The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B...

Post on 19-Jan-2016

226 views 0 download

Transcript of The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B...

The Information Technology The Information Technology Act 2000Act 2000

TermsTerms

E-CommerceE-Commerce E-GovernanceE-Governance B2BB2B B2CB2C EDIEDI Internet, Intranet, ExtranetInternet, Intranet, Extranet Data SecurityData Security PoachingPoaching MorphologyMorphology

Terms (Contd)Terms (Contd)

HackingHacking Ethical HackingEthical Hacking NetizenNetizen ISPISP Search EnginesSearch Engines WILFERWILFER SPAMSPAM Cyber EspionageCyber Espionage Domain NamesDomain Names

DefinitionsDefinitions

Access: Gaining entry into, Access: Gaining entry into, instructing or communicating with instructing or communicating with the logical, arithmetical or memory the logical, arithmetical or memory function of a Computer.function of a Computer.

COMPUTER; Conversion Of Mental COMPUTER; Conversion Of Mental Power Used for Technology, Power Used for Technology, Education and Resources.Education and Resources.

VIRUS : Vital Information Resource VIRUS : Vital Information Resource Under SiegeUnder Siege

Originator: One who originates the Originator: One who originates the messagemessage

Addressee: To whom the message is Addressee: To whom the message is addressed to.addressed to.

Affixing Digital Signature: Key PairAffixing Digital Signature: Key Pair Private Key- Creates Digital Private Key- Creates Digital

SignatureSignature Public Key – Verifies Digital SignaturePublic Key – Verifies Digital Signature

(a.k.a Asymmetric Crypto System)(a.k.a Asymmetric Crypto System)

Electronic RecordsElectronic Records

Authentication of Electronic Records:Authentication of Electronic Records: Hash Function: An algorithm that Hash Function: An algorithm that

maps or translates one set of bits maps or translates one set of bits into another so that it yields the into another so that it yields the same result everytime.same result everytime.

EDI: EDI: Transfer of structured DataTransfer of structured Data

By agreed message standardsBy agreed message standards

From one Computer System to anotherFrom one Computer System to another

By Electronic MeansBy Electronic Means

E-GovernanceE-Governance

Legal recognition of electronic Legal recognition of electronic recordsrecords

Legal recognition of Digital SignatureLegal recognition of Digital Signature Use of E-records and Digital Use of E-records and Digital

signature in Government and its signature in Government and its AgenciesAgencies

Retention of E-recordsRetention of E-records Publication of rules, regulations in E-Publication of rules, regulations in E-

GazetteGazette

Duties of SubscribersDuties of Subscribers

Generating Key PairGenerating Key Pair Acceptance of Digital SignatureAcceptance of Digital Signature Control of Private KeyControl of Private Key

Offences/PenaltiesOffences/Penalties

Penalty for damage to Computer, Penalty for damage to Computer, computer system etc., (Virus, computer system etc., (Virus, Disruption, Deletion, Hacking)Disruption, Deletion, Hacking)

Penalty for failure to furnish Penalty for failure to furnish information, returns etc.,information, returns etc.,

Tampering with computer source Tampering with computer source documentsdocuments

Penalty for misrepresentationPenalty for misrepresentation Penalty for breach of confidentiality Penalty for breach of confidentiality

and privacyand privacy Publication for fraudulent purposePublication for fraudulent purpose