Cyber law & IPR- Part 1
Cyber Law and Intellectual Property Rights (IPR)
Course: CC- SIUCSSE141
Instructor: Asst. Prof. Jesica Deruz
Basic Concepts
Computer:
A programmable machine for storing and processing information.
Executes sequences of arithmetic or logical operations automatically.
Computer Network:
Interconnected collection of devices that share resources and information.
Intranet:
A private network within an organization for secure information sharing.
Internet and Cyberspace
Internet:
Global interconnected computer networks facilitating information and communication.
Comprises private, public, academic, and government networks linked by various communication technologies.
Cyberspace:
Digital realm for interactions across interconnected systems.
Represents both the virtual environment and geographical borders.
Data and Information
Data:
Unprocessed facts typically presented numerically.
Lacks independent meaning.
Information:
Processed data that has been enhanced to provide context and meaning.
Helps in decision-making.
Internet Overview
Connectivity:
Connects computers globally, enabling information sharing.
Historical Figures:
Robert W. Taylor - ARPANET developer.
Vinton Cerf and Robert Kahn - TCP/IP technologies developers.
Challenges:
Rise in cyber threats: spam, malware, cyberbullying, doxxing.
Privacy concerns over user data collection by companies.
Internet: Advantages and Disadvantages
Advantages:
Global connection.
E-commerce opportunities.
Ease of online education and abundant information.
Disadvantages:
Loss of personal data.
Fake information circulation.
Distractions and health concerns.
Security in Cyberspace
Network Security:
Safeguarding data and networks from unauthorized access and attacks.
Utilizes various tools, technologies, and practices.
Controls in Network Security:
Physical Control: Prevents unauthorized physical access to network components.
Technical Control: Protects data on the network from internal and external threats.
Administrative Control: Security policies governing user behavior and access levels.
Types of Network Security
Network Access Control (NAC):
Restricts unauthorized access to networks.
Antivirus and Antimalware Software:
Protects systems from malicious software.
Firewall:
Monitors and controls network traffic.
Virtual Private Network (VPN):
Encrypts data and masks IP addresses for private browsing.
Aspects of Network Security
Key Aspects:
Privacy: Confidentiality between sender and receiver.
Message Integrity: Ensures data integrity in transit.
Authentication: Validates the identity of the sender.
Non-Repudiation: Assurance that a sender cannot deny sending a message.
Common Cyber Threats
Phishing: Fake messages from purported sources to obtain personal information.
Email Miscommunication: Issues arise even when email services track opened messages.
Malware: Result of downloading compromised software updates.
Eavesdropping: Breaches into private online communications.
Legal Framework and Regulations
Cyber Law:
Governs legal issues related to cyberspace and communication technology.
Includes provisions regarding cyber crimes, electronic signatures, and data protection.
Key Components:
Fraud: Protects from online identity theft and financial crimes.
Copyright: Addresses copyright violations made easier by the internet.
Defamation: Regulates inaccurate statements made online.
Harassment: Online behavior violating laws against harassment.
Cyber Law in India
Cybercrime:
Encompasses all crimes involving information technology.
Classified as:
Computer as Target: Attacks on computers (e.g., hacking).
Computer as Weapon: Real-world crimes committed using computers (e.g., cyber terrorism, fraud).
Information Technology Act, 2000 (IT Act)
Introduction:
India’s cyber law framework was established with the IT Act.
Legal acknowledgment of electronic transactions and communications.
Objectives of the IT Act:
Enables legal recognition of digital signatures.
Facilitates e-document filings and electronic data storage.
Key Features:
Validates all electronic contracts.
Established a Cyber Regulatory Appellant Tribunal for oversight.
Cryptography
Definition:
Technique for securing communication via conversion of plain text into ciphertext.
Key Features:
Ensures confidentiality, integrity, and non-repudiation of data.
Utilizes algorithms for data encryption and transaction verification.
Types of Cryptography
Symmetric Key Cryptography:
Same key used for encryption and decryption. Faster but requires secure key exchange.
Hashing:
One-way conversion of data into fixed-length strings (message digest) ensuring data integrity.
Asymmetric Key Cryptography:
Uses a pair of keys (public and private) for encryption and decryption.
Digital Signature vs Electronic Signature
Digital Signature:
Regulated verification method to protect documents.
Electronic Signature:
Less regulated, primarily verifies identity.
Key Issues in Cyber Laws
E-Commerce:
Cyber laws need to address data privacy, security, consumer protection, and intellectual property issues.
E-Governance:
Focus on accessibility, legal recognition of electronic records, data security, and transparency.
E-Records & E-Contracts:
Legal binding of digital contracts, authentication, consumer protection.
Regulators:
Oversee compliance, monitoring, standards development, and collaboration across jurisdictions.
Certifying Authority:
Issues digital certificates, essential for secure online transactions.