Professional Documents
Culture Documents
Classification of cybercrimes
For example
cyber morphing, cyber stalking, emails spoofing, cyber defamation, phishing, etc.
For example
cyber terrorism, cyber espionage, hacking government websites with the
intention of trespassing, and stealing the secured data of a nation.
For example
data theft or manipulation of data, bank or E-commerce fraud, cyber forgery, trogon horse
attacks, virus or worm attacks, data diddling, copyright infringement, etc.
and
further to amend the Indian Penal Code, the Indian Evidence Act, 1872,
the Banker’s Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and for matters connected therewith or incidental thereto.
The Information Technology Act defines in a new section that cyber café is any
facility from where the access to the internet is offered by any person in the
ordinary course of business to the members of the public.
The Information Technology Act is based on The Indian Penal Code, 1860, The
Indian Evidence Act, 1872, The Bankers’ Books Evidence Act, 1891, The Reserve
Bank of India Act, 1934, etc.
It adds a provision to Section 81, which states that the provisions of the Act
shall have overriding effect. The provision states that nothing contained in the
Act shall restrict any person from exercising any right conferred under the
Copyright Act, 1957.
17 November 2023 Dr. Siddhartha Sankar Biswas 6
Network Security
The protection afforded to an automated information
system
unauthorized access,
misuse,
modification, or
denial of service
• Integrity
Assurance that data received is as sent by an authorized
entity.
• Authentication
Assurance that the communicating entity is the one
claimed.
• Non-Repudiation
Protection against denial by one of the parties in a
communication
• Access Control
Prevention of the unauthorized use of a resource.
17 November 2023 Dr. Siddhartha Sankar Biswas 10
Cryptography
Cryptography consists of two greek words
Kryptos = hidden / secret
X
Cryptanalyst
K
At Sender Side At Receiver Side
Y = E (K , X) X = D (K , Y)
Message
X Encryption Y Decryption
X Message
Source Algorithms Transmission Algorithms Destination
over
unsecured
K media K
Secret Key Secret Key
3. Decryption Algorithm.
17 November 2023 Dr. Siddhartha Sankar Biswas 13
Public-Key Cryptosystem : Authentication
Good Luck
17 November 2023 Dr. Siddhartha Sankar Biswas 16