Jaipur National University Seedling School of Law and Governance
Jaipur National University Seedling School of Law and Governance
———————————————————————————————————————————
TABLE OF CONTENTS
• CERTIFICATE
• DECLARATION
• ACKNOWLEDGEMENT
• CHAPTER 1 - Introduction
• CHAPTER 2
• CHAPTER 3
• CHAPTER 4
• CHAPTER 5- Conclusion
------------------------------------------------------------------------------------------------------------------------
GUIDE CERTIFICATE
This is to certify that the project report entitled"!#$IT Laws “ submitted in the partial fulfilment of the
requirement for Bachelor of Arts and Law and computer application to JAIPUR NATIONAL UNI-
VERSITY. Has work under my supervision and guidance and that no part of this report has been
submitted for the reward of any other Degree, Diploma, Fellowship or any other similar titles or
prizes and that the work has not been published in any journal or magazine.
Place : Jaipur
————————————————————————————————————————
ACKNOWLEDGEMENT
I express my sincere gratitude to Miss. Swati duggal ma’am for giving me support and opportunity
to carry out the project work. My regard goes to (H.O.D) for giving me the permission for doing my
project in her esteem organisation. I would like to thanks to all my classmates and my seniors who
were kind enough to provide me the valuable information and spending their precious time and
helping me on completion of my project work. It is my great pleasure to express my sincere thanks
to my entire friends who help me in concluding this project.
Place: Jaipur
--------------------------------------------------------------------------------------------------------------------
Introduction:
The process of gathering and documenting proof from a computer or a computing device in a form
presentable to the court by applying the techniques of investigation and analysis is called Cyber
Forensics. Cyber Forensics is also called Computer Forensics. The aim of cyber forensics is to de-
termine who is responsible for what exactly happened on the computer while documenting the evi-
dence and performing a proper investigation. The storage media of the device under investigation is
made into a digital copy by the investigators and the investigation is performed on the digital copy
while making sure the device under investigation is not contaminated accidentally.
Need for Cyber Forensics
Cyber Forensics is needed for the investigation of crime and law enforcement. There are cases like
hacking and denial of service (DOS) attacks where the computer system is the crime scene. The
proof of the crime will be present in the computer system. The proofs can be browsing history,
emails, documents, etc. These proofs on the computer system alone can be used as evidence in the
court of law to sort out allegations or to protect the innocent people from charges
Advantages
Below are some of the advantages given.
• Similar types of data and relevant data can be compared from different source systems to get
a complete understanding of the scenario.
• Those data over a period that is relevant can be made trending using cyber forensics.
• The entire data can be scanned to identify and extract specific risks for future analysis.
• The efficiency of the control environment and policies can be tested by determining the at-
tributes that violate the rules.
• It is used to set the trends of identification which the company people, consultants and
forensic analysts are not aware of.
9. Freedom of Speech:
10. Freedom of speech is an important area of cyber law. Even though cyber laws forbid certain
behaviors online, freedom of speech laws also allow people to speak their minds. Cyber
lawyers must advise their clients on the limits of free speech including laws that prohibit
obscenity. Cyber lawyers may also defend their clients when there is a debate about whether
their actions consist of permissible free speech.
11. Trade Secrets:
12. Companies doing businesses online often depend on cyber laws to protect their trade secrets.
For example, Google and other online search engines spend lots of time developing the al-
gorithms that produce search results. They also spend a great deal of time developing other
features like maps, intelligent assistance and flight search services to name a few. Cyber
laws help these companies to take legal action as necessary in order to protect their trade
secrets.
13. Contracts and Employment Law:
14. Every time you click a button that says you agree to the terms and conditions of using a
website, you have used cyber law. There are terms and conditions for every website that are
somehow related to privacy concerns.
6
Definition of 'Hacking'
Definition: Hacking is an attempt to exploit a computer system or a private network inside a com-
puter. Simply put, it is the unauthorised access to or control over computer network security sys-
tems for some illicit purpose.
Description: To better describe hacking, one needs to first understand hackers. One can easily as-
sume them to be intelligent and highly skilled in computers. In fact, breaking a security system re-
quires more intelligence and expertise than actually creating one. There are no hard and fast rules
whereby we can categorize hackers into neat compartments. However, in general computer par-
lance, we call them white hats, black hats and grey hats. White hat professionals hack to check their
own security systems to make it more hack-proof. In most cases, they are part of the same organisa-
tion. Black hat hackers hack to take control over the system for personal gains. They can destroy,
steal or even prevent authorized users from accessing the system. They do this by finding loopholes
and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey
hat hackers comprise curious people who have just about enough computer language skills to en-
able them to hack a system to locate potential loopholes in the network security system. Grey hats
differ from black hats in the sense that the former notify the admin of the network system about the
weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds
of hacking are considered illegal barring the work done by white hat hackers.
Chapter 2:Virus
Virus/Worm Attacks
Viruses are computer programs which attach themselves to other programs of the computer, thereby
causing the system to crash or corrupt data that is stored in the system. They spread in numbers and
infect more files in the system upon entering. Worms are also malwares but they do not need other
computer programs to attach themselves. They work by their own to modify the operating system of
a computer. When somebody is responsible for introducing viruses or worms to a computer, these
cases can be easily dealt with Sec. 43 and 66 of The Information Technology Act, 2000.
• Common Types Of Computer Viruses- Cybercriminals are getting better and better at stealing
our confidential data and viruses that are being created are evolving rapidly. There are millions of
viruses around the world, but here are some common types you should be aware of:
• 1. File-infecting Virus -A virus that attached itself to an executable program. It is also called a
parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can
overwrite host files and others can damage your hard drive!s formatting.
8
• 2. Macro Virus-This type of virus is commonly found in programs such as Microsoft Word or
Excel. These viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
• 3. Browser Hijacker-This virus targets and alters your browser setting. It is often called a brows-
er redirect virus because it redirects your browser to other malicious websites that you don!t have
any intention of visiting. This virus can pose other threats such as changing the default home page
of your browser.
• 4. Web Scripting Virus -A very sneaky virus that targets popular websites. What this virus does
is overwrite code on a website and insert links that can install malicious software on your device.
Web scripting viruses can steal your cookies and use the information to post on your behalf on the
infected website.
• 5. Boot Sector Virus- These viruses are once common back when computers are booted from
floppy disks. Today, these viruses are found distributed in forms of physical media such as exter-
nal hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads
into the memory enabling control of your computer.
• 6. Polymorphic Virus-This virus has the capability to evade anti-virus programs since it can
change codes every time an infected file is performed.
• 7. Resident Virus-A resident virus stores itself on your computer!s memory which allows it to
infect files on your computer. This virus can interfere with your operating system leading to file
and program corruption.
• 8. Multipartite Virus-A type of virus that is very infectious and can easily spread on your com-
puter system. It can infect multiple parts of a system including memory, files, and boot sector
which makes it difficult to contain.
*Software piracy is a term used to describe the act of illegally using, copying or distributing soft-
ware without ownership or legal rights. The majority of software today is purchased as a single-user
license, meaning that only one computer may have that software installed on it at one time. Copying
that software to multiple computers or sharing it with your friend without multiple licenses is con-
sidered software piracy, which is illegal. Additionally, downloading pirated software from the Inter-
net could be a security risk to your computer; it can be difficult to know what else may be getting
installed.
*Intellectual property (IP) is defined by the World Intellectual Property Organization (WIPO) as:
Intellectual property is defined as any work that is creative and includes inventions, literary works,
images, and symbols. With the introduction of the Internet, laws surrounding intellectual properties
have changed significantly. The three types of laws that protect intellectual property are copyrights,
trademarks, and patents.
Unlike conventional property, like physical objects or land, intellectual property is often intangible
because it concerns creations of the mind. But the arguments for the validity of intellectual property
rights are the similar to those for private property. There are three main arguments in favor of the
right to own property. In the natural rights argument, John Locke argues that a person owns the
rights to the fruits of his/her labor, specifically because he/she worked for it. The utilitarian argu-
ment proposes that society as a whole is better off when we have rights and institutions governing
property. Hegel!s personality argument says that property laws frees people to express their unique
personalities. Most laws concerning intellectual property exist to promote %progress”.The right to
intellectual property motivates innovation and creativity. Intellectual property assets can sometimes
be worth more money than physical assets, which means they are worth protecting just like physical
assets. Creation of economic growth and wealth is also a reason for the benefit of intellectual prop-
erty
Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of your
computer system.
There are various types of computer security which is widely used to protect the valuable informa-
tion of an organization.
One way to ascertain the similarities and differences among Computer Security is by asking what is
being secured. For example,
10
• Information security is securing information from unauthorized access, modification & dele-
tion
• Application Security is securing an application by building security features to prevent from
Cyber Threats such as SQL injection, DoS attacks, data breaches and etc.
• Computer Security means securing a standalone machine by keeping it updated and patched
• Network Security is by securing both the software and hardware technologies
• Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks
It!s important to understand the distinction between these words, though there isn!t necessarily a
clear consensus on the meanings and the degree to which they overlap or are interchangeable.
So, Computer security can be defined as controls that are put in place to provide confidentiality,
integrity, and availability for all components of computer systems. Let!s elaborate the definition.
KEY DIFFERENCE
• Encryption is a process of converting normal data into an unreadable form whereas Decryp-
tion is a method of converting the unreadable/coded data into its original form.
• Encryption is done by the person who is sending the data to the destination, but the decryp-
tion is done at the person who is receiving the data.
• The same algorithm with the same key is used for both the encryption-decryption processes.
Symmetric Key:
12
Symmetric-key encryption are algorithms which use the same cryptographic keys for both encryp-
tion of plaintext and decryption of ciphertext.
Asymmetric Key:
Asymmetric encryption uses 2 pairs of key for encryption. Public key is available to anyone while
the secret key is only made available to the receiver of the message. This boots security.
Public Key:
Public key cryptography is an encryption system which is based on two pairs of keys. Public keys
are used to encrypt messages for a receiver.
Private Key:
Private key may be part of a public/ private asymmetric key pair. It can be used in asymmetric en-
cryption as you can use the same key to encrypt and decrypt data.
Pre-Shared Key:
In cryptography, a pre-shared key (PSK) is a shared secret which was earlier shared between the
two parties using a secure channel before it is used.
Parame-
Encryption Decryption
ter
It is a process of convert-
ing normal data into an It is a method of converting
What is unreadable form. It helps the unreadable/coded data
you to avoid any unautho- into its original form.
rized access to data
13
Summary
• Cryptography is used to secure and protect data during communication.
• Encryption is a process which transforms the original information into an unrecognizable
form.
• Decryption is a process of converting encoded/encrypted data in a form that is readable and
understood by a human or a computer.
• Encryption method helps you to protect your confidential data such as passwords and login
id.
• Public, Private, Pre-Shared and Symmetric are important keys used in cryptography.
• An employee is sending essential documents to his/her manager is an example of an encryp-
tion method.
• The manager is receiving the essential encrypted documents from his/her employee and de-
crypting it is an example of a decryption method.
CONCLUSION
14