Академический Документы
Профессиональный Документы
Культура Документы
CODE OF ETHICS
K Anvar Sadath
Manager (e-Governance)
Kerala State IT Mission
CYBER LAWS
FOR TRANSACTIONS IN ‘CYBER SPACE’
• Cyber Property
• Trademarks, Domain names, Copyright, Patents,
Cyber Frauds…
• Cyber Contracts
• Cyber Documents and digital signatures
• Right to Free Speech
• Cyber Privacy
• Protection against Spamming, Cyber stalking…
• Right for Peaceful cyber existence
• Protection against Intrusion, Virus, Hacking…
INFORMATION TECHNOLOGY ACT, 2000
• Aims to provide a legal and regulatory framework for
promotion of e-Commerce and e-Governance.
Licensed CAs :
• Safescrypt
• NIC
• IDRBT
• TCS
• MTNL
• Customs & Central Excise
• (n) Code Solutions CA (GNFC)
Hardware Tokens
Smart Card
iKey
Paper IDRBT Certificate Electronic
Civil Offences under the IT Act 2000
(Section 43 )
• Unauthorised copying, extracting and downloading
of any data, database
• Introduction of virus
5000
4000
3000
2000
1000
0
1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005
Vulnerabilities
The Web
• The web was not designed with security in mind
• The typical web user is not very educated, nor
security conscious
• In fact, even some System Administrators are not
sufficiently security conscious!
• The wide distribution of access points (eg., cyber
cafes) also makes building secure applications a
challenge
• A large number of applications use the web
(informational, educational, entertainment,
transactional, governance...) as transport
Common Web exploits ..
• Password guessing
• Proxies and man-in-the-middle attack
• HTML comments
• “Forgot password” implementations
• Keystroke loggers
• SQL injection
• Command injection
• URL manipulation
• XSS
Spam
• Spam has become a major consumer of
bandwidth, disk space and users' time, with
imputed costs running into millions of dollars
K ANVAR SADATH
anvar.k@gmail.com