Cyber Security Lab
Cyber Security Lab
Experiment No: 01
Aim: To study and understand the Information Technology Act, 2000, its amendments, and its
implications on cyber security, e-commerce, and digital governance in India.
Software:
The Information Technology (IT) Act, 2000 was enacted by the Government of India to provide
legal recognition to electronic transactions and to curb cybercrimes. It lays down provisions to
regulate electronic communication, data protection, cybersecurity, and digital signatures.
Section 4: Electronic records have the same legal status as physical documents.
Section 66A of the Information Technology Act, 2000 is a provision that makes it a
punishable offence for any person to send offensive information using a computer or any other
electronic device. The provision also makes it punishable for a person to send information that
they believe to be false.
Identity Theft (Section 66C): Punishment for fraudulent use of another person's identity.
Section 66C of the Information Technology Act deals with identity theft. It states that
anyone who fraudulently or dishonestly makes use of the electronic signature, password, or any
other unique identification feature of another person can be punished with imprisonment of up to
three years and a fine of up to one lakh rupees
Cyber Terrorism (Section 66F): Acts that threaten national security through cyber means.
A person can face life imprisonment if he/she denies authorized personnel access to the
computer resource or attempts to penetrate/access a computer resource without authorization,
with an aim to threaten the unity, integrity, security, or sovereignty of the nation. This is a non-
bailable offense.
IT Act Amendments
The IT Act was amended in 2008 to address new challenges in cyberspace, including:
Strengthening laws against cyber terrorism and data breaches.Providing guidelines for
intermediary liability.
Enhancing protection for critical infrastructure.
E-Governance: Facilitates online services like Aadhaar, PAN, and passport applications.
E-Commerce: Provides legal framework for online transactions and digital contracts.
Banking and Finance: Ensures security in online banking, UPI transactions, and digital
payments.
Read the IT Act, 2000: Download a copy from the official government website.
Case Study Analysis: Analyze cybercrime cases in India (e.g., Aadhaar data breach, banking
frauds, etc.)
The breach involved the data of approximately 1.5 million Zivame customers, including their
names, email addresses, phone numbers, and physical addresses.
An investigation conducted by India Today’s Open Source Intelligence (OSINT) team revealed
that a seller claiming to possess the data was willing to sell it for $500 in cryptocurrencies. To
verify the authenticity of the data, the team posed as a potential customer and contacted the
seller using a Telegram handle.
The seller provided a sample dataset containing the personal details of over 1,500 users as
proof. It was emphasized that the data was not publicly available, and the seller insisted on
receiving payment exclusively in cryptocurrency, a common practice in such illicit transactions.
Create a unique code (hash): This code is made from the document's content, like a
digital fingerprint.
Encrypt the code with a private key: This turns the code into a digital signature. Only
the sender has the private key.
Send the document and signature: The sender sends both to the recipient.
Verify with the public key: The recipient uses the sender's public key to decrypt the
signature and get the original code.
Generate a new code: The recipient makes their own code from the received
document.Compare codes: If the original code matches the new one, the document is
authentic and unchanged.
In simple terms, digital signatures ensure that the document is from the right person and
hasn't been tampered with.
Report Writing: Summarize findings and implications of the IT Act in daily digital transactions.