3. Generating key pair .
Acceptance of Digital Signature
Certificate.
Control of private key.
4. Where any Digital Signature Certificate, the public
key of which corresponds to the private
key of that subscriber which is to be listed in the
Digital Signature Certificate has been accepted by
a subscriber, then, the subscriber shall generate the
key pair by applying the security procedure.
5. A subscriber shall be deemed to have accepted a Digital
Signature Certificate if he publishes or authorizes the
publication of a Digital Signature Certificate—
1. To one or more persons.
2. In a repository, or otherwise demonstrates his approval of
the Digital Signature Certificate in any manner.
By accepting a Digital Signature Certificate the subscriber
certifies to all who reasonably rely on the information
contained in the Digital Signature Certificate
6. Every subscriber shall exercise reasonable care to retain
control of the private key corresponding to the public key
listed in his Digital Signature Certificate.
take all steps to prevent its disclosure to a person not
authorised to affix the digital signature of the subscriber.
If the private key corresponding to the public key listed in
the Digital Signature Certificate has been compromised,
then, the subscriber shall communicate the same without
any delay to the Certifying Authority.
7. Conventional crimes are those traditional, illegal behaviors
that most people think of as crime. Most crime is
conventional crime.
Conventional crime includes murder, rape, assault, robbery,
burglary and theft. Cybercrime is just a conventional crime
committed with high-tech devices.
8. Computer crime, or Cybercrime, refers to any crime
that involves a computer and a network.
Crimes that use computer networks or devices to
advance other ends include:
Cyber stalking
Fraud and identity theft
Information warfare
Phishing scams
9. The InformationTechnology Act 2000 was passed by
the Parliament of India in May 2000, aiming to curb cyber
crimes and provide a legal framework for e-
commerce transactions.
However Pavan Duggal, lawyer of Supreme Court of
India and cyber law expert, viewed "The IT Act, 2000, is
primarily meant to be a legislation to promote e-
commerce.
10. A crime may be said to be any conduct accompanied by
act or omission prohibited by law and consequential
breach of which is visited by penal consequences.
Where as cyber crime is unlawful acts wherein the
computer is either a tool or target or both.
There is apparently no distinction between cyber and
conventional crime
11. Children and adolescents between the age group of 6 – 18
years -
E.g. the Bal Bharati (Delhi) case was the outcome of harassment of
the delinquent by his friends.
Organized hackers-
These kinds of hackers are mostly organized together to fulfill
certain objective.
Professional hackers / crackers –
Their work is motivated by the color of money.
Discontented employees-
This group include those people who have been either sacked by
their employer or are dissatisfied with their employer.