Cyber Space Module 3 1
Cyber Space Module 3 1
Cyber Space Module 3 1
MODULE 4
Bharath M
Assistant Professor
Seshadripuram Institute of Management Studies
Bengaluru-64
[email protected]
9964736500
DIGITAL SIGNATURE
• A signature confirms that the information originated from the signer and has not
been altered.
https://support.microsoft.com/en-us/office/digital-signatures-and-certificates-8186cd15-e7ac-4a16-8597-
22bd163e8e96#:~:text=Digital%20signature%20assurances-
,What%20is%20a%20digital%20signature%3F,and%20has%20not%20been%20altered.
https://www.geek
sforgeeks.org/dig
ital-certificate-
creation/
https://www.ogcio.gov.hk/en/o
ur_work/regulation/eto/digital_
https://www.ogcio.gov.hk/en/o
cert/uses_of_digital_cert/
ur_work/regulation/eto/digital_
cert/uses_of_digital_cert/
E-SIGN
• eSign is an online electronic signature service which can be integrated with service
delivery applications via an API to facilitate an eSign user to digitally sign a
document.
• Using authentication of the eSign user through e-KYC service, online electronic
signature service is facilitated
https://esign.com/
TYPES OF E-SIGN
• Signature Images
• OTP Based
https://cca.gov.in/eSign.html#:~:text=eSign%20is%20an%20online%20electronic,Salient%20Features%20of%20
eSign
CRYPTOGRAPHY
• Cryptography is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa.
• The term is derived from the Greek word kryptos, which means hidden. It is closely
associated to encryption, which is the act of scrambling ordinary text into what's
known as ciphertext and then back again upon arrival.
• In addition, cryptography also covers the obfuscation of information in images using
techniques such as microdots or merging.
https://www.kaspersky.com/resource-center/definitions/what-is-cryptography
https://economictimes.indiatimes.com/definition/cryptography
CYBER CRIMES
• Below is a list for some of the cybercrimes along with their indicative explanation.
This is to facilitate better reporting of complaints.
TYPES OF CYBER CRIMES
• Child sexually abusive material (CSAM)
• Phishing
• Cyber Bullying
• Hacking
• Cyber stalking
• Identity Theft
• Cyber Grooming
• Piracy
• Online Job Fraud
• Platform for Illegal Activities
• Online Sextortion
• Ransomware
• Vishing
• Malware
• Smishing
• Fake Websites
• Data Breach
• Fake Posts on Social Media
• Cyber-Squatting
• Pharming
https://cybercrime.gov.in/Webform/CrimeCatDes.aspx
OBJECTIVES OF IT ACT, 2000
• Grant legal recognition to all transactions done via electronic exchange of data or other
electronic means of communication or e-commerce, in place of the earlier paper-based
method of communication.
• Give legal recognition to digital signatures for the authentication of any information or
matters requiring legal authentication
• Facilitate the electronic filing of documents with Government agencies and also
departments
• Facilitate the electronic storage of data
• Give legal sanctions and also facilitate the electronic transfer of funds between banks and
financial institutions
• Grant legal recognition to bankers under the Evidence Act, 1891 and the Reserve Bank of
India Act, 1934, for keeping the books of accounts in electronic form.
https://www.toppr.com/guides/business-laws-cs/cyber-laws/information-technology-act-2000/
SALIENT FEATURES OF THE IT ACT, 2000
https://www.srdlawnotes.com/2017/02/salient-features-of-information.html
IMPORTANT PROVISIONS OF THE ACT
• CHAPTER I – PRELIMINARY (1 & 2)
• Chapter II – Digital & Electronic Signature (Section 3)
• CHAPTER III – ELECTRONIC GOVERNANCE (4 to 10)
• CHAPTER IV – ATTRIBUTION, ACKNOWLEDGMENT AND DESPATCH OF ELECTRONIC RECORDS (11
to 13)
• CHAPTER V – SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES (14 to 16)
• CHAPTER VI – REGULATION OF CERTIFYING AUTHORITIES (17 to 34)
• CHAPTER VII – DIGITAL SIGNATURE CERTIFICATES (35 to 39)
• CHAPTER VIII – DUTIES OF SUBSCRIBERS (40 to 42)
• CHAPTER IX – PENALTIES AND ADJUD1CATION (43 to 47)
• CHAPTER X – THE CYBER REGULATIONS APPELLATE TRIBUNAL (48 to 64)
• CHAPTER XI – OFFENCES (65 to 78)
• CHAPTER XII – NETWORK SERVICE PROVIDERS NOT TO BE LIABLE IN CERTAIN CASES (79)
• CHAPTER XIII – MISCELLANEOUS (80 to 94)
PENALTIES AND COMPENSATION (SECTION 43)
• https://taxguru.in/wp-content/uploads/2012/10/cyber-laws-overview.pdf
• https://eprocure.gov.in/cppp/rulesandprocs/kbadqkdlcswfjdelrquehwuxcfmijmuixn
gudufgbuubgubfugbububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=