commerce transactions.
 However Pavan Duggal, lawyer of Supreme Court of
India and cyber law expert, viewed "The IT Act, 2000, is
primarily meant to be a legislation to promote e-
commerce.
 A crime may be said to be any conduct accompanied by
act or omission prohibited by law and consequential
breach of which is visited by penal consequences.
 Where as cyber crime is unlawful acts wherein the
computer is either a tool or target or both.
 There is apparently no distinction between cyber and
conventional crime
 Children and adolescents between the age group of 6 – 18
years -
E.g. the Bal Bharati (Delhi) case was the outcome of harassment of
the delinquent by his friends.
 Organized hackers-
These kinds of hackers are mostly organized together to fulfill
certain objective.
 Professional hackers / crackers –
Their work is motivated by the color of money.
 Discontented employees-
This group include those people who have been either sacked by
their employer or are dissatisfied with their employer.
It act chapter 8

It act chapter 8

  • 1.
    Seminar on InformationTechnology Acts
  • 2.
     IT actchapter 8  Conventional Crime  Cyber Crime Issue
  • 3.
    Generating key pair. Acceptance of Digital Signature Certificate. Control of private key.
  • 4.
    Where any DigitalSignature Certificate, the public key of which corresponds to the private key of that subscriber which is to be listed in the Digital Signature Certificate has been accepted by a subscriber, then, the subscriber shall generate the key pair by applying the security procedure.
  • 5.
     A subscribershall be deemed to have accepted a Digital Signature Certificate if he publishes or authorizes the publication of a Digital Signature Certificate— 1. To one or more persons. 2. In a repository, or otherwise demonstrates his approval of the Digital Signature Certificate in any manner.  By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate
  • 6.
     Every subscribershall exercise reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Certificate.  take all steps to prevent its disclosure to a person not authorised to affix the digital signature of the subscriber.  If the private key corresponding to the public key listed in the Digital Signature Certificate has been compromised, then, the subscriber shall communicate the same without any delay to the Certifying Authority.
  • 7.
     Conventional crimesare those traditional, illegal behaviors that most people think of as crime. Most crime is conventional crime.  Conventional crime includes murder, rape, assault, robbery, burglary and theft. Cybercrime is just a conventional crime committed with high-tech devices.
  • 8.
     Computer crime,or Cybercrime, refers to any crime that involves a computer and a network. Crimes that use computer networks or devices to advance other ends include:  Cyber stalking  Fraud and identity theft  Information warfare  Phishing scams
  • 9.
     The InformationTechnologyAct 2000 was passed by the Parliament of India in May 2000, aiming to curb cyber crimes and provide a legal framework for e- commerce transactions.  However Pavan Duggal, lawyer of Supreme Court of India and cyber law expert, viewed "The IT Act, 2000, is primarily meant to be a legislation to promote e- commerce.
  • 10.
     A crimemay be said to be any conduct accompanied by act or omission prohibited by law and consequential breach of which is visited by penal consequences.  Where as cyber crime is unlawful acts wherein the computer is either a tool or target or both.  There is apparently no distinction between cyber and conventional crime
  • 11.
     Children andadolescents between the age group of 6 – 18 years - E.g. the Bal Bharati (Delhi) case was the outcome of harassment of the delinquent by his friends.  Organized hackers- These kinds of hackers are mostly organized together to fulfill certain objective.  Professional hackers / crackers – Their work is motivated by the color of money.  Discontented employees- This group include those people who have been either sacked by their employer or are dissatisfied with their employer.