The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B...
-
Upload
elfrieda-palmer -
Category
Documents
-
view
226 -
download
0
Transcript of The Information Technology Act 2000. Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B...
The Information Technology The Information Technology Act 2000Act 2000
TermsTerms
E-CommerceE-Commerce E-GovernanceE-Governance B2BB2B B2CB2C EDIEDI Internet, Intranet, ExtranetInternet, Intranet, Extranet Data SecurityData Security PoachingPoaching MorphologyMorphology
Terms (Contd)Terms (Contd)
HackingHacking Ethical HackingEthical Hacking NetizenNetizen ISPISP Search EnginesSearch Engines WILFERWILFER SPAMSPAM Cyber EspionageCyber Espionage Domain NamesDomain Names
DefinitionsDefinitions
Access: Gaining entry into, Access: Gaining entry into, instructing or communicating with instructing or communicating with the logical, arithmetical or memory the logical, arithmetical or memory function of a Computer.function of a Computer.
COMPUTER; Conversion Of Mental COMPUTER; Conversion Of Mental Power Used for Technology, Power Used for Technology, Education and Resources.Education and Resources.
VIRUS : Vital Information Resource VIRUS : Vital Information Resource Under SiegeUnder Siege
Originator: One who originates the Originator: One who originates the messagemessage
Addressee: To whom the message is Addressee: To whom the message is addressed to.addressed to.
Affixing Digital Signature: Key PairAffixing Digital Signature: Key Pair Private Key- Creates Digital Private Key- Creates Digital
SignatureSignature Public Key – Verifies Digital SignaturePublic Key – Verifies Digital Signature
(a.k.a Asymmetric Crypto System)(a.k.a Asymmetric Crypto System)
Electronic RecordsElectronic Records
Authentication of Electronic Records:Authentication of Electronic Records: Hash Function: An algorithm that Hash Function: An algorithm that
maps or translates one set of bits maps or translates one set of bits into another so that it yields the into another so that it yields the same result everytime.same result everytime.
EDI: EDI: Transfer of structured DataTransfer of structured Data
By agreed message standardsBy agreed message standards
From one Computer System to anotherFrom one Computer System to another
By Electronic MeansBy Electronic Means
E-GovernanceE-Governance
Legal recognition of electronic Legal recognition of electronic recordsrecords
Legal recognition of Digital SignatureLegal recognition of Digital Signature Use of E-records and Digital Use of E-records and Digital
signature in Government and its signature in Government and its AgenciesAgencies
Retention of E-recordsRetention of E-records Publication of rules, regulations in E-Publication of rules, regulations in E-
GazetteGazette
Duties of SubscribersDuties of Subscribers
Generating Key PairGenerating Key Pair Acceptance of Digital SignatureAcceptance of Digital Signature Control of Private KeyControl of Private Key
Offences/PenaltiesOffences/Penalties
Penalty for damage to Computer, Penalty for damage to Computer, computer system etc., (Virus, computer system etc., (Virus, Disruption, Deletion, Hacking)Disruption, Deletion, Hacking)
Penalty for failure to furnish Penalty for failure to furnish information, returns etc.,information, returns etc.,
Tampering with computer source Tampering with computer source documentsdocuments
Penalty for misrepresentationPenalty for misrepresentation Penalty for breach of confidentiality Penalty for breach of confidentiality
and privacyand privacy Publication for fraudulent purposePublication for fraudulent purpose