Вы находитесь на странице: 1из 33

IT ACT 2000

The Information Technology act , 2000 received the


assent of president of India on 9 June 2000 and came
into force from 17 October in that same year .
The act was enacted to provide legal recognition for
transaction carried out by means of electronic data
interchange and other means of electronic communication
, commonly referred to as Electronic Commerce , to
facilitate electronic filling of documents with governments
agencies which involve the use of alternative to paper
based method of communication and storage information.
This law applies to any kind of information in the form of
data message used in the context of commercial activities.
Objective

To grant legal recognition for transaction carried out by


means of electronic data interchange and other means of
electronic communication;
To give legal recognition to digital signature / electronic
signature for authentication accepting of any information
or matter which require authentication under any law;
To facilitate electronic of documents with Government
departments;
To facilitate electronic storage of data ;
To facilitate and give legal sanction to electronic fund
transfer between banks and financial institution ;
To give legal recognition for keeping books of account by
bankers in electronic form.
DIGITAL SIGNATURE
DIGITAL SIGNATURE

A digital signatureis an electronic scheme for demonstrating the


authenticity of a digital message or document. A valid digital signature
gives recipient a reason to believe that the message was created by a
known sender and that it was not altered in transit. Digital signatures
are commonly used for software distribution, financial transactions, and
in other cases where it is important to detect imitation or tampering.

A digital signature is issued by a Certification Authority (CA)


It contains:-
Owner's public key.
the Owner's name.
Expiration date of the public key.
the Name of the issuer.
Serial number of the digital signature.
the digital signature of the issuer.
Diagram showing how a simple digital signature is applied and then verified
SECURE DIGITAL SIGNATURE
A Secure Digital Signature is one, which is:

1. Unique to the subscriber affixing it.

2. Capable of identifying such subscriber.

3. Created in a manner that if electronic record was


altered, the digital signature would be invalidated.
USES OF DIGITAL
SIGNATURE
There are basic three uses :

1. Digital Signature Certificate can be used to access


secured zones of web sites.

2. Digital Signature Certificate is used to digitally sign


your emails sent through Outlook Express/ MS-
Outlook etc.

3. To publish electronic versions of the budget, public


and private laws, and government bills.
DIGITAL SIGNATURE
CERTIFICATE
It means a certificate for digital signature, issued
under section 35(4).
Any person may make an application to the
Certifying Authority for the issue of Digital Signature
Certificate with a fee not exceeding Rs. 25000.
Credentials required are
Proof of identity- a self attested copy of
PAN card, valid active PAN with income tax
department.
Proof of Permanent Residence.
A Digital Signature Certificate is normally valid for 1
or 2 years, after which renewal is required.
E-Governance,
E-Commerce & M commerce
WHAT IS E-GOVERNANCE ?

E-governance can be defined as the use of


information and communication technologies by
governments to enhance the range and quality of
information and other services provided to the
citizens in a cost effective & convenient manner.

Makes the government transparent


TYPES OF INTERACTIONS IN E-
GOVERNANCE
1. G2C (Government to Citizens)
In this case, an interface is created between the
government and citizens which enables the citizens to
benefit from efficient delivery of a large range of public
services.

2. G2B (Government to Businesses)


Here, e-governance tools are used to aid the business
community-providers of goods and services- to
seamlessly interact with the government. The objective
is to cut red tape, save time,
reduce operational costs and to create a more
transparent business environment when dealing with
the government.
G2E (Government to Employees)
This interaction is a two-way process between the organisation
and the employee which helps in fast and efficient service on
one hand and increase satisfaction levels of employees on the
other.

G2G (Government to Governments)


This kind of interaction is only within the sphere of government
and can be both horizontal and vertical. Horizontal interaction
means between different government agencies, as well as
between different
functional areas within an organization, and vertical interaction
means between national, state and local government agencies,
or different levels within an organization.
Electronic Commerce (E-
Commerce)
Commerce refers to all the activities related to the
purchase and sales of goods or services i.e.
marketing, sales, payment, fulfillment, customer
services etc.

Electronic commerce is doing commerce with the


use of computer networks and commerce enabled
software (more than just online shopping).
TYPES OF E COMMERCE
FEATURE OF E-COMMERCE
Online business

Covers vast amount of B2B and B2C

Advertisement

Anytime and anywhere service

Direct contact between buyer and seller

Reduction of cost

Medium of interaction

Expand the business


SCOPE OF E-COMMERCE
E-Payment
It does not involve physical exchange of currency. Its convenient to
make payment via network.
E-Banking
It means anywhere any time banking
E-Marketing
The growth of internet has created opportunities for consumer and
firms to participate in online global market place
E-Security
It is system to protect data and system through use of adequate
precautions
E-Governance
It is technology law which confers authority on government, to
issue notification as well as accept fillings, payment of fees etc.
E-Commerce Applications

Video on demand

Remote banking

Purchasing

Online marketing and advertisement

Home shopping

Auctions
M COMMERCE

M-commerce (mobile commerce) is the buying and


selling of goods and services through wireless handheld
devices such ascellular telephoneand personal digital
assistants (PDAs).
Known as next-generatione-commerce, m-commerce
enables users to access the Internet without needing to
find a place to plug in.
The emerging technology behind m-commerce, which is
based on the Wireless Application Protocol (WAP), has
made far greater strides, where mobile devices
equipped with Web-ready micro-browsers are much
more common.
ADVANTAGES OF MOBILE
COMMERCE
This M Commerce is beneficial for both type of businesses large scale and
small scale. The mobile users increase day by day, so through M
Commerce your business gets large and growing market place for wild
range of goods and services.
Cover wider distance:Mobile is the only technology which is now
become necessary for any person in social and business life than
computers. So, it is easy to reach users through M Commerce.
Consumer deals :As more users use M Commerce, there are lots of
companies use M Commerce site to reach them by giving different and
better deals in comparison of their competitor.
Savings :Companies try to reach to the consumer directly through
M Commerce, so users have no need to go far to the store
physically and at the end it saves users time and money.
Easy to use :There is no need of skilled consumer. Buyers can have
look thousands of items on their cell phones and there is no need of
online checkout process.
DISADVANTAGES OF MOBILE
COMMERCE :

Every invention has its own merits and demerits. It is applicable in this
M Commerce business also.
Smart phone limitation :Mobile has no big screen like desktop or
laptops, so sometimes users tired to navigate more and more to choose
just one item from thousands. It affects shopping rates.
Habituate :Every new technology has some problem at the starting
phase. Here M Commerce is new application, so sometimes people avoid
to change which are rapidly change. As they are habituate to buy
products from E Commerce.
Risk factor :Each business has its own risk. Same M Commerce is the
growing field and a lot of investment in this field is become risky.
Because technology change day by day. Moreover, there less security in
wireless network, so in data transfer hacking chances are more.
Connectivity :M Commerce needs high speed connectivity of 3G.
Otherwise it is become hectic for user to go through entire product
purchase process.
PENALTY & OFFENCES

If any person without permission of the owner or any other


person who is in charge of a computer, computer system or
computer network,
(a) accesses or secures access to such computer,
computer system or computer network;
(b) downloads, copies or extracts any data, computer data
base or information from such computer, computer system
or computer network including information or data held or
stored in any removable storage medium;
(c) introduces or causes to be introduced any computer
contaminant or computer virus into any computer, computer
system or computer network;
(d) damages or causes to be damaged any computer, computer
system or computer network, data, computer data base or any
other programmes residing in such computer, computer system
or computer network;
(e) disrupts or causes disruption of any computer, computer
system or computer network;
(f) denies or causes the denial of access to any person
authorised to access any computer, computer system or
computer network by any means;
(g) provides any assistance to any person to facilitate access to
a computer, computer system or computer network in
contravention of the provisions of this Act, rules or regulations
made there under the Act
(h) charges the services availed of by a person to the account of
another person by tampering with or manipulating any
computer, computer system, or computer network,

he shall be liable to pay damages by way of compensation


not exceeding one crore rupees to the person so affected.
CYBER CRIME
CYBER CRIME
Any criminal activity that uses a computer either as an
instrumentality, target or a means for perpetuating
further crimes comes within the sphere of cyber crime

Reasons for increase in cyber crime are easy to


access, complex, negligence and loss of evidence.

Cybercrime can be against individuals, individual


properties, organisation and society.
CLASSIFICATION OF CYBER
CRIME
AgainstIndividuals:
i. Harassment via e-mails.
ii. Cyber-stalking.
iii. Dissemination of obscene material.
iv. Defamation.
v. Unauthorized control/access over computer system.
vi. Email spoofing.
vii. Cheating & Fraud.
Against Individual Property: -
i. Computer vandalism.
ii. Transmitting virus.
iii. Unauthorized control/access over
computer system.
iv. Intellectual Property crimes
Against Organization: -

i. Unauthorized control/access over computer


system
ii. Possession of unauthorized information.
iii. Cyber terrorism against the government
organization.
iv. Distribution of pirated software etc.

Against Society at large: -

i. Pornography (basically child pornography).


ii. Polluting the youth through indecent
exposure.
iii. Financial crimes
iv. Sale of illegal articles
v. Online gambling
vi. Forgery
PREVENTION OF CYBER CRIME
Avoid disclosing any information pertaining to
oneself.
Use latest and up date anti virus software to guard
against virus attacks.
Keep back up volumes so that one may not suffer
data loss in case of virus contamination.
Keep a watch on the sites that children are
accessing to prevent any kind of harassment.
Use of firewalls may be beneficial.
IT AMENDMENT ACT, 2008 NOTIFIED W.E.F.
27/10/2009
(As Amended by Information Technology Amendment Bill 2006 passed in Loksabha on Dec 22nd and in Rajyasbha on
Dec 23rd of 2008 , Presidential assent given on 5th February 2009, and notified with effect from October 27, 2009)

Electronic Signatures

Examiner of Electronic Evidence (Section 79-A)

Eight New Cyber offences added:


1. Sending offensive messages through a computer or mobile phone (Sec 66A)

2. Receiving stolen computer resource(Sec 66B)

3. Identity theft(Sec 66C)

4. Cheating by personation using computer resource(Sec 66D)

5. Violating privacy(Sec 66E)

6. Cyber terrorism(Sec 66F)

7. Publishing or transmitting material I electronic form containing explicit act(Sec 67A)

8. Child pornography(Sec 67B)

Power of interception of electronic communication to the Government


HACKING
WHAT IS HACKING?

Hacking is the gaining of access to a computer or


computer network to test or evaluate its securities or
with criminal content.

WHAT IS ETHICAL HACKING?


Ethical hacking and ethical hacker are terms used to
describe hacking performed by a company or an
individual to help identify potential threats on a
computer or a network.
An ethical hacker attempts to bypass system security
and search for any weak points that could be exploited
by other hackers. This information is then used by the
organisation to improve the system security, in an
TYPES OF HACKERS
White Hat: They do not break the laws and use their
skills for good purposes. Example: testing a
organizations computer systems.

Black Hat: Hackers violate computer security for


personal gain.
Example: Stealing credit card numbers or collecting
personal data for
sale to identity thieves.

Grey Hat: A grey-hat hacker falls somewhere between


a black hat and a white hat. A grey hat doesnt work for
their own personal gain or to cause damage, but they
may technically commit crimes and do arguably
unethical things.
THANK YOU

Вам также может понравиться