Posts

Cyber Law Week 14

Image
 Cyber Law Week 14 In week 14 we have presented about Problem Based Task given in week 13.  We were presented via  Microsoft Teams  while we are recorded and upload to youtube. Youtube Link:  https://youtu.be/zF5Dd1NErIE Then we are going to a new topic about Data Protection and Privacy. Data Protection controls how your personal information is used by organizations, businesses or the government.  Everyone responsible for using data has to follow strict rules called ‘data protection principles’.They must make sure the information is: used fairly and lawfully  used for limited, specifically stated purposes  handled according to people’s data protection rights  kept safe and secure There is stronger legal protection for more sensitive information, such as:  ethnic background  political opinions  religious beliefs  health  criminal records Purpose of Data Protection and Privacy Storing data Transmitting data Personal Dat...

Cyber Law Week 13

 Cyber Law Week 13 A Taxonomy for Cybercrime Attack in the Public Cloud Public cloud users interact online or offline using natural language. While the language used could be in Xhosa, English, Afrikaans, Zulu or Ndebele, the core component is communication. Therefore, natural language is the language that people speak, listen to and understand. This is the same language that a public cloud user, uses to interact with another human and/or machine components of the public cloud. Meanwhile the same natural language is sometimes used by cybercrime attackers to achieve their aims when targeting users of the public cloud. The targeting of the users could be attributed to the user’s basic knowledge of the public cloud when seeking information or relationship formation, thereby unintentionally revealing points of vulnerabilities that often expose them to cybercrime attacks. A challenge to traditional digital forensic processes in the public cloud environment is the inability to retrieve a...

Cyber Law Week 12

Image
 Cyber Law Week 12 Types Of Cyber Crimes Internal computer crimes Telecommunications crimes Computer manipulation crimes Theft of computer hardware or software Use of computers in support of other crimes Internal computer crimes are things like the planting of viruses in people’s computers.  We can see an example of this in the article below.  In that incident, an employee of the financial services company UBS planted malicious software in company computers because he was angry about not getting a large enough bonus.  His act cost the company millions of dollars in clean-up costs and undisclosed amounts of lost business. The best-known type of telecommunications crime is hacking.  This is called “telecommunications crime” because the criminal uses long-distance communications to illegally access a computer network.  In 2014, a famous example of this occurred in which Target had the credit card data of millions of its customers stolen.  Computer manipul...

Cyber Law Week 11

Image
 Cyber Law Week 11 WHAT IS PATENT ? A patent is a document issued by the government office which describes the invention and creates a legal situation in which the patented invention can normally only be exploited (made, used, sold, imported) by or with the authorization of the patentee. WHAT INVENTIONS ARE PATENTABLE ? An invention is a novel idea which permits in practice the solution of a specific problem in the field of technology. Under most legislations concerning inventions, the idea, in order to be protected by law ("PATENTABLE"), must be new in the sense that is has not already been published or publicly used, it must be "non-obvious" in the sense that it would not have occurred to any specialist in the particular industrial fields, had such a specialist been asked to find a solution to the particular problem and it must be "applicable in industry" in the sense that it can be industrially manufactured or used. WHAT THE PATENT ACT 1983 PROVIDES ? M...

Cyber Law Week 10

Image
 Cyber Law Week 10 Copyright Infringement   Copyright infringement is when someone other than the copyright owner copies the “expression” of a work without the owner’s permission Copyright Act 1987  A unique feature of the Act is the inclusion of provisions for enforcing the Act, which include such powers to enter premises suspected of having infringing copies and to search and seize infringing copies and contrivances. Types:- Direct infringement  Contributory infringement  Vicarious infringement a)  Direct Infringement occurs when a person without authorization makes, uses, offers to sell or sells any patented invention within the United States or imports into the United States any patented invention during the term of the patent therefor b)  Contributory copyright infringement is a way of imposing secondary liability for infringement of a copyright. It is a means by which a person may be held liable for copyright infringement even though he or s...

Cyber Law week 8

Image
 Cyber Law week 8 What is a digital signature? type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature. How it works? Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key.  Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using ...

Cyber Law Week 7

 Cyber Law Week 7 Needs of ES. Credit or loan application Federal tax returns E-Contracting Service Agreements Legal Requirements of Digital Signature 1. Signer Authentication Message attribution that is integration of public key and private key refer to original signer 2. There must be disclosure and consent For a digital signature t 1. Signer Authentication o be considered legal, you have to prove the signers knew they were signing a legal document. This is done through legal disclosure and consent, which signers must approve before they are able to sign the document 3. The signer must know the signature is binding Digitally signed documents are just as legally binding as signatures on paper, and it's important that every signer is aware of the legal impact of signing online.  4. The document must secure from tampering When documents are executed in a digital world, there is always a risk for hacking or document tampering. But with the right kind of technology, digitall...