You are on page 1of 16

Lecture Notes - 11 17 November 2023

B.Tech. (CSE) / (CSE AI) 7th Semester – Odd Semester 2023


IPR and Cyber Laws (BTCSE 703 / BTCSE AI 703)
Topics
1. Cyber Jurisprudence.
2. Classification of cybercrimes.
3. Information Technology Act, 2000.
4. Salient Features of The Information Technology Act, 2000.
5. Network Security
6. Why do we need Network Security.
7. Security Services.
8. Cryptography.
9. Symmetric Key Cryptography.
10. Asymmetric Key Cryptography (Public Key Cryptosystems).
Faculty :
Dr. Siddhartha Sankar Biswas
Department of Computer Science & Engineering
School of Engineering Sciences and Technology
1
Jamia Hamdard, New Delhi, INDIA
Cyber Jurisprudence
 The word jurisprudence may be defined as a method of legal study that
concentrates on the logical structure of law, the meanings and uses of
its concepts, and the formal terms and modes of its operation.

 Cyber jurisprudence might be defined as law directly related to


cybercrimes.

Classification of cybercrimes

(1) Crimes against individuals

 A crime that is likely to affect an individual life.

 For example
cyber morphing, cyber stalking, emails spoofing, cyber defamation, phishing, etc.

17 November 2023 Dr. Siddhartha Sankar Biswas 2


(2) Crimes against the government

 Malicious invasion of cyberspace by taking advantage of the existing laws in the


website maintained by the government.

 For example
cyber terrorism, cyber espionage, hacking government websites with the
intention of trespassing, and stealing the secured data of a nation.

(3) Crimes against property

 It is primarily a crime against all forms of property. Illegal possession of


someone’s property through the mean of technical invasion into the victim’s
cyberspace.

 For example
data theft or manipulation of data, bank or E-commerce fraud, cyber forgery, trogon horse
attacks, virus or worm attacks, data diddling, copyright infringement, etc.

17 November 2023 Dr. Siddhartha Sankar Biswas 3


Information Technology Act, 2000

17 November 2023 Dr. Siddhartha Sankar Biswas 4


Information Technology Act, 2000
 The Information Technology Act, 2000 provides legal recognition for
transactions carried out by means of electronic data interchange and
other means of electronic communication, commonly referred to as
“electronic commerce”,

 which involve the use of alternatives to paper-based methods of


communication and storage of information,

 to facilitate electronic filing of documents with the Government


agencies

and

further to amend the Indian Penal Code, the Indian Evidence Act, 1872,
the Banker’s Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and for matters connected therewith or incidental thereto.

17 November 2023 Dr. Siddhartha Sankar Biswas 5


Salient Features of The Information Technology Act, 2000
 Digital signature has been replaced with electronic signature to make it a more
technology neutral act.

 It elaborates on offenses, penalties, and breaches.

 It outlines the Justice Dispensation Systems for cyber-crimes.

 The Information Technology Act defines in a new section that cyber café is any
facility from where the access to the internet is offered by any person in the
ordinary course of business to the members of the public.

 It provides for the constitution of the Cyber Regulations Advisory Committee.

 The Information Technology Act is based on The Indian Penal Code, 1860, The
Indian Evidence Act, 1872, The Bankers’ Books Evidence Act, 1891, The Reserve
Bank of India Act, 1934, etc.

 It adds a provision to Section 81, which states that the provisions of the Act
shall have overriding effect. The provision states that nothing contained in the
Act shall restrict any person from exercising any right conferred under the
Copyright Act, 1957.
17 November 2023 Dr. Siddhartha Sankar Biswas 6
Network Security
The protection afforded to an automated information
system

in order to attain the applicable objectives of preserving


the
confidentiality
integrity
availability

of information system resources

(includes hardware, software, firmware,


information/data,
17 November 2023
and telecommunications).
Dr. Siddhartha Sankar Biswas 7
Network Security
Network security consists of the provisions and
policies adopted by a network administrator

to prevent and monitor

unauthorized access,
misuse,
modification, or
denial of service

of a computer network and network-accessible


resources.

17 November 2023 Dr. Siddhartha Sankar Biswas 8


Why do we need Network Security ?

• Protect vital information while still allowing


access to those who need it.

• Provide authentication and access control for


resources.

• Guarantee availability of resources.

17 November 2023 Dr. Siddhartha Sankar Biswas 9


Security Services
• Confidentiality
Protection of data from unauthorized disclosure.

• Integrity
Assurance that data received is as sent by an authorized
entity.

• Authentication
Assurance that the communicating entity is the one
claimed.
• Non-Repudiation
Protection against denial by one of the parties in a
communication
• Access Control
Prevention of the unauthorized use of a resource.
17 November 2023 Dr. Siddhartha Sankar Biswas 10
Cryptography
Cryptography consists of two greek words
Kryptos = hidden / secret

Graphein = writing / study

Cryptography is the practice and study of techniques for


secure communication in the presence of third parties
(called adversaries).

There are two types of Cryptographic models


1.Symmetric Key Cryptography

2.Asymmetric Key Cryptography


17 November 2023 Dr. Siddhartha Sankar Biswas 11
Symmetric Key Cryptography

X
Cryptanalyst
K
At Sender Side At Receiver Side
Y = E (K , X) X = D (K , Y)
Message
X Encryption Y Decryption
X Message
Source Algorithms Transmission Algorithms Destination
over
unsecured
K media K
Secret Key Secret Key

17 November 2023 Dr. Siddhartha Sankar Biswas 12


In some of the following slides we will study various
Public Key Cryptosystems (Asymmetric Key Cryptosystems)

Three Important aspects we need to focus


during our study of these Cryptography Algorithms :

1. Key Generation Algorithm / Technique


Of both the users
(i) Private Key or
either one of the users ,
(ii) Public Key depending upon the
concerned
cryptographic algorithm
2. Encryption Algorithm.

3. Decryption Algorithm.
17 November 2023 Dr. Siddhartha Sankar Biswas 13
Public-Key Cryptosystem : Authentication

17 November 2023 Dr. Siddhartha Sankar Biswas 14


Public-Key Cryptosystem : Confidentiality

17 November 2023 Dr. Siddhartha Sankar Biswas 15


Public-Key Cryptosystem :
Authentication and Confidentiality

Good Luck
17 November 2023 Dr. Siddhartha Sankar Biswas 16

You might also like