INFORMATION TECHNOLOGY ACT 2000 AN OVERVIEW. PRESENTATION OVERVIEW Need for the law Legal issues regarding offer, Acceptance and conclusion of contract.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Creating Trust in Electronic Environment - IT Act 2000 Deputy Controller (Technology) Controller of Certifying Authorities Ministry of Communications &
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Law & Islamic Ethics
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Course: Government Process Re-engineering Day 3 Session 3: Legal and Policy Framework for GPR.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DIGITAL SIGNATURE.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
The Information Technology Act Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,
Network Security Celia Li Computer Science and Engineering York University.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Legal And Policy Framework
Digital Signature.
Presentation transcript:

INFORMATION TECHNOLOGY ACT 2000 AN OVERVIEW

PRESENTATION OVERVIEW Need for the law Legal issues regarding offer, Acceptance and conclusion of contract Issues of Digital Signature Public Key infrastructure Certifying Authorities.

Preamble of IT Act, 2000 An Act to provide Legal Recognition for E-Commerce EDI transactions and Electronic communications Use of alternatives to paper based methods of communication and storage of information. To facilitate electronic filing of documents with the Government agencies. And further to amend Indian penal code The Indian Evidence Act, 1872 The Bankers Books Evidence Act, 1891 & RBI Act 1934.

Components of the Act Legal Recognition to Digital Signatures Electronic Governance Mode of Attribution, Acknowledgement and Despatch of Electronic Records. Secure Electronic Records. Regulation of Certification Authorities. Digital Certificates.

Components of the Act (Cont) Duties of subscribers Penalties and Adjudication Offences Protection to Network Service Providers in certain situations.

Definitions – terms defined in the Act Access Addressee Computer Computer Resource Data Electronic Form Information Intermediary Secure System Asymmetric Cryptography Digital Signature.

E-commerce Simply put: E-commerce refers to doing business and transactions over electronic networks prominently the internet. Obviates the need for physical presence Two parties may never know, see or talk to each other but still do business. Has introduced the concept of electronic delivery of products and services. Unmanned round-the-clock enterprises – Available always.

E-Com- Potential Problems Security on Net-Confidentiality, Integrity and Availability. Cyber crimes-Hackers, Viruses Technological Complexities Lack of Information trail Complex cross border Legal Issues Desparate Regulatory Environment and Taxation Policies.

Challenges Protecting Information in Transit Protecting Information in storage Protecting Information in Process Availability and Access to information to those Authorised.

Concerns in E-Transactions Confidentiality Integrity Availability

Confidentiality concerns Eavesdropping Wire Tapping Active/Passive snooping Shoulder Surfing

Integrity Attacks Data Diddling Buffer Overflow Used to insert malicious code Channel violation Spoofing

Availability Threats Denial of Service (DDOS) Ping of Death SYN Flooding Remote Shut Down

Tools and Techniques Key Loggers Password Crackers Mobile Code Trap Doors Sniffers Smurf (Ping tools)

Tools and Techniques Viruses – Exe, Script, Datafile, Macro Worms Trojan Horse Logic Bombs Remote Access Trojans

Attacks on Cryptosystems Cipher-text only attacks Known plain text attacks Brute Force Attacks Man-in-middle attacks

Social Engineering The best bet ever Trickery and Deceit Targeting Gullible victims Most effective – can penetrate the most secure technologies

Parameters Data Confidentiality User Authentication Data Origin Authentication Data Integrity Non Repudiation.

Legal Recognition of Digital Signature All information in electronic form which requires affixing of signature for legal recognition now satisfies if authenticated by affixing digital signature. Applicability includes: Forms, licences, permits, receipt/payment of money.

DIGITAL SIGNATURES.

How Digital Signature Works XYZ wants to send a message relating to new Tender to DOD. XYZ computes message digest of the plain text using a Hash Algorithm. XYZ encrypts the message digest with his private key yielding a digital signature for the message. XYZ transmits the message and the digital signature to DOD.

Digital Signatures (Cont) When DOD receives the message, DOD computes the message digest of the message relating to plain text, using same hash functions. DOD decrypts the digital signature with XYZ’s public key. If the two values match, DOD is assured that: a. The originator of the message is XYZ and no other person. b. Message contents have not been tampered with.

Digital Signatures- How & Why Integrity, Authentication and Non Repudiation 1. Achieved by use of Digital Signatures 2. If a message can be decrypted by using a particular sender’s public key it can be safely presumed that the message was encrypted with that particular sender’s private key. 3. A message digest is generated by passing the message through a one-way cryptographic function-i.e it cannot be reversed.

Digital Signatures- How & Why 4. When combined with message digest, encryption using private key allows users to digitally sign a message. 5. When digest of the message is encrypted using senders private key and is appended to the original message,the result is known as Digital Signature of the message. 6. Changing one character of the message changes message digest in an unpredictable way. 7. Recipient can be sure that the message was not changed after message digest was generated if message digest remains unaltered.

Digital Signatures Central Government is conferred with powers to make rules in respect of Digital Signatures. Rules would prescribe Type of Digital Signature, Manner and form in which Digital Signature shall be affixed and procedure for identifying the person affixing the Digital Signature.

Enabling Principles of Electronic Commerce Legal Recognition of Electronic Record. Legal requirement of Information to be in writing shall be deemed to be satisfied if it is: a. Rendered or made available in an electronic form. b. Accessible so as to be usable for subsequent reference.

RETENTION OF ELECTRONIC RECORDS. Requirements of law as regards retention of records met even if in electronic form and if the: Information therein is accessible and usable. In original format or ensure accuracy Details as to Origin, Destination, Date and Time of Dispatch and Receipt of Electronic records are maintained.

Applicability of the Act Does not apply to: Negotiable Instrument Act Power of Attorney Act Trusts Will Contract for sale/conveyance of immovable property. Any other transactions that may be notified.

Public Key Infrastructure CERTIFYING AUTHORITIES CA is a person who has been granted a license to issue Digital Signature Certificate by the Controller. CA are licensed by the Controller on satisfaction of certain conditions and an approved Certification Practice Statement.

CERTIFICATION PRACTICE STATEMENT CAs shall generate and manage Digital Certificates and signatures in accordance with approved CPS. The controller shall issue a guide for preparation of Certification Practice Statement and any changes require approval.

KEY MANAGEMENT Cryptographic keys provide the basis for the functioning of Digital certificate and Authentication of Digital Signatures. Keys must be adequately secured at every stage. Key generation, distribution, storage, usage, backup, Archival CAs should take necessary precautions to prevent loss,disclosure,modification or unauthorised use. CA should use trustworthy Hardware, Software and encryption techniques approved by the controller for all operations requiring use of private key.

Information Technology – Security Procedure and Guideline Rules prescribe Physical and operational security Information Management Systems Integrity, risks and integrity controls Audit trail and verifications Data centre operations security Change Management Guidelines.

Offences Without permission Accesses or secures access to computer, computer system or computer network Downloads,copies or extracts any data, computer data base or information from such computer resource. Introduces or causes to be introduced any computer containment or computer virus into any computer resources Damages or causes to be damaged any computer resource.

Offences Under the Act Tampering with Computer Source Documents Hacking with computer System Publishing of information which is obscene in Electronic form.

Who is liable Every person who, At the time of contravention was committed Was in charge of, and was responsible to, the company for the conduct of business. Shall be guilty of the contravention and shall be liable to be proceeded against and punished.

Penalties Upto Rupees Two lakh with Imprisonment. Upto rupees one crore in case of impersonation and masquerading crimes involving Legal bodies-Adjudicating officer,The Cyber Regulations Appellate Tribunal.