final it act ppt
TRANSCRIPT
![Page 1: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/1.jpg)
Information Technology Act 2000
![Page 2: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/2.jpg)
Presented by
Samira Baptista - 01
Minelli Coelho - 03
Delina D’souza - 05
Nitin D’souza - 07
Lowell John - 09
Jenny Fernandes - 11
Alisha Henriques - 13
Tejas Kadam - 15
![Page 3: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/3.jpg)
Usage & Importance of IT
• Access to variety of resources
• Immediacy to information
• Authentic and up to date information
• Access to online libraries
• Access to the source of information
• Multiple communication channels
• Reduces time on many routine tasks
• Paper work eliminated
![Page 4: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/4.jpg)
Need for Legal Framework
![Page 5: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/5.jpg)
IT Act 2000The Model
Law on Electronic Commerce
Legal Recognition
for Transactions
Efficient Delivery of Government
Services
Electronic Filing of
Documents
Give legal Recognition to
Digital Signature
Electronic Book of
Accounts
Protect Privacy of Internet
Users
Stop Computer Crime
![Page 6: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/6.jpg)
Important Definitions
![Page 7: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/7.jpg)
Access
Addressee means a person who is intended by the originator to receive the electronic record but does not include any intermediary.
It means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network
Addressee
![Page 8: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/8.jpg)
Data and Information
• Data is a representation of a fact, number, word, image, or sound such as time, date, prices, name, numbers of items sold etc• Information is processed data that is meaningful or useful to someone such as Salary slip of an employee, evaluation report of a student etc.
Characteristics of information:• Timeliness: It should be available at the correct time.• Completeness: It should be sufficient for the purpose.• Accuracy: It should be correct and reliable.• Understandability: It should be clear in meaning, practical and simple.
![Page 9: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/9.jpg)
Public key
A value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures
Private key
A private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages.
![Page 10: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/10.jpg)
Crypto
• Cryptology is the art and science of making and breaking “secret codes”• Cryptography is making of “secret codes”• Cryptoanalysis is breaking of “secret codes”• Crypto is a synonym for all of the above
Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The reverse process to make the encrypted information readable again is referred to as decryption.
Encryption & Decryption
![Page 11: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/11.jpg)
![Page 12: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/12.jpg)
Digital Signature
![Page 13: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/13.jpg)
Cybercrime
Internet
Pros Cons
Cyber Crime
Criminal Activity in which Computers or Computer
Networks are a Tool
Narrow and
Broad
![Page 14: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/14.jpg)
Cybercrime in India
Karnata
kaKeral
a
Mah
arash
tra
Andhra Prad
esh
Rajasth
an
Punjab
Chhattisga
rh
153 148 142
105
52 52
0
104
6646
Report of National Crime Records Bureau 2010
Cyber Crime Cases Hacking
![Page 15: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/15.jpg)
Classification of Cybercrime
Cybercrime
Against Person Against Property
Against Government
![Page 16: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/16.jpg)
Types of Cyber Crime
• Hacking• Cyber Stalking• Denial Of Service Attack• Virus Dissemination• Software Piracy• Spoofing• Salami attack• Cyber terrorism• Sale of narcotics• Child Pornography
![Page 17: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/17.jpg)
Hacking• Illegal intrusion into computer system and/or
network.• Motive behind crime
– Greed– Power– Publicity– Revenge– Adventure– Desire to access forbidden information– Destructive mindset– Wants to sell n/w security service
![Page 18: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/18.jpg)
Denial of Service
A denial-of-service attack (DoS attack) or distributed
denial-of-service attack (DDoS attack) is an attempt to
make a computer or network resource unavailable to its
Intended users.
![Page 19: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/19.jpg)
Cyber stalking• Stalking is following someone around in a way that makes them
feel hunted or not safe in some other way• Cyber stalking is when the stalker uses the Internet to contact or
follow that person• Stalker may make direct contact with that person, they may send
nasty messages to that person or spread lies about them to others• Phishing
![Page 20: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/20.jpg)
PhishingFrom: *****Bank [mailto:support@****Bank.com]
Sent: 08 January 2011 03:25
To: India
Subject: Official information from ***** Bank
Dear valued ***** Bank Customer!
For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you.
http://infinity.*****bank.co.in/Verify.jsp
![Page 21: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/21.jpg)
Impact on Banking Sector
Barter system
Coin
NotesPlastic money
![Page 22: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/22.jpg)
Impact on Banking Sector
ATM fraud
Money Laundering
Credit Card fraud
![Page 23: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/23.jpg)
• Tampering• Hacking• Publishing obscene
information• Publication for fraudulent
purpose
Offences & Penalties
• Misrepresentation• Breach of confidentiality
and privacy• Publishing false digital
signature certificate• Confiscation
![Page 24: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/24.jpg)
NASSCOM
4 E framework for trusted sourcing
Engage
Educate
Enact
Enforcement
![Page 25: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/25.jpg)
Engage• Global & National Advisory board• Meet all stakeholders in India and key markets
Educate• Seminars• Create Intellectual capital
Enact• Examine areas to strengthen legal framework in India• Work with regulators to identify relevant provisions
Enforcement• To train policemen to effectively deal with the
emerging crimes scene
![Page 26: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/26.jpg)
IT System Control and Audit
• Knowledge of internal control practices and the control philosophy
• Methodologies for successful design and implementation of systems
• Supports the auditor’s judgment on the quality of the information processed
• Examination and verification of the organization’s compliance with any IT-related legal issues
• Assessment of information security and privacy issues
![Page 27: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/27.jpg)
Amendments2008
Digital Signature Electronic Signature
Communicative Device
Damage to Computer
Damage to Person
Corporate Misuse of Personal Information
![Page 28: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/28.jpg)
Amendments
2011
Maintain Certain Specified Security Standards
Register Cyber Cafe
![Page 29: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/29.jpg)
Survey Analysis
Knowledge of IT
Act
Impac
t on Busin
ess
Prevention of C
C
Identity Lo
g
Personal
Control o
f Illega
l Site
Restrict
Sites
Authentic S
oftware
Victim of C
C0%
20%
40%
60%
80%
100%
NoYes
Source: Primary data from 5 cyber cafes around Mumbai
![Page 30: Final It Act Ppt](https://reader033.vdocuments.net/reader033/viewer/2022061106/5447ef96b1af9f21088b510d/html5/thumbnails/30.jpg)