Professional Documents
Culture Documents
Regulation-R18
A.Y: 2022-23 Sem-I
UNIT-III
III Year CSE
Subject: Fundamentals of Cyber Security
(18MC0CS02)
Prepared by
Mr. P. HARI SHANKAR,
Assistant Professor - CSE.
Fundamentals of Cyber
Security
UNIT-III
• Cyber Law – The Legal Perspectives: Introduction, Cybercrime and the
Legal Landscape around the World, Why do we need cyberlaws: the
indian context, the indian IT act.
• Cyber Forensics: Introduction, historical background of cyber forensics,
digital forensics science, the need for computer forensics, cyber
forensics and digital evidence, digital forensics lifecycle, challenges in
computer forensics.
🠶 3. E-Mails that are defamatory in nature are punishable under Section 500 of the Indian
Penal Code (IPC) that recommends a n imprisonment of upto 2 years or a fi ne or both.
🠶 4. Threatening E -Mails are punishable u nder the provision s of
the IPC pertaining to criminal intimidation, insult and annoyance
(CHAPTER XXII) and extortion (CHAPTER XVII).
🠶 5. E-Mail spoofing
personation is covered
(CHAPTER under
XVII) and provisions
forgery of theXVIII).
(CHAPTER IPC with regard to fraud, cheating by
Mr. P. HARI SHANKAR, Assistant Professor, CSE, GNITC
UNIT- Cyber Law
IIIThe Indian IT act.
🠶
🠶 Weak Areas of the ITA 2000
🠶 As mentioned before, there are limitations too in the IT Act; those are mainly due to the
following gray areas:
🠶 1. The ITA 2000 is likely to cause a conflict of jurisdiction.
🠶 2. E-Commerce is based on the system of domain names. T e ITA 2000 does not even touch
the issues relating to domain names. Domain names have not been defi ned and the rights
and liabilities of domain name owners do not fi nd any mention in the law. T e law does not
address the rights and liabilities of domain name holders.
🠶 3. The ITA 2000 does not deal with issues concerning the protection of Intellectual Property
🠶 Rights (IPR) in the context of the online environment. Contentious yet very important issues
🠶 concerning online copyrights, trademarks and patents have been left untouched by the law,
🠶 thereby leaving many loopholes. T u s , the law lacks “Proper Intellectual Property Protection
for Electronic Information and Data” – the law misses out the issue of IPR, and makes no
provisions whatsoever for copyrighting, trade marking or patenting of electronic information
and data. However, the corresponding provisions are available under the Indian Copyright
Act. Mr. P. HARI SHANKAR, Assistant Professor, CSE, GNITC
UNIT- Cyber Law
IIIThe Indian IT act.
🠶
🠶 Weak Areas of the ITA 2000
🠶 4. As the cyberlaw is evolving, so are the new forms and manifestations of cybercrimes. The
offenses defined in the ITA 2000 are by no means exhaustive. However, the drafting of the
relevant provisions of the ITA 2000 makes it appear as if the offenses detailed therein are
the only cyberoffenses possible and existing. The ITA 2000 does not cover various kinds of
cybercrimes and Internet-related crimes.
🠶 These include:
🠶 • Theft of Internet hours;
🠶 • cybertheft;
🠶 • cyberstalking;
🠶 • cyberharassment;
🠶 • cyberdefamation;
🠶 • cyberfraud;
🠶 • misuse of credit card numbers;
🠶 • chat room abuse;
🠶 • cybersquatting (not addressed directly). Mr. P. HARI SHANKAR, Assistant Professor, CSE, GNITC
UNIT- Cyber Law
IIIThe Indian IT act.
🠶
🠶 Weak Areas of the ITA 2000
🠶 5. The ITA 2000 has not tackled vital issues pertaining to E-Commerce sphere like privacy
and content regulation to name a few.
🠶 6. The Information Technology Act is not explicit about regulation of Electronic Payments,
and avoids applicability of IT Act to Negotiable Instruments. The Information Technology Act
stays silent over the regulation of electronic payments gateway and rather segregates the
negotiable instruments from the applicability of the IT Act. This may have major eff ect on
the growth of E-Commerce in India.
🠶 This has led to tendencies of banking and financial sectors being irresolute in their stands.
🠶 7. IT Act does not touch upon antitrust issues.
🠶 8. T e most serious concern about the Indian Cyberlaw relates to its implementation. The
ITA 2000 does not lay down parameters for its implementation. Also, when Internet
penetration in India is extremely low and government and police officials, in general, are not
very computer savvy, the new Indian cyberlaw raises more questions than it answers. It
seems that the Parliament would be required to amend the ITA 2000 to remove the gray
areas mentioned above.
Mr. P. HARI SHANKAR, Assistant Professor, CSE, GNITC
Cyber
UNIT- Forensics
IIIIntroduction
🠶
🠶 Cyberforensics plays a key role in investigation of cybercrime. “Evidence” in the case of
“cyberoffenses” is extremely important from legal perspective.
🠶 There are legal aspects involved in the investigation as well as handling of the digital
forensics evidence.
🠶 Only the technically trained and experienced experts should be involved in the
forensics
activities.
🠶 Network forensics is the study of network traffi c to search for truth in civil, criminal and
administrative matters to protect users and resources from exploitation, invasion of privacy
and any other crime fostered by the continual expansion of network connectivity.
🠶 2. User created files: It consists of address books, audio/video files, calendars, database fi
les, spreadsheets, E-Mails, Internet bookmarks, documents and text files.
🠶 3. Computer created files: It consists of backups, cookies, configuration files, history files,
log files, swap files, system files, temporary files, etc.
🠶 4. Computer networks: It consists of the Application Layer, the Transportation Layer, the
Network Layer, the Datalink Layer.
Mr. P. HARI SHANKAR, Assistant Professor, CSE, GNITC
Cyber
UNIT- Forensics
IIICyber Forensics and Digital Evidence
🠶
🠶 The Rules of Evidence
🠶 “Evidence” means and includes:
1.All statements which the court permits or requires to be made before it by witnesses, in
relation to matters of fact under inquiry, are called oral evidence.
2. All documents that are produced for the inspection of the court are called documentary
evidence
🠶 Paper evidence, the process is clear and intuitively obvious. Digital evidence by its very
nature is invisible to the eye. Therefore, the evidence must be developed using tools other
than the h u m a n eye.
1. is admissible;
2. is authentic;
3. is complete;
4. is reliable;
5. is understandable and believable.