Posts

Showing posts from November, 2020

Cyber Law Week 14

Image
 Cyber Law Week 14 In week 14 we have presented about Problem Based Task given in week 13.  We were presented via  Microsoft Teams  while we are recorded and upload to youtube. Youtube Link:  https://youtu.be/zF5Dd1NErIE Then we are going to a new topic about Data Protection and Privacy. Data Protection controls how your personal information is used by organizations, businesses or the government.  Everyone responsible for using data has to follow strict rules called ‘data protection principles’.They must make sure the information is: used fairly and lawfully  used for limited, specifically stated purposes  handled according to people’s data protection rights  kept safe and secure There is stronger legal protection for more sensitive information, such as:  ethnic background  political opinions  religious beliefs  health  criminal records Purpose of Data Protection and Privacy Storing data Transmitting data Personal Dat...

Cyber Law Week 13

 Cyber Law Week 13 A Taxonomy for Cybercrime Attack in the Public Cloud Public cloud users interact online or offline using natural language. While the language used could be in Xhosa, English, Afrikaans, Zulu or Ndebele, the core component is communication. Therefore, natural language is the language that people speak, listen to and understand. This is the same language that a public cloud user, uses to interact with another human and/or machine components of the public cloud. Meanwhile the same natural language is sometimes used by cybercrime attackers to achieve their aims when targeting users of the public cloud. The targeting of the users could be attributed to the user’s basic knowledge of the public cloud when seeking information or relationship formation, thereby unintentionally revealing points of vulnerabilities that often expose them to cybercrime attacks. A challenge to traditional digital forensic processes in the public cloud environment is the inability to retrieve a...

Cyber Law Week 12

Image
 Cyber Law Week 12 Types Of Cyber Crimes Internal computer crimes Telecommunications crimes Computer manipulation crimes Theft of computer hardware or software Use of computers in support of other crimes Internal computer crimes are things like the planting of viruses in people’s computers.  We can see an example of this in the article below.  In that incident, an employee of the financial services company UBS planted malicious software in company computers because he was angry about not getting a large enough bonus.  His act cost the company millions of dollars in clean-up costs and undisclosed amounts of lost business. The best-known type of telecommunications crime is hacking.  This is called “telecommunications crime” because the criminal uses long-distance communications to illegally access a computer network.  In 2014, a famous example of this occurred in which Target had the credit card data of millions of its customers stolen.  Computer manipul...

Cyber Law Week 11

Image
 Cyber Law Week 11 WHAT IS PATENT ? A patent is a document issued by the government office which describes the invention and creates a legal situation in which the patented invention can normally only be exploited (made, used, sold, imported) by or with the authorization of the patentee. WHAT INVENTIONS ARE PATENTABLE ? An invention is a novel idea which permits in practice the solution of a specific problem in the field of technology. Under most legislations concerning inventions, the idea, in order to be protected by law ("PATENTABLE"), must be new in the sense that is has not already been published or publicly used, it must be "non-obvious" in the sense that it would not have occurred to any specialist in the particular industrial fields, had such a specialist been asked to find a solution to the particular problem and it must be "applicable in industry" in the sense that it can be industrially manufactured or used. WHAT THE PATENT ACT 1983 PROVIDES ? M...

Cyber Law Week 10

Image
 Cyber Law Week 10 Copyright Infringement   Copyright infringement is when someone other than the copyright owner copies the “expression” of a work without the owner’s permission Copyright Act 1987  A unique feature of the Act is the inclusion of provisions for enforcing the Act, which include such powers to enter premises suspected of having infringing copies and to search and seize infringing copies and contrivances. Types:- Direct infringement  Contributory infringement  Vicarious infringement a)  Direct Infringement occurs when a person without authorization makes, uses, offers to sell or sells any patented invention within the United States or imports into the United States any patented invention during the term of the patent therefor b)  Contributory copyright infringement is a way of imposing secondary liability for infringement of a copyright. It is a means by which a person may be held liable for copyright infringement even though he or s...

Cyber Law week 8

Image
 Cyber Law week 8 What is a digital signature? type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature. How it works? Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key.  Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using ...

Cyber Law Week 7

 Cyber Law Week 7 Needs of ES. Credit or loan application Federal tax returns E-Contracting Service Agreements Legal Requirements of Digital Signature 1. Signer Authentication Message attribution that is integration of public key and private key refer to original signer 2. There must be disclosure and consent For a digital signature t 1. Signer Authentication o be considered legal, you have to prove the signers knew they were signing a legal document. This is done through legal disclosure and consent, which signers must approve before they are able to sign the document 3. The signer must know the signature is binding Digitally signed documents are just as legally binding as signatures on paper, and it's important that every signer is aware of the legal impact of signing online.  4. The document must secure from tampering When documents are executed in a digital world, there is always a risk for hacking or document tampering. But with the right kind of technology, digitall...

Cyber Law week 6

Image
 Cyber Law week 6 Electronic Signature: An electronic signature, or e-signature, refers to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign. Benefits of Electronic Signature:- Enhanced Security You can be confident that your documents will make it to the right people with security controls including automatic independent verification       2. Workflow Tracking Easily tracked who as opened, signed or approved a document and who is holding you up.       3. Convenience for you Collect signatures and Approvals on multiple documents at one time without printing a single page of paper      4. Get paid faster Ask for signature and payment details on the same document to securely collect all the information you need to get your clients up and running—including the payment to you!      5. Paperless workflow When you integrate you...

Cyber Law Week 5

Image
 Cyber Law Week 5 Electronic signature Jump to navigation Jump to search An  electronic signature , or  e-signature , refers to  data  in electronic form, which is logically associated with other data in electronic form and which is used by the  signatory  to sign.This type of signature provides the same legal standing as a handwritten signature as long as it adheres to the requirements of the specific regulation under which it was created ( IDAS  in the  European Union ,  NIST-DSS  in the  USA  or  ZertES  in  Switzerland ). Electronic signatures are a legal concept distinct from  digital signatures , a cryptographic mechanism often used to implement electronic signatures. While an electronic signature can be as simple as a name entered in an electronic document,  digital signatures  are increasingly used in  e-commerce  and in regulatory filings to implement electronic signatures i...

Cyber Law Week 4

Image
 Cyber Law Week 4 Digital Signature Digital signature is an electronic signature used to verify the identity of the sender/ signer of a message and also to ensure the correctness and validity of information in electronic transactions. The use of recognized digital signature can fulfil requirements of confidentiality, identity authentication, non-repudiation, and integrity of an information.   The Digital Signature Act 1997 (DSA 1997) which came into force on 1st October 1998, with the purpose of regulating the use of digital signature in Malaysia, ensures the security of legal issues related to electronic transactions and verifies the use of digital signatures through certificates issued by licensed Certification Authority (CA).   The Malaysian Communications and Multimedia Commission (MCMC) is responsible to administer, enforce, carry out and give effect to the provisions under DSA 1997 for the purpose of monitoring and overseeing the activities of CAs. How do digital si...

Cyber law week 3

Image
 Cyber law week 3 Prevention Of Cyber Crimes:- Keep the Computer System Up-To-Date Protect Your Personal Information Keep Your Firewall Turned On Install or Update Your Antivirus Software Secure Configuration of the System Choose a Strong Password and Protect It
 Cyber Law Week 2 Copyright (Amendment) Act 1997 An Act to make better provisions in the law relating to copyright and for other matters connected therewith. The Copyright (Amendment) Act 1997, which amended the Copyright Act 1987, came into force on the 1st of April 1999, to make unauthorised transmission of copyright works over the Internet an infringement of copyright. It is also an infringement of copyright to circumvent any effective technological measures aimed at restricting access to copyright works. These provisions are aimed at ensuring adequate protection of intellectual property rights for companies involved in content creation in the ICT and multimedia environment. Computer Crimes Act 1997 An Act to provide for offences relating to the misuse of computers. The Computer Crimes Act 1997, effective as of the 1st of June 2000, created several offences relating to the misuse of computers. Among others, it deals with unauthorised access to computer material, unauthorised acc...
 CYBER LAW WEEK 1  CYBER LAW IN MALAYSIA What is Cyber Law? Cyber law or Internet law is at term that encapsulates the legal issues related to use of the internet.It protect information access privacy, communication, intelectual property(ip) and freedom of speech of internet users. Examples Of Cyberlaw. TRADEMARK ACT 1976 DIGITAL SIGNATURE ACT 1997 COMPUTER CRIME ACT 1997 COPYRIGHT ACT 1989 TELEMEDICINE ACT 1997 COMMUNICATION AND MULTIMEDIA ACT 1998 Importance of Cyber Law in Malaysia. To build confidence among internet users To provide education, traning and creating awareness in the area of cyber security To give punishment for those who commited cyber crime