SlideShare a Scribd company logo
1 of 14
Download to read offline
Cyber Security (2150003)
B.E. MECH – Sem Vth
Prepared by,
Patel Shrey B.
(170953119031)
Group :- 5B2
Guided by,
Asst. Prof. Ruchi Maheta
(Computer Science Deptt)
CONTENTS
• Brief History
• Reasons For Amending IT Act
• Objectives
• Definition
• Digital Signature And Electronic Signature (Amended - ITAA 2008)
• Various Regulation &Their Section
2$ɧƦɛƴ ´ƶ
BRIEF HISTORY
$ɧƦɛƴ ´ƶ
3
4$ɧƦɛƴ ´ƶ
REASONS FOR AMENDING IT ACT
• To include new types of Cyber-crimes
• To increase protection of personal data & info. for national security, econ.,
public health & safety
• To provide for alternate technology for e-Signatures as per Model Law
UNCITRAL (UN Commission of Intl.Trade laws)
• To authorize Service Providers providing services to SG/CG
5$ɧƦɛƴ ´ƶ
OBJECTIVES
• Legal recognition for transactions carried out by means of E-data interchange (EDI),
E-Commerce
• Facilitate and legalize E-fund transfers (EFT)
• Facilitate E-storage of data
• Facilitate E-filing of documents with Govt departments
• Legal recognition for keeping of books of accounts by bankers in E-form
• Legal recognition to Digital signatures for authentication of information
• Amend RBI Act, Banker’s Book Evidence Act, Indian Evidence Act, Indian Penal Code
$ɧƦɛƴ ´ƶ 6
DEFINITION
• Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory
function resources of a computer, computer system or computer network
• Addressee means a person who is “intended by the originator to receive” the E-record. Excludes intermediary
• Adjudicating officer (AO) means an adudicating officer appointed under the Act
• Affixing Electronic signature means adoption of any methodology or procedure by a person for
authenticating an E-record via electronic signature
• Asymmetric crypto system means a system of a secure key pair consisting of a private key for creating a digital
signature and a public key to verify the digital signature
• Certifying Authority (CA) means a person who has been granted a licence to issue an ESC under the Act
• Certification practice statement is issued by a CA to specify the practices that it employs in issuing ESCs
• Communication Device means Cell Phones Personal Digital Assistance (PDAs), or combination of both or
any other device used to communicate, send or transmit any text, video, audio, or image
7$ɧƦɛƴ ´ƶ
• Computer (C) means any electronic magnetic, optical or other high-speed data processing device or
system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic
or optical impulses, and includes all IPO, storage, computer software, or communication facilities which
are connected or related to the computer in a computer system or computer network
• Computer network (CN) means the interconnection of one or more computers through - o the use of
satellite, microwave, terrestrial line or other communication media o terminals or a complex consisting
of two or more interconnected computers whether or not the interconnection is continuously
maintained
• Computer resource (CR) means computer, computer system, computer network, data, computer data
base or software
• Controller means the Controller of CA appointed under the Act
• Cyber AppellateTribunal (CAT) means the Cyber Appellate Tribunal established under the Act. (X
“Regulation” or CRAT)
• Cyber Café means any facility from where access to the internet is offered by any person in the ordinary
course of business to the members of the public
8$ɧƦɛƴ ´ƶ
• Cyber Security means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure,
disruption, modification or destruction
• Data means a representation of information, knowledge, facts, concepts or instructions which are being
prepared or have been prepared in formalised manner, and is intended to be processed, is being
processed or has been processed in a computer system or computer network, and may be in any form
(including computer printouts magnetic or optical storage media, punched cards, punched tapes) or
stored internally in the memory of the computer
• Digital signature means authentication of any E-record by a subscriber by means of an electronic
method or procedure in accordance with the Act
• Digital Signature Certificate means a Digital Signature Certificate issued under the Act
• Electronic form with reference to information means any information generated, sent, received or
stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or
similar device
• Electronic Gazette means the Official Gazette published in the electronic form
9$ɧƦɛƴ ´ƶ
DIGITAL SIGNATURE AND ELECTRONIC
SIGNATURE (AMENDED - ITAA 2008)
10$ɧƦɛƴ ´ƶ
• “Hash function” means an algorithm mapping or translation of one sequence
of bits into another, generally smaller set known as “hash result” such that an
E-record yields the same hash result every time the algorithm is executed with
the same E-record as its input, making it computationally infeasible
– to derive or reconstruct the original E-record from the hash result produced by
the algorithm
– that two E-records can produce the same hash result using the algorithm
11$ɧƦɛƴ ´ƶ
The digital signature is created in two distinct steps.
• First, E-record message digest - by using a mathematical function known as “hash function” which
digitally freezes the E-record thus ensuring the integrity of the content of the E-record.
a) Any tampering with the E-record will invalidate the digital signature
• Secondly, the identity of the person affixing the digital signature is authenticated through the use of a
private key which attaches itself to the message digest and which can be verified by anybody who has the
public key corresponding to such private key.
– It helps to verify whether the E-record is retained intact or has been tampered with
– It helps the person with the public key to identify the originator of the message
• Any subscriber may authenticate an e-record by affixing his Digital Signature.
• The authentication of the e-record shall be effected by the use of asymmetric crypto system and
hash function which envelop and transform the initial e-record into another e-record
• Any person by the use of a public key of the subscriber can verify the e-record
• The private key and the public key are unique to the subscriber and constitute a functioning key pair
12$ɧƦɛƴ ´ƶ
Title Section
Digital Signature And Electronic Signature (Amended –
ITAA 2008)
Section 3, Section 3A
Electronic Governance Section 4 to Section 10
Attribution,Acknowledgment And Dispatch Of E-records Section 11 to Section 13
Secure E-records And Secure E-signatures Section 14 to Section 16
Regulation Of CA Section 17 to Section 34
Electronic Signature Certificates Section 35 to Section 39
Duties Of Subscribers Section 40 to Section 42
Penalties And Adjudication Section 43 to Section 47
The Cyber Appellate Tribunal Section 48 to Section 64
Offences Section 65 to Section 78
Intermediaries NotTo Be Liable In Certain Cases Section 79
Examiner Of Electronic Evidence Section 79 A to Section 90
13$ɧƦɛƴ ´ƶ
VARIOUS REGULATION & SECTION
ANY QUESTION ?
14$ɧƦɛƴ ´ƶ

More Related Content

What's hot

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

What's hot (20)

It act 2000
It act 2000It act 2000
It act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
it act
it act it act
it act
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cyber law
Cyber lawCyber law
Cyber law
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
It act 2000
It act 2000It act 2000
It act 2000
 

Similar to IT ACT 2008 ALA GTU

Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 

Similar to IT ACT 2008 ALA GTU (20)

Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
Class it act
Class it actClass it act
Class it act
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
It act
It actIt act
It act
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 

More from Shrey Patel

Ala dom vibartion transmibilty and isolation.pptx sem 6th gtu vibration
Ala dom   vibartion transmibilty and isolation.pptx sem 6th gtu vibrationAla dom   vibartion transmibilty and isolation.pptx sem 6th gtu vibration
Ala dom vibartion transmibilty and isolation.pptx sem 6th gtu vibrationShrey Patel
 
Ala ie job evaluation and insentives
Ala ie   job evaluation and insentivesAla ie   job evaluation and insentives
Ala ie job evaluation and insentivesShrey Patel
 
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioningPsychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioningShrey Patel
 
Ala pt design of fixture production technology sem 6th gtu production engin...
Ala pt   design of fixture production technology sem 6th gtu production engin...Ala pt   design of fixture production technology sem 6th gtu production engin...
Ala pt design of fixture production technology sem 6th gtu production engin...Shrey Patel
 
Cad ala brep, csg and sweep representation gtu
Cad   ala  brep, csg and sweep representation gtuCad   ala  brep, csg and sweep representation gtu
Cad ala brep, csg and sweep representation gtuShrey Patel
 
force transmibility ALA DOM Vibration
force transmibility ALA DOM Vibrationforce transmibility ALA DOM Vibration
force transmibility ALA DOM VibrationShrey Patel
 
Transient response ALA CE
Transient response ALA CETransient response ALA CE
Transient response ALA CEShrey Patel
 
belt drive ALA DME
belt drive ALA DMEbelt drive ALA DME
belt drive ALA DMEShrey Patel
 
Types of turbinr FPE ALA
Types of turbinr FPE ALATypes of turbinr FPE ALA
Types of turbinr FPE ALAShrey Patel
 
Ht analysis of conduction through wall OEP
Ht   analysis of conduction through wall OEPHt   analysis of conduction through wall OEP
Ht analysis of conduction through wall OEPShrey Patel
 
Ht - heat transfer through fin ala
Ht - heat transfer through fin alaHt - heat transfer through fin ala
Ht - heat transfer through fin alaShrey Patel
 
Dynamometer Torque /Force Measurement TOM ALA
Dynamometer Torque /Force Measurement TOM ALADynamometer Torque /Force Measurement TOM ALA
Dynamometer Torque /Force Measurement TOM ALAShrey Patel
 
Linear measurement
Linear measurementLinear measurement
Linear measurementShrey Patel
 
Ultrasonic welding
Ultrasonic weldingUltrasonic welding
Ultrasonic weldingShrey Patel
 
Flow through orifice
Flow through orificeFlow through orifice
Flow through orificeShrey Patel
 
Complex function
Complex functionComplex function
Complex functionShrey Patel
 
Higher Order Differential Equation
Higher Order Differential EquationHigher Order Differential Equation
Higher Order Differential EquationShrey Patel
 
Non destructive testing
Non destructive testingNon destructive testing
Non destructive testingShrey Patel
 
Coplaner concurrent force system
Coplaner concurrent force systemCoplaner concurrent force system
Coplaner concurrent force systemShrey Patel
 
Brinell Hardness Testing Method
Brinell Hardness Testing Method Brinell Hardness Testing Method
Brinell Hardness Testing Method Shrey Patel
 

More from Shrey Patel (20)

Ala dom vibartion transmibilty and isolation.pptx sem 6th gtu vibration
Ala dom   vibartion transmibilty and isolation.pptx sem 6th gtu vibrationAla dom   vibartion transmibilty and isolation.pptx sem 6th gtu vibration
Ala dom vibartion transmibilty and isolation.pptx sem 6th gtu vibration
 
Ala ie job evaluation and insentives
Ala ie   job evaluation and insentivesAla ie   job evaluation and insentives
Ala ie job evaluation and insentives
 
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioningPsychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
Psychrometry ala rac gtu sem 6th Refrigeration and Air conditioning
 
Ala pt design of fixture production technology sem 6th gtu production engin...
Ala pt   design of fixture production technology sem 6th gtu production engin...Ala pt   design of fixture production technology sem 6th gtu production engin...
Ala pt design of fixture production technology sem 6th gtu production engin...
 
Cad ala brep, csg and sweep representation gtu
Cad   ala  brep, csg and sweep representation gtuCad   ala  brep, csg and sweep representation gtu
Cad ala brep, csg and sweep representation gtu
 
force transmibility ALA DOM Vibration
force transmibility ALA DOM Vibrationforce transmibility ALA DOM Vibration
force transmibility ALA DOM Vibration
 
Transient response ALA CE
Transient response ALA CETransient response ALA CE
Transient response ALA CE
 
belt drive ALA DME
belt drive ALA DMEbelt drive ALA DME
belt drive ALA DME
 
Types of turbinr FPE ALA
Types of turbinr FPE ALATypes of turbinr FPE ALA
Types of turbinr FPE ALA
 
Ht analysis of conduction through wall OEP
Ht   analysis of conduction through wall OEPHt   analysis of conduction through wall OEP
Ht analysis of conduction through wall OEP
 
Ht - heat transfer through fin ala
Ht - heat transfer through fin alaHt - heat transfer through fin ala
Ht - heat transfer through fin ala
 
Dynamometer Torque /Force Measurement TOM ALA
Dynamometer Torque /Force Measurement TOM ALADynamometer Torque /Force Measurement TOM ALA
Dynamometer Torque /Force Measurement TOM ALA
 
Linear measurement
Linear measurementLinear measurement
Linear measurement
 
Ultrasonic welding
Ultrasonic weldingUltrasonic welding
Ultrasonic welding
 
Flow through orifice
Flow through orificeFlow through orifice
Flow through orifice
 
Complex function
Complex functionComplex function
Complex function
 
Higher Order Differential Equation
Higher Order Differential EquationHigher Order Differential Equation
Higher Order Differential Equation
 
Non destructive testing
Non destructive testingNon destructive testing
Non destructive testing
 
Coplaner concurrent force system
Coplaner concurrent force systemCoplaner concurrent force system
Coplaner concurrent force system
 
Brinell Hardness Testing Method
Brinell Hardness Testing Method Brinell Hardness Testing Method
Brinell Hardness Testing Method
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

IT ACT 2008 ALA GTU

  • 1. Cyber Security (2150003) B.E. MECH – Sem Vth Prepared by, Patel Shrey B. (170953119031) Group :- 5B2 Guided by, Asst. Prof. Ruchi Maheta (Computer Science Deptt)
  • 2. CONTENTS • Brief History • Reasons For Amending IT Act • Objectives • Definition • Digital Signature And Electronic Signature (Amended - ITAA 2008) • Various Regulation &Their Section 2$ɧƦɛƴ ´ƶ
  • 5. REASONS FOR AMENDING IT ACT • To include new types of Cyber-crimes • To increase protection of personal data & info. for national security, econ., public health & safety • To provide for alternate technology for e-Signatures as per Model Law UNCITRAL (UN Commission of Intl.Trade laws) • To authorize Service Providers providing services to SG/CG 5$ɧƦɛƴ ´ƶ
  • 6. OBJECTIVES • Legal recognition for transactions carried out by means of E-data interchange (EDI), E-Commerce • Facilitate and legalize E-fund transfers (EFT) • Facilitate E-storage of data • Facilitate E-filing of documents with Govt departments • Legal recognition for keeping of books of accounts by bankers in E-form • Legal recognition to Digital signatures for authentication of information • Amend RBI Act, Banker’s Book Evidence Act, Indian Evidence Act, Indian Penal Code $ɧƦɛƴ ´ƶ 6
  • 7. DEFINITION • Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network • Addressee means a person who is “intended by the originator to receive” the E-record. Excludes intermediary • Adjudicating officer (AO) means an adudicating officer appointed under the Act • Affixing Electronic signature means adoption of any methodology or procedure by a person for authenticating an E-record via electronic signature • Asymmetric crypto system means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature • Certifying Authority (CA) means a person who has been granted a licence to issue an ESC under the Act • Certification practice statement is issued by a CA to specify the practices that it employs in issuing ESCs • Communication Device means Cell Phones Personal Digital Assistance (PDAs), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image 7$ɧƦɛƴ ´ƶ
  • 8. • Computer (C) means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all IPO, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network • Computer network (CN) means the interconnection of one or more computers through - o the use of satellite, microwave, terrestrial line or other communication media o terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained • Computer resource (CR) means computer, computer system, computer network, data, computer data base or software • Controller means the Controller of CA appointed under the Act • Cyber AppellateTribunal (CAT) means the Cyber Appellate Tribunal established under the Act. (X “Regulation” or CRAT) • Cyber Café means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public 8$ɧƦɛƴ ´ƶ
  • 9. • Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction • Data means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer • Digital signature means authentication of any E-record by a subscriber by means of an electronic method or procedure in accordance with the Act • Digital Signature Certificate means a Digital Signature Certificate issued under the Act • Electronic form with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device • Electronic Gazette means the Official Gazette published in the electronic form 9$ɧƦɛƴ ´ƶ
  • 10. DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE (AMENDED - ITAA 2008) 10$ɧƦɛƴ ´ƶ
  • 11. • “Hash function” means an algorithm mapping or translation of one sequence of bits into another, generally smaller set known as “hash result” such that an E-record yields the same hash result every time the algorithm is executed with the same E-record as its input, making it computationally infeasible – to derive or reconstruct the original E-record from the hash result produced by the algorithm – that two E-records can produce the same hash result using the algorithm 11$ɧƦɛƴ ´ƶ
  • 12. The digital signature is created in two distinct steps. • First, E-record message digest - by using a mathematical function known as “hash function” which digitally freezes the E-record thus ensuring the integrity of the content of the E-record. a) Any tampering with the E-record will invalidate the digital signature • Secondly, the identity of the person affixing the digital signature is authenticated through the use of a private key which attaches itself to the message digest and which can be verified by anybody who has the public key corresponding to such private key. – It helps to verify whether the E-record is retained intact or has been tampered with – It helps the person with the public key to identify the originator of the message • Any subscriber may authenticate an e-record by affixing his Digital Signature. • The authentication of the e-record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial e-record into another e-record • Any person by the use of a public key of the subscriber can verify the e-record • The private key and the public key are unique to the subscriber and constitute a functioning key pair 12$ɧƦɛƴ ´ƶ
  • 13. Title Section Digital Signature And Electronic Signature (Amended – ITAA 2008) Section 3, Section 3A Electronic Governance Section 4 to Section 10 Attribution,Acknowledgment And Dispatch Of E-records Section 11 to Section 13 Secure E-records And Secure E-signatures Section 14 to Section 16 Regulation Of CA Section 17 to Section 34 Electronic Signature Certificates Section 35 to Section 39 Duties Of Subscribers Section 40 to Section 42 Penalties And Adjudication Section 43 to Section 47 The Cyber Appellate Tribunal Section 48 to Section 64 Offences Section 65 to Section 78 Intermediaries NotTo Be Liable In Certain Cases Section 79 Examiner Of Electronic Evidence Section 79 A to Section 90 13$ɧƦɛƴ ´ƶ VARIOUS REGULATION & SECTION