CYBER LAWS – IT ACT www.dnserp.com e-COMMERCE Perspectives EDI CYBER LAWS CYBER SECURITY IT ACT 2000 BY JYOTINDRA ZAVERI Cyber Security Consultant.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Security Issues of E-commerce. Tools to manage the risks.
Working with the Internet
Chapter 1. Type in URL to browse a web page A search engine is a software program you can use to find web sites, web pages and files stored on the internet.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Breaking Trust On The Internet
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
What is E-commerce Safety Precautions Password Strengths
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Defining Security Issues
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
Internet Security facilities for secure communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
ECE Lecture 1 Security Services.
Types of Electronic Infection
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
Securing Information Systems
Digital Security Identity theft Copyright Laws Plagiarism, and More.
IT Security  .
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Information Security 101 Richard Davis, Rob Laltrello.
Securing Information Systems
ONLINE SECURE DATA SERVICE
Module 4 System and Application Security
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Identity Theft Samuel H. Slater.
Presentation transcript:

CYBER LAWS – IT ACT e-COMMERCE Perspectives EDI CYBER LAWS CYBER SECURITY IT ACT 2000 BY JYOTINDRA ZAVERI Cyber Security Consultant

CYBER LAWS – IT ACT 2 PAPERLESS TRANSACTION HOW TO DO TRANSACTIONS ENTRIES INTO COMPUTER WITHOUT PAPER? FOR BUSINESS TO BUSINESS E.G. SUPPLIER TO OEM (ORIGINAL EQUIPMENT MANUFACTURERS) ANSWER = EDI

CYBER LAWS – IT ACT WHAT IS EDI ? Electronic Data Interchange (EDI) is the transmission between businesses of information in standard, computer-readable format. It includes electronic order placement, electronic shipping notification, electronic invoicing, and many other business transactions that computers can actually perform better than people. EDI gives the necessary control to reduce unnecessary miscommunication Which often disrupt the distribution process EDI eliminates most of the data entry associated with these functions EDI eliminates the error that normally occurs in data entry environment.

CYBER LAWS – IT ACT 4 ELECTRONIC DATA INTERCHANGE E. D. I. INTERFACE TRADITIONALLY PAPER DOCUMENTS ARE GIVEN E.G. INVOICE CUM CHALLAN PRINTED ON PAPER ALONG WITH MATERIAL Now, FLOPPY OR CD OR IS GIVEN INSTEAD OF PAPER DOCUMENTS

CYBER LAWS – IT ACT E. D. I SUPPLIER OR VENDOR CUSTOMER MATERIAL SENT WITH EDI (CD) PURCHASE ORDER BY OR ON THE WEBSITE Or DATA RECORD ELECTRONIC DATA INSTEAD OF PAPER INVOICE GENERATED BY ERP SERVER AND READ ALSO BY ERP SERVER

CYBER LAWS – IT ACT 6 WHAT IS DIGITAL SIGNATURE? AN ELECTRONIC, ENCRYPTION BASED, SECURE STAMP OF AUTHENTICATION ON DOCUMENT ORIGINATED FROM THE SIGNER (AND HAS NOT BEEN ALTERED)

CYBER LAWS – IT ACT 7 WHAT IS DIGITAL CERTIFICATE ? DIGITAL CERTIFICATE IS ATTACHMENT FOR A FILE, OR MESSAGE THAT VOUCHES FOR AUTHENTICITY, PROVIDES SECURE ENCRYPTION, OR SUPPLIES A VERIFIABLE SIGNATURE.

CYBER LAWS – IT ACT 8 DIGITAL SIGNATURE PURPOSE TO AUTHENTICATE TRANSACTION ON INTERNET ATTACHED TO THE DOCUMENT – SIMILAR TO HANDWRITTEN SIGN RECIPIENT CAN VERIFY THE DIGITAL SIGNATURE E.G. REGISTRAR OF COMPANIES (ROC) - RETURNS ARE FILED ONLINE USING DIGITAL SIGNATURE BY DIRECTORS, FOR LIMITED OR PRIVATE LIMITED COMPANIES

CYBER LAWS – IT ACT 9 DIGITAL CERTIFICATES SIGNATURE FAQ DIGITAL SIGNATURES ARE USED THROUGH E-COMMERCE IN ORDER TO ENSURE THAT TRANSACTIONS ARRIVING AT A GATEWAY SERVER ARE FROM AN IDENTIFIABLE MERCHANT, AND THAT ANY INFORMATION PASSED BACK TO THE MERCHANT IS FROM A SECURE TRADING GATEWAY EACH SIGNATURE UNIQUELY IDENTIFIES ITS SOURCE.

CYBER LAWS – IT ACT Cyber Laws What is the need for Cyber Laws? What is the need for Cyber Security? What precautions to take to use e-Business and e-Commerce

CYBER LAWS – IT ACT Online Shopping Globally, e-Commerce is already > $1.7 Trillion industry and growing exponentially More and more people are doing online shopping Consumers are already buying online products and services Bus or train or air tickets is common Buying electronic gadgets, books, apparel, etc.

CYBER LAWS – IT ACT IT ACT 2000: Cyber Laws

CYBER LAWS – IT ACT

CYBER LAWS – IT ACT I T ACT IT BILL ONLINE An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.

CYBER LAWS – IT ACT ONLINE BANKING Accessing a bank account using internet is called Online Banking or NET BANKING. E.g. Indias largest bank: State Bank of India has 11,100 branches Number of people with access to internet banking has increased dramatically. SBI has three million Net banking users Websites are

CYBER LAWS – IT ACT Unauthorized access to information on computer or website is called hacking SBI website falls victims to hacker. Attempts were made to disrupt the system from outside India. Source: News in Economic Times & Business Line – 28 Dec 08. IT ACT 2000: Under Section 66 Hackers can be punished. Mr. R. P. Sinha, Deputy M. D. SBI.

CYBER LAWS – IT ACT IT ACT 2000: Cyber Laws Data Alteration Section 66 of the IT Act covers unauthorized alteration of data. This section deals with hacking. According to this section, unauthorized alteration of data is punishable. Unauthorized Access Section 43 covers the crimes related to the unauthorized access.

CYBER LAWS – IT ACT IT ACT 2000: Cyber Laws Virus & malicious code Introduction of a computer virus or contaminant (including worms, Trojans, etc.) is covered by Section 43 of IT Act. Section 65 Crimes relating to source code. Software piracy is illegal. Posting remarks on website against the Government of India or Indian constitution is illegal Creating an account on false name is illegal

CYBER LAWS – IT ACT Can such crimes be detected? YES Each time you log on to the internet, you are allotted an IP address, which is very easy to trace within a matter of minutes and in some cases hours

CYBER LAWS – IT ACT How do you catch cyber criminals? Every leaves behind a trace leading back to its point of origin in the form of an e- mail header. To view the header all you need to do is to press 'options' button and then go to 'preferences This will throw up two boxes where you can view your in full, complete with the IP addresses. The IP address, usually a number like , can be traced to ISP (VSNL). But only the police have the authority to trace back the route of the message beyond this point right up to the doorstep of the offending subscriber.

CYBER LAWS – IT ACT Unique IP address of origin of Return-Path: Delivered-To: Received: from mx2.vsnl.com (mx2.vsnl.com [ ]) by pn123.vsnl.net.in (Postfix) with ESMTP id 8ED75B472 for ; Mon, 16 Dec :39: (IST) Received: from ndl1mr1-a-fixed (avmx2.vsnl.com [ ]) by mx2.vsnl.com (Postfix) with ESMTP id 638C565B2 for ; Mon, 16 Dec :39: (IST) Originating-IP: (iPlanet Messaging Server 5.2 HotFix 0.9 (built Jul )) with ESMTP id for Mon, 16 Dec :37: (IST) Date: Mon, 16 Dec :37: (GMT+05:30) From: Subject: Invitation X-Originating-IP: To:

CYBER LAWS – IT ACT spoofing spoofing is a problem Fake , where an appears to be sent by someone but has actually been sent by some other person, has brought many to financial ruin. spoofing is covered under provisions of the IPC relating to forgery.

CYBER LAWS – IT ACT messages can be fake E.g. An Indian bank which recently faced a serious problem, because , supposedly sent by its manager, informed customers that the bank was facing financial troubles (rumor) A businessman was conned out of Rs 10 lakhs by a Nigerian who was pretending to be the Vice President of the African Development Bank The businessman trusted the senders address as was showing in the that he received. The only way to protect yourself is to digitally sign and encrypt all important messages

CYBER LAWS – IT ACT Educate people 99% of people by and large think that address cannot be traced but if they come to know that almost all the cases, no matter what wrong name they give, what e- mail address they open, they can still be traced then the cyber crime rate will fall It is just a matter of education Newspapers and magazines have major role to play in curbing, educating public on cyber crimes.

CYBER LAWS – IT ACT DIGITAL EVIDENCE What is Digital Evidence? Digital evidence is any information of probative value that is either stored or transmitted in a binary form. This field includes not only computers in the traditional sense but also includes digital audio and video. It includes all facets of crime where evidence may be found in a digital or binary form. Computers are also instrumental in crimes ranging from check fraud to conspiracy.

CYBER LAWS – IT ACT Cyber Crimes Learn from security and forensics networks The good part is, lots of information is available on training programs and conferences about computer forensics. E.g. –D–Def Con ( stages conventions about hacking –B–Black Hat ( offers conventions, security conferences, and training – Digital self defense

CYBER LAWS – IT ACT Phishing Sites Phising pronounced fishing refers to fishing out sensitive user information such as your credit card number This is done by masquerading (Camouflaged) as a trustworthy entity. This usually is an with clickable hyper link. This comes to your inbox with a familiar bank name as a disguise. Say, you have account in ICICI bank. The will come as if from ICICI and ask you to click on a link. This will take you to a similar website (as if it is ICICI bank) and ask you to enter credit card number.

CYBER LAWS – IT ACT What is the difference between http and https? General websites use the standard protocol known as Hyper Text Transfer Protocol. This sites may not be secured. Think twice before parting with credit card information. –C–Chances of hacking is very high –N–Not secured websites. is a protocol which is secured. Websites using https protocol incorporates some kind of encryption technology such as SSL (Secured Socket Layer), provided by companies like verisign.com. –I–It is safe to give credit card kind or sensitive information to such websites because it is secured. –H–Hackers will not be able to get users confidential data. E.g. Look for – that s after http is important. Most e-commerce website with payment gateway uses https protocol.

CYBER LAWS – IT ACT Minimize RISK Security tips: Do and Do Not Configure your PC security OS settings, to automatically update the virus protection and keep it up-to-date E.g. AVG website or Quick Heal, etc. Configure proper security settings for your Browser (Internet Explorer) based on your surfing requirements. E.g. Cooky setting Avoid free software downloads such as free wall papers, free screen savers, etc. It may contain virus – along with it some unwanted software may also get installed

CYBER LAWS – IT ACT Safety norms for doing on-line banking Make sure that the banking website address starts with https (SSL protected) which ensures encryption protected communications. Never do online banking transactions on a shared or public computer – e.g. Cybercafé. Always type the web address of your bank into the browser space. Never click on the link in the . Deploy anti-spy ware, Firewall, Anti-Phishing, Anti-Spam, Piracy protection software.

CYBER LAWS – IT ACT Fire – wall: Protection software

CYBER LAWS – IT ACT Firewall The Firewall Software consists of programs designed to monitor and control the flow of traffic between computers and networks. Firewalls are generally used to prevent unauthorized access to computers or networks. Firewall can allow, restrict, encrypt, based on settings and definitions such as trust levels.

CYBER LAWS – IT ACT Authentication In a multi-user or network environment, the process by which the system validates a user's logon information. A user's name and password are compared against an authorized list, and, if the system detects a match, access is granted to the extent specified in the permission list for that user. Authentication database A database on a server that matches user names to passwords.

CYBER LAWS – IT ACT Threat Categories Natural Disasters – Fire, flood, tornado, etc. Nonhuman – Product failures, bugs, etc. Human Malicious code Insiders – Disgruntled employees Outsiders – Hackers Non-malicious: Untrained or uninformed employees (careless) E.g. password is not kept secret

CYBER LAWS – IT ACT What is security? Security means: Measures taken to guard against espionage or sabotage, crime, attack, or escape. Precautions: Do not give credit card / debit card information to unbranded website or unknown person. Use Debit card instead of Credit card. Never put too much of personal information on the social website like Orkut.

CYBER LAWS – IT ACT What is Cryptography ? Cryptography is the science of writing in secret code. Cryptographic protocols can provide us new application paradigms, which were not achieved without cryptography. For examples, using cryptographic protocols, we are able to establish electronic payment systems, electronic elections systems, electronic auction system, etc. Some of them have been used in practical fields. They are becoming the fundamental infrastructure of electronic society.

CYBER LAWS – IT ACT Network Security

Jyotindra Zaveri Cyber Security Consultant Compute safely THANK YOU