IPR Unit5
IPR Unit5
IPR Unit5
www.educlash.com
Cyber Law ?
• Cyber Law is the law governing cyber space.It protects the activities
on internet and other online communication technologies
• Cyberlaw is important because it touches almost all aspects of
transactions and activities on and concerning the Internet, the
World Wide Web and Cyberspace.
• As the nature of Internet is changing and this new medium is
being seen as the ultimate medium ever evolved in human history,
every activity of yours in Cyberspace can and will have a
Cyberlegal perspective.
www.educlash.com
Importance of Cyber Law
We are living in highly digitalized world.
www.educlash.com
Importance of Cyber Law
Most people are using email, cell phones and SMS
messages for communication.
www.educlash.com
Need of Cyber Law
www.educlash.com
Need of Cyber Law
Internet has dramatically changed the way we think,
the way we govern, the way we do commerce and the
way we perceive ourselves.
Cyber space creates moral, civil and criminal wrongs.
It has now given a new way to express criminal
tendencies.
The laws of real world cannot be interpreted in the
light of emerging cyberspace to include all aspects
relating to different activities in cyberspace
www.educlash.com
Cyber Jurisprudence
•Jurisprudence studies the concepts of law and the effect of
social norms and regulations on the development of law.
www.educlash.com
Cyber law in india
IT Act-2000
The Information Technology Act, 2000 (IT Act), came
into force on 17 October 2000.
www.educlash.com
Scope of Cyber Law
Cyber Crimes
Intellectual Property
www.educlash.com
Cyber Crime ?
Any crime with the help of computer and a networking
technology.
www.educlash.com
Various categories of Cyber-Crime:
• Against Persons
• Against Property
• Against Government
www.educlash.com
Against Person:
• Cybercrimes committed against persons include various
crimes like:
Cyber stalking
Defamation
Spamming,spoofing.
www.educlash.com
Against Property:
• The second category of Cybercrimes is that of
Cybercrimes against all forms of property. These
crimes include:
Computer vandalism
Cyber squatting
www.educlash.com
Against Government:
• The third category of Cybercrimes relate to
Cybercrimes against Government.
• It includes:
Hacking of Government websites
Cyber Extortion
Cyber Terrorism
Computer Viruses
www.educlash.com
Statistics of Cyber Crimes
www.educlash.com
TYPES OF CYBER CRIME
• Hacking
• Cyber pornography
• Spamming
• Spying
• Online frauds
– Phishing
– Cyber vandalism
– DOS attack
– Trojan
– Viruses
• Cyber Terrorism
• Illegal Trading
• Cyber Harrassment
www.educlash.com
Types of cyber crime
• HACKING :- Hacking in simple terms means an illegal intrusion into a
computer system and/or network . It is also known as CRACKING.
Government websites are the hot target of the hackers due to the press
coverage, it receives. Hackers enjoy the media coverage.
Motive behind the crime called hacking greed power, publicity, revenge,
adventure desire to access forbidden information destructive mindset.
www.educlash.com
• Cyber Pornography:Cyber pornography is the act of using
cyberspace to create, display, distribute, import, or publish
pornography or obscene materials.
www.educlash.com
• SPYING:Cyber spying is a form of cybercrime in which hackers
target computer networks in order to gain access to classified or
other information that may be profitable or advantageous for the
hacker. Cyber spying is an ongoing process that occurs over time
in order to gain confidential information. It can result in
everything from economic disaster to terrorism.
www.educlash.com
• ONLINE FRAUDS
www.educlash.com
• ONLINE FRAUDS
www.educlash.com
• CYBER TERRORISM: Cyber terrorism is the use of Internet
attacks in terrorist activities, including acts of deliberate, large-
scale disruption of computer networks, especially of personal
computers attached to the Internet, by the means of tools such as
computer viruses.
• HARRASSMENT: Harassment includes directing obscenities
toward others, as well as making derogatory comments based for
example on gender, race, religion, nationality, sexual orientation.
Unsolicited email messages and advertisements can also be
considered to be forms of Internet harassment where the content
is offensive or of an explicit sexual nature.
• ILLEGAL TRADING: Sale of illegal article.This would
include sale of narcotics, weapons and wildlife etc., by posting
information on websites, auction websites, and bulletin boards or
simply by using email communication.
www.educlash.com
DIGITAL SIGNATURE
Why Digital Signatures?
• To provide Authenticity, Integrity and Non -repudiation
to electronic documents
www.educlash.com
DIGITAL SIGNATURE
What is Digital Signatures?
A digital signature is an electronic signature that can be used to
authenticate the identity of the sender of a message or the signer of
a document, and possibly to ensure that the original content of the
message or document that has been sent is unchanged.
Digital signatures are easily transportable, cannot be imitated by
someone else, and can be automatically time-stamped. The ability
to ensure that the original signed message arrived means that the
sender can not easily repudiate it later.
Concept is based on method of cryptography.
The originator of a message uses a signing key (Private Key) to sign
the message and send the message and its digital signature to a
recipient
The recipient uses a verification key (Public Key) to verify the
origin of the message and that it has not been tampered with while
in transit
www.educlash.com
CRYPTOGRAPHY
www.educlash.com
DIGITAL SIGNATURE
Digital signatures employ a type of Asymmetric Cryptography. The
Scheme typically consists of three Algorithms
www.educlash.com
DIGITAL SIGNATURE
www.educlash.com
DIGITAL SIGNATURE
www.educlash.com
DIGITAL SIGNATURE
Certifying Authorities
www.educlash.com
DIGITAL SIGNATURE
A Certificate Authority (CA) performs the following functions.
Certificate Authority (CA) Verifies the identity: The Certificate
Authority (CA) must validate the identity of the entity who requested
a digital certificate before issuing it.
Certificate Authority (CA) issues digital certificates: Once the
validation process is over, the Certificate Authority (CA) issues the
digital certificate to the entity who requested it. Digital certificates
can be used for encryption (Example: Encrypting web traffic), code
signing, authentication etc.
Certificate Authority (CA) maintains Certificate Revocation List
(CRL): The Certificate Authority (CA) maintains Certificate
Revocation List (CRL). A certificate revocation list (CRL) is a list of
digital certificates which are no longer valid and have been revoked
and therefore should not be relied by anyone.
www.educlash.com
Data protection and
privacy
Privacy on the Internet depends on your ability to control
both the amount of personal information that you provide and
who has access to that information
www.educlash.com
INTRODUCTION
Maintaining your privacy requires you to take a multi-pronged
approach. It involves protecting your sensitive information by
preventing, detecting, and responding to a wide variety of
attacks. There are many potential risks to your computer. Some
are more serious than others. Among these dangers are:
· Viruses corrupting your entire system
· Someone breaking into your system and altering files
· A hacker using your computer to attack others
· Someone stealing your computer and accessing your personal
information
There's no guarantee that even with the best precautions some of
these things won't happen. However, you can take steps to
minimize the risks to your computer and your sensitive
information. Ultimately, the security of your computer is
dependent upon you.
www.educlash.com
Ensuring privacy
Privacy software is software built to protect
the privacy of its users. The software typically
works in conjunction with Internet usage to control
or limit the amount of information made available
to third parties. The software can
applyencryption or filtering of various kinds.
www.educlash.com
Ensuring privacy
•Privacy software can refer to two different types of
protection. One type is protecting a user's Internet
privacy from theWorld Wide Web. There are software
products that will mask or hide a user's IP address from the
outside world in order to protect the user from identity
theft.
•The second type of protection is hiding or deleting the
users Internet traces that are left on their PC after they
have been surfing the Internet. There is software that will
erase all the users Internet traces and there is software that
will hide and encrypt a user's traces so that others using
their PC will not know where they have been surfing.
www.educlash.com
Intellectual property
www.educlash.com
Intellectual property
• Theft of trade secrets means the theft of ideas, plans,
methods, technologies, or any sensitive information from
all types of industries including manufacturers, financial
service institutions, and the computer industry.Theft of
trade secrets damages the competitive edge and therefore
the economic base of a business.
www.educlash.com
Intellectual property
• IP pirates never have to make sales in person or
travel, their costs are minimal, and profits are
huge.
• Internet pirates target the online shoppers who
look for discounted, but legitimate, products.
• They do so by emails and Internet
advertisements that seem to be the real thing.
• Not just individuals, but companies, educational
institutions, and even government agencies
have been tricked by IP pirates into buying
stolen goods.
www.educlash.com
Thank You
www.educlash.com