Top Banner
Information Technology Act 2000
30
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Final It Act Ppt

Information Technology Act 2000

Page 2: Final It Act Ppt

Presented by

Samira Baptista - 01

Minelli Coelho - 03

Delina D’souza - 05

Nitin D’souza - 07

Lowell John - 09

Jenny Fernandes - 11

Alisha Henriques - 13

Tejas Kadam - 15

Page 3: Final It Act Ppt

Usage & Importance of IT

• Access to variety of resources

• Immediacy to information

• Authentic and up to date information

• Access to online libraries

• Access to the source of information

• Multiple communication channels

• Reduces time on many routine tasks

• Paper work eliminated

Page 4: Final It Act Ppt

Need for Legal Framework

Page 5: Final It Act Ppt

IT Act 2000The Model

Law on Electronic Commerce

Legal Recognition

for Transactions

Efficient Delivery of Government

Services

Electronic Filing of

Documents

Give legal Recognition to

Digital Signature

Electronic Book of

Accounts

Protect Privacy of Internet

Users

Stop Computer Crime

Page 6: Final It Act Ppt

Important Definitions

Page 7: Final It Act Ppt

Access

Addressee means a person who is intended by the originator to receive the electronic record but does not include any intermediary.

It means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network

Addressee

Page 8: Final It Act Ppt

Data and Information

• Data is a representation of a fact, number, word, image, or sound such as time, date, prices, name, numbers of items sold etc• Information is processed data that is meaningful or useful to someone such as Salary slip of an employee, evaluation report of a student etc.

Characteristics of information:• Timeliness: It should be available at the correct time.• Completeness: It should be sufficient for the purpose.• Accuracy: It should be correct and reliable.• Understandability: It should be clear in meaning, practical and simple.

Page 9: Final It Act Ppt

Public key

A value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures

Private key

A private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages.

Page 10: Final It Act Ppt

Crypto

• Cryptology is the art and science of making and breaking “secret codes”• Cryptography is making of “secret codes”• Cryptoanalysis is breaking of “secret codes”• Crypto is a synonym for all of the above

Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The reverse process to make the encrypted information readable again is referred to as decryption.

Encryption & Decryption

Page 11: Final It Act Ppt
Page 12: Final It Act Ppt

Digital Signature

Page 13: Final It Act Ppt

Cybercrime

Internet

Pros Cons

Cyber Crime

Criminal Activity in which Computers or Computer

Networks are a Tool

Narrow and

Broad

Page 14: Final It Act Ppt

Cybercrime in India

Karnata

kaKeral

a

Mah

arash

tra

Andhra Prad

esh

Rajasth

an

Punjab

Chhattisga

rh

153 148 142

105

52 52

0

104

6646

Report of National Crime Records Bureau 2010

Cyber Crime Cases Hacking

Page 15: Final It Act Ppt

Classification of Cybercrime

Cybercrime

Against Person Against Property

Against Government

Page 16: Final It Act Ppt

Types of Cyber Crime

• Hacking• Cyber Stalking• Denial Of Service Attack• Virus Dissemination• Software Piracy• Spoofing• Salami attack• Cyber terrorism• Sale of narcotics• Child Pornography

Page 17: Final It Act Ppt

Hacking• Illegal intrusion into computer system and/or

network.• Motive behind crime

– Greed– Power– Publicity– Revenge– Adventure– Desire to access forbidden information– Destructive mindset– Wants to sell n/w security service

Page 18: Final It Act Ppt

Denial of Service

A denial-of-service attack (DoS attack) or distributed

denial-of-service attack (DDoS attack) is an attempt to

make a computer or network resource unavailable to its

Intended users.

Page 19: Final It Act Ppt

Cyber stalking• Stalking is following someone around in a way that makes them

feel hunted or not safe in some other way• Cyber stalking is when the stalker uses the Internet to contact or

follow that person•  Stalker may make direct contact with that person, they may send

nasty messages to that person or spread lies about them to others• Phishing

Page 20: Final It Act Ppt

PhishingFrom: *****Bank [mailto:support@****Bank.com]

Sent: 08 January 2011 03:25

To: India

Subject: Official information from ***** Bank

Dear valued ***** Bank Customer!

For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you.

http://infinity.*****bank.co.in/Verify.jsp

Page 21: Final It Act Ppt

Impact on Banking Sector

Barter system

Coin

NotesPlastic money

Page 22: Final It Act Ppt

Impact on Banking Sector

ATM fraud

Money Laundering

Credit Card fraud

Page 23: Final It Act Ppt

• Tampering• Hacking• Publishing obscene

information• Publication for fraudulent

purpose

Offences & Penalties

• Misrepresentation• Breach of confidentiality

and privacy• Publishing false digital

signature certificate• Confiscation

Page 24: Final It Act Ppt

NASSCOM

4 E framework for trusted sourcing

Engage

Educate

Enact

Enforcement

Page 25: Final It Act Ppt

Engage• Global & National Advisory board• Meet all stakeholders in India and key markets

Educate• Seminars• Create Intellectual capital

Enact• Examine areas to strengthen legal framework in India• Work with regulators to identify relevant provisions

Enforcement• To train policemen to effectively deal with the

emerging crimes scene

Page 26: Final It Act Ppt

IT System Control and Audit

• Knowledge of internal control practices and the control philosophy

• Methodologies for successful design and implementation of systems

• Supports the auditor’s judgment on the quality of the information processed

• Examination and verification of the organization’s compliance with any IT-related legal issues

• Assessment of information security and privacy issues

Page 27: Final It Act Ppt

Amendments2008

Digital Signature Electronic Signature

Communicative Device

Damage to Computer

Damage to Person

Corporate Misuse of Personal Information

Page 28: Final It Act Ppt

Amendments

2011

Maintain Certain Specified Security Standards

Register Cyber Cafe

Page 29: Final It Act Ppt

Survey Analysis

Knowledge of IT

Act

Impac

t on Busin

ess

Prevention of C

C

Identity Lo

g

Personal

Control o

f Illega

l Site

Restrict

Sites

Authentic S

oftware

Victim of C

C0%

20%

40%

60%

80%

100%

NoYes

Source: Primary data from 5 cyber cafes around Mumbai

Page 30: Final It Act Ppt