4.00
(1 Rating)

Cyber Law

Categories: Law Course
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Students should have a basic understanding of Constitutional Law, Criminal Law and the Law of Evidence. 

This course aims to provide you with a strong practical and theoretical understanding of cyber Law, cyber security, cyber crimes-hacking, digital forensics, security operations and the underlying associated with ICT act, 2006, Digital Security/Cyber Security/Cyber Suroksha Ordinance, 2024.

The primary objective of the Cyber Law course is to familiarize students with ‘ICT in the arena of law,’ which would encompass the entire relationship between law and cyberspace. The course would cover introductory concepts of cyberspace, digital rights and responsibilities, freedom of expression online, media freedom and right to information, misinformation and disinformation, infodemic, privacy and data protection, legal aspects of Big Data and Artificial Intelligence, cybercrimes and cyber security, transparency of mass-surveillance, jurisdictional issues over internet, e-governance, tech contracts, and intellectual property. The course would also examine the potential uses of ICT by attorneys and the effects of ICT on legal practice. An attempt would be made to briefly introduce students to the issues underlying the concept of cyber law – a field that examines the application of information technologies to the practice of law – as a cross-disciplinary field. Thus, students will be exposed to the contested narratives of the most recent information and communication technologies used to enhance the functions of litigation, as well as the critical issues arising from their use.

Suggested Reading

ডঃ জুলফিকার আহম্মদ, সাইবার আইনঃ তত্ত্ব ও বিশ্লেষণ, মুহিত পাবলিকেসন্স, ঢাকা (২০১৪)।

Dr. Zulfiquar Ahmed, A Text Book of Cyber Law, Dhaka (2007). 

 

Show More

Course Content

Lecture 1 (Basic Concepts Cyber and ICT Act- BANGLADESH PERSPECTIVE)
• What is The Internet? • Who Controls the Internet? • What is The World Wide Web? • What’s the Relationship Between WWW and the Internet? • Understanding TCP/IP • Understanding HTML • Understanding HTTP • Uniform Resource Locators (URLs) • Web Hosting • Types of Hosting • How the Internet Works? • Where to Begin? • Internet Addresses • Protocol Stacks and Packets • Domain Names and Address Resolution • Application Protocols: HTTP and the World Wide Web • Application Protocols: SMTP and Electronic Mail • Transmission Control Protocol • Historical Background Of Internet • Growth of The World Wide Web • Growth of The Internet • Scope of Cyber Law • Definition of Cyber Law • Advantages of Cyber Law • Cyber Property • Cyber Jurisprudence • Why Cyber Laws • Strengths of the Information and Communication Technology Act, 2006 • Criticism and Weakness of the ICT Act, 2006 • Essentials of Cyber Laws for IT or ICT Professionals • What are Some of The Key Cyber Law Issues That You Think Must Be Taught and Addressed In Communication/Journalism Schools? • Classification of Cyber Law • Need for Cyber Law in Bangladesh • Historical Background of the Information and Communication Technology Law or Cyber Law • Sides of Cyber Law or ICT Act of Bangladesh • Cyber Law in Bangladesh • Objectives of the ICT Act, 2006 • What Does the ICT Act or Cyber Law Enable? • Definition of Various Terminology under Section 2 of the ICT Act, 2006 (internet; electronic mail; data; website; chairman; civil procedure; penal code; prescribed; verification; originator; regulation; criminal procedure; adjudicating officer; medium; licence; certifying authority; certification practice and description of procedure; signatory; signature generating machine; cyber tribunal; tribunal; cyber appeal tribunal; Digital Signature; Digital Signature Certificate; Electronic; Electronic Data Interchange; Electronic Form; Electronic Gazette; Electronic Record; Internet; Computer; Computer Network; Computer System; Computer Resource; Controller; Certifying Authority; Subscriber; Verify; Key Pair; Private Key; Public Key; Encryption; Decryption; Originator; Addressee; Intermediary; Cyber Offense; Access; Secure System; Security Procedure; Affixing Digital Signature; authentication service provider etc.)

  • Preamble & Sec 2 of the ICT Act, 2006
  • STATEMENT OF OBJECTS AND REASONS- ICT ACT 2006
  • DEFINITION OF CYBER LAW
  • SCOPE OF CYBER LAW
  • Exhaustive or Not-ICT ACT OR CYBER LAW?
  • WHAT DOES THE ICT ACT OR CYBER LAW ENABLE?
  • ADVANTAGES OF CYBER LAW
  • Essentials of Cyber Laws for IT or ICT Professionals
  • WHAT ARE SOME OF THE KEY CYBER LAW ISSUES THAT YOU THINK MUST BE TAUGHT AND ADDRESSED IN COMMUNICATION/JOURNALISM SCHOOLS?
  • Essentials of Cyber Laws for LAW Students
  • CLASSIFICATION OF CYBER LAW
  • Definitions – “Digital signature”
  • Definition – “Digital signature Certificate
  • Sec. 2 (3) Definition – “Electronic” Sec. 2 (4)- Definition – “Electronic data interchange
  • Sec. 2(5).- Definition – “Electronic form”
  • Lesson 1-MCQ Test -1

Lecture 2 (Basic Concepts Cyber and Technology Law)
• How the Internet Works? • Where to Begin? • Internet Addresses • Protocol Stacks and Packets • Domain Names and Address Resolution • Application Protocols: HTTP and the World Wide Web • Application Protocols: SMTP and Electronic Mail • Transmission Control Protocol

Lecture 3 (Basic Concepts Cyber and Technology Law)
Lecture 3 (Basic Concepts Cyber and Technology Law) • Historical Background Of Internet • Growth of The World Wide Web • Growth of The Internet • Scope of Cyber Law • Definition of Cyber Law • Advantages of Cyber Law • Cyber Property • Cyber Jurisprudence

Lecture 4 (Basic Concepts Cyber and Technology Law)
Lecture 4 (Basic Concepts Cyber and Technology Law) • Why Cyber Laws • Strengths of the Information and Communication Technology Act, 2006 • Criticism and Weakness of the ICT Act, 2006 • Essentials of Cyber Laws for IT or ICT Professionals • What are Some of The Key Cyber Law Issues That You Think Must Be Taught and Addressed In Communication/Journalism Schools? • Classification of Cyber Law

Lecture 5 (Cyber Law Bangladesh Perspective)
Lecture 5 (Cyber Law Bangladesh Perspective) • Need for Cyber Law in Bangladesh • Historical Background of the Information and Communication Technology Law or Cyber Law • Sides of Cyber Law or ICT Act of Bangladesh • Cyber Law in Bangladesh • Objectives of the ICT Act, 2006 • What Does the ICT Act or Cyber Law Enable?

Lecture 6 (Cyber Law Bangladesh Perspective)
Lecture 6 (Cyber Law Bangladesh Perspective) • Digital Signature: Significance of signature on law • Nature and functionalities of digital signature • Digital Signature and Electronic Record • Definition of Digital Signature/ Meaning of Electronic Records • Legal Recognition of Electronic Signatures & Electronic Records • Categories of Digital Signatures • Difference between digital and paper based signature • Digital signature generation and verification process • Key pair and asymmetric cryptosystem • Principle of irreversibility.

Lecture 7 (Cyber Law Bangladesh Perspective)
Lecture 7 (Cyber Law Bangladesh Perspective) • Methods of the Authentication of Electronic Records by Digital Signature • Use of Electronic Records and Digital Signatures in Government Office • Retention of Electronic Records • Electronic Gazette • No Liability to Accept Documents in Electronic Form

Lecture 8 (Cyber Law Bangladesh Perspective)
Lecture 8 (Cyber Law Bangladesh Perspective) • Attribution, Acknowledgement and Dispatch of Electronic Records Attribution of Electronic Record • Attribution of Electronic Record • Acknowledgement of Receipt

Lecture 9 (Cyber Law Bangladesh Perspective)
Lecture 9 (Cyber Law Bangladesh Perspective) • Time and Place of Dispatch and Receipt of Electronic Record • Secure Electronic Records & Secure Digital Signatures • Secure Electronic Records • Secure Digital Signatures

Lecture 10 (Cyber Law Bangladesh Perspective)
Lecture 10 (Cyber Law Bangladesh Perspective) • Controller & Certifying Authorities • Certification Authority • Appointment of Controller of Certifying Authorities • Controller, Sub Controller & Assistant Controller Who Are? • Electronic Record Reservation Room

Lecture 11 (Cyber Law Bangladesh Perspective)
Lecture 11 (Cyber Law Bangladesh Perspective) • Functions of the Controller of Certifying Authorities • Power of the Controller of Certification Authorities • Can A Digital Signature Certificate Issued By Foreign Certifying Authority Be Valid In Bangladesh? • Controller to Act as Repository

Lecture 12 (Cyber Law Bangladesh Perspective)
Lecture 12 (Cyber Law Bangladesh Perspective) • What Is A Digital Signature Certificate? • License to Issue Digital Signature Certificates • Application for License • Method for Grant or Rejection of License • Revocation and Suspension of License • Display of License • Surrender of License • Disclosure by Certifying Authority • Issuing of Certificate

Lecture 13 (Cyber Law Bangladesh Perspective)
Lecture 13 (Cyber Law Bangladesh Perspective) • Assurance by Certifying Authority • Revocation of Digital Signature Certificate • Suspension of Digital Signature Certificate • Duties of Subscribers

Lecture 14 (Cyber Law Bangladesh Perspective)
Lecture 14 (Cyber Law Bangladesh Perspective) • Penalties and Adjudication • Penalty for Failure to Furnish Document, Return or Report • Penalty for Failure to Maintain Books of Accounts or Records • Fine for Infringement of Rules or Regulations of ICT Act, 2006 • Crime and Investigation and Punishment • Investigation and adjudication of cyber crimes • Digital evidence • Methodology of Cyber Crime Investigation • Basic Investigation Techniques • Investigating Emails

Lecture 15 (Cyber Law Bangladesh Perspective)
Lecture 15 (Cyber Law Bangladesh Perspective) • What Is Damage to Computer, Computer System, Etc • Penalty for Damage to Computer, Computer System, Etc • Meaning of Computer Contaminant • Meaning of Computer Database • Meaning of Computer Virus • Meaning of Damage of Computer • Meaning of Tampering With Computer Source Documents • Meaning of Computer Source Code

Lecture 16 (Cyber Law & Cyber Crime: Hacking – Bangladesh Perspective)
Lecture 16 (Cyber Law & Cyber Crime: Hacking - Bangladesh Perspective) • Hacking With Computer System; Hacking Concepts; What is Hacking? - Who is a Hacker? -Hacker Classes- Hacking Phases: o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks • Ethical Hacking Concepts • What is Ethical Hacking? • Why Ethical Hacking is Necessary • Scope and Limitations of Ethical Hacking • Skills of an Ethical Hacker • Legal and Regulatory Framework: Understanding relevant laws and regulations regarding cybersecurity and ethical hacking practices

Lecture 17 (Cyber Law: Cyber Pornography and Privacy)
Lecture 17 (Cyber Law: Cyber Pornography and Privacy) • Cyber Pornography and Privacy • Child Pornography • Online Pornography • Online Pornography in Bangladesh • Online Obscenity- Is It More Permissive Than USA?

Lecture 18 (Cyber Law: Crime and Punishment for Unauthorized Access)
Lecture 18 (Cyber Law: Crime and Punishment for Unauthorized Access) • Crime and Punishment for Unauthorized Access to Protected Systems • How Does ICT Act Deal With Hacking? • Distinction Hacking Vs. Unauthorized Access

Lecture 19 (Cyber Law : Bangladesh Perspective)
Lecture 19 (Cyber Law : Bangladesh Perspective) • Punishment for False Representation and Hiding Information • Crime and Punishment on Disclosure of Confidentiality and Privacy • Crime and Punishment on Publishing False Digital Signature Certificate • Crime and Punishment for Publication of Digital Signature Certificate for Fraudulent Purpose • Crime and Punishment for Using Computer for Committing an Offence • Offences Committed By Companies

Lecture 20 (Cyber Law: ICT ACT/Digital Security/Cyber Security/Cyber Suroksha, Offenses and Penalties)
Lecture 20 (Cyber Law: ICT ACT/Digital Security/Cyber Security/Cyber Suroksha, Offenses and Penalties) • Civil Offences under the ICT Act 2006 • Criminal Offences Stipulated by ICT Act 2006 • Criminal Offences Stipulated by DS Act 2018 (Repealed) • Criminal Offences Stipulated by Cyber Suroksha Ordinance 2024 • Offences under ICT ACT, 2006/Digital Security/Cyber Security/Cyber Suroksha Ordinance, 2024- Penalty and adjudication - Punishments for contraventions under those Laws (Case Laws, Rules and recent judicial pronouncements to be discussed) - Limitations of Cyber Law

Lecture 21 (Cyber Tribunal: Bangladesh Perspective)
Lecture 21 (Cyber Tribunal: Bangladesh Perspective) • Establishment of Cyber Tribunal, Enquiry, Trial and Appeal of Crimes Etc. • Establishment of Cyber Tribunal • Procedure of Trial of the Cyber Tribunal • The Application of Criminal Procedure in the Procedure of the Tribunal • Bail Rules • The Time Limit to Give Judgement • The Time Limit of Disputing a Case by the Tribunal • Justice by Session Court • The Power of Investigation of Crime Etc. • Are Cyber Crimes Considered as Cognizable or Non Cognizable? • Confiscation

Lecture 22 (Cyber Law: Cyber Appellate Tribunal (CAT))
Lecture 22 (Cyber Law: Cyber Appellate Tribunal (CAT)) • Establishment of Cyber Appellate Tribunal (CAT) • Procedure and powers of Cyber Appellate Tribunal (CAT) • Appeal procedure in case of not establishing Cyber Appellate Tribunal • Trial of offence and appeal • Application of the Code of Criminal Procedure

Lecture 23 (Cyber Law: Immunity to Internet Service Providers (ISPs)
Lecture 23 (Cyber Law: Immunity to Internet Service Providers (ISPs) • Immunity to Internet Service Providers (ISPs) • Network Service Provider/ Internet Service Providers (ISPs) • Draconian Powers to Police Officers • Arrest without Warrant or Not • Establishment of Cyber Appeal Tribunal • Procedure and Powers of Cyber Appellate Tribunal

Lecture 24 (Cyber Law: Contract Act, 1872)
Lecture 24 (Cyber Law: Contract Act, 1872) • Cyber Legislation and Legal Issues - The Contract Act, 1872 • Use of Cyber Cafés by Minors • Cyber Legislation and Legal Issues- Tort Liability and Remedies in Cyberspace • Cyber Legislation and Legal Issues - Trespass to Chattels • Cyber Torts: Cyber Defamation; Cyber Negligence; Cyber Nuisance; Cyber Trespass; Cyber Liability • Different types of civil wrongs under the ICT Act, 2006 and the Digital Security Act, 2018 (Repealed)/ the Cyber Security Act, 2023(Repealed)/ the Cyber Suroksha Ordinance, 2024.

Lecture 25 (Cyber Law: The Sale of Goods Act 1930)
Lecture 25 (Cyber Law: The Sale of Goods Act 1930) • Cyber Legislation and Legal Issues- The Sale of Goods Act 1930

Lecture 26 (Cyber Law: Penal Legislation -Bangladesh Perspective)
Lecture 26 (Cyber Law: Penal Legislation -Bangladesh Perspective) • Cyber Legislation and Legal Issues - The Penal Code, 1860 • Cyber Legislation and Legal Issues - The Police Act, 1861

Lecture 27 (Cyber Law: Evidence Act, 1872)
Lecture 27 (Cyber Law: Evidence Act, 1872) • Cyber Legislation and Legal Issues The Evidence Act, 1872 • Cyber Legislation and Legal Issues The Bankers' Books Evidence Act, 1891 • Cyber Legislation and Legal Issues The Bangladesh Bank Order, 1972

Lecture 28 (Cyber Law: Copyright Act, 2000)
Lecture 28 (Cyber Law: Copyright Act, 2000) • Cyber Legislation and Legal Issues The Copyright Act, 2000 • Cyber Legislation and Legal Issues The Telegraph Act, 1885

Lecture 29 (Cyber Law and Internet Taxation)
Lecture 29 (Cyber Law and Internet Taxation) • Cyber Legislation and Legal Issues- The Bangladesh Tax Ordinance, 1984 • Internet Taxation and Cyber Law • VAT vs. Internet • Sales Tax vs. Internet

Lecture 30 (Cyber Law: Consumer Protection Act, 2009)
Lecture 30 (Cyber Law: Consumer Protection Act, 2009) • Cyber Legislation and Legal Issues The Consumer Protection Act, 2009 • Consumer Protection Laws and Cyber Law

Lecture 31 (Cyber Law: Other Laws)
Lecture 31 (Cyber Law: Other Laws) Cyber Legislation and Legal Issues - Other Laws

Lecture 32 (Cyber Law: Constitutional & Human Rights Issues in Cyberspace)
Lecture 32 (Cyber Law: Constitutional & Human Rights Issues in Cyberspace) • Constitutional & Human Rights Issues in Cyberspace: Freedom of speech and expression in cyberspace • Right to access cyberspace Access to Internet • Right to privacy • Right to data protection

Lecture 33 (Cyber Law: Cyber Jurisdiction)
Lecture 33 (Cyber Law: Cyber Jurisdiction) Cyber Law and Jurisdiction: concept of jurisdiction in cyber law; Issues of the jurisdiction in cyberspace; Multi Jurisdictional or Cross Border Problem; Prerequisites of Jurisdiction in Cyberspace; Theories of Cyberspace Jurisdiction; Types of Cyber Jurisdiction: Cyber jurisdiction in National Cases: Cyber Jurisdiction in Civil Cases- Cyber Jurisdiction in Criminal Cases; Cyber jurisdiction in International Cases; The Test evolved of Jurisdictional Aspects in Cyber Law: Minimum Contacts Theory- Sliding Scale Theory; Effects Test and International Targeting: Extra Regional Effect of Cyber Law & Jurisdiction under ICT Act, 2006

Lecture 34 (Cyber Law: Regional and Global Perspective)
Lecture 34 (Cyber Law: Regional and Global Perspective) • Status of Cyber Laws: Regional and Global Perspective • International Laws & Conventions on Cyber Law • Cyber Related Laws in Other Developed Countries • Cyber Law: Regulation of cyberspace and need for cyber law • Cyber jurisprudence at international and domestic level • International perspectives - UN and International Telecommunication Union (ITU) • Initiatives: Council of Europe-Budapest Convention on Cybercrime-Asia Pacific Economic Cooperation (APEC)-Organization for Economic Co operation and Development (OECD)-World Bank-Commonwealth of Nations.

Lecture 35 (Cyber Law – USA)
Lecture 35 (Cyber Law - USA) • Development of Cyber Laws in USA • Cyber Privacy Laws in USA • Anti Spam Legislation in USA • Copyright Law in USA

Lecture 36 (Cyber Law – Australia)
Lecture 36 (Cyber Law - Australia) Cyber Related Laws in Australia EU Data Protection Laws

Lecture 37 (Cyber Law – Other States)
Lecture 37 (Cyber Law – Other States) • Cyber Related Laws in Japan • Cyber Related Laws in Singapore • Cyber Related Laws in Malaysia

Lecture 39 (Cyber Law: UNCITRAL Model Laws)
Lecture 39 (Cyber Law: UNCITRAL Model Laws) • United Nations Resolutions • UNCITRAL Model Laws • United Nations Commission on International Trade Law (UNCITRAL) • UNCITRAL Model Law on Electronic Commerce with Guide to Enactment 1996 With additional article 5 bis as adopted in 1998 • UNCITRAL Model Law on Electronic Signatures with Guide to Enactment 2001 • United Nations Convention on the Use of Electronic Communications in International Contracts • OECD Guidelines • ICAAN • WIPO, ITU, & WTO

Lecture 40 (Cyber Law: Intellectual Property Issues in Cyber Space)
Lecture 40 (Cyber Law: Intellectual Property Issues in Cyber Space) • The Nature of Cyberspace • Intellectual Property Issues in Cyber Space: Interface with copyright law Interface with patent law • Understanding The System of Domain Names • Trademarks and domain names related issues • Legality of P2P file sharing.

Lecture 41 (Cyber Law: Copyright Protection in Cyberspace)
Lecture 41 (Cyber Law: Copyright Protection in Cyberspace) • Copyright Protection in Cyberspace • Why Is Copyright Ill Equipped to Deal with The Internet? • How Do Copyright Issues and Challenges for Newspapers And Broadcast Media Change In Cyberspace?

Lecture 42 (Cyber Law: Copyright in the Digital Media)
Lecture 42 (Cyber Law: Copyright in the Digital Media) • Copyright in the Digital Media • Copyright & Cyberspace • Nature of Copyright in Cyberspace • Fair use and Infringement • Copyright issues in Digital Media • Hyper linking • Caching • Framing etc. • International Copyright Laws

Lecture 43 (Cyber Law: Patents in the Cyber World)
Lecture 43 (Cyber Law: Patents in the Cyber World) • Patents in the Cyber World • Nature of Patent Rights • Patents in the Digital Environment • Procedure of Obtaining Patents • Difference between Copyright and Patents • Patenting of Business Methods

Lecture 44 (Cyber Law – Trademark in Cyberspace)
Lecture 44 (Cyber Law - Trademark in Cyberspace) • Trademark in Cyberspace • Trademark law & Cyberspace • Trademarks Protection in Cyberspace • aw relating to Semiconductor Layout & Design

Lecture 45 (Cyber Law: Domain Names)
Lecture 45 (Cyber Law: Domain Names) • Domain Names and Related issues • Understanding the system of domain names • Different Perspectives • What Is Cybersquatting? • Cyber Squatting and Trademark Infringement • URDP and Cyber Squatting

Lecture 46 (Cyber Law – Privacy and Freedom)
Lecture 46 (Cyber Law - Privacy and Freedom) • Privacy and Freedom- Issues in the Cyber World • Nature of Privacy Rights • Cyber Stalking • Use of Cookies • Privacy Invasion by Government • Privacy Invasion by Employer • Freedom of Speech Vs Privacy Rights, Spam etc • E Government and E governance • Legal Issues in E Governance

Lecture 47 (Cyber Law – Electronic Commerce)
Lecture 47 (Cyber Law - Electronic Commerce) • Electronic Commerce: Concept • e-Commerce in Bangladesh • Overview of e Commerce • E commerce Salient Features • The Promising Significance of e Commerce • Dimensions of E Commerce • Online approaches like B2B, B2C & C2C • The Growth and Potential of E Commerce in Bangladesh • The Bottlenecks of e Commerce • The Regulatory and Legal Environment of E Commerce • Communication of offer and acceptance in cyberspace • UNCITRAL Model Law on Electronic Commerce

Lecture 48 (Cyber Law: e Banking)
Lecture 48 (Cyber Law: e Banking) • e Banking: e Banking in Bangladesh • Growth and Uses of e Banking in Bangladesh • Tele-Banking Service in Bangladesh • Challenges of Development of e Banking in Bangladesh • Internet Banking in Bangladesh

Lecture 49 (Cyber Law: Electronic Contracts/ Online contracts)
Lecture 49 (Cyber Law: Electronic Contracts/ Online contracts) • Electronic Contracts/ Online contracts • The Essence of Digital Contracts/ Online contracts • Defining a Digital Contract/ Online contracts • Formation of Digital Contracts/ Online contracts • Classification of Electronic Contracts/ Online contracts Click wrap contracts • United Nations Convention on the Use of Electronic Communications in International Contracts • Applicability of the Contract Act, 1872. • Special issues relating to Cyber contracts • What is Meant by Online Contracts • Evidentiary Value of Online Contracts

Lecture 50 (Cyber Law: Digital Signatures)
Lecture 50 (Cyber Law: Digital Signatures) • The System of Digital Signatures • Technology of Digital Signatures, Hash, Asymmetric Cryptography • Digital Signatures legal issues • Digital Signatures technical issues

Lecture 51 (Cyber Law – Forensic Tools and Electronic Evidence)
Lecture 51 (Cyber Law - Forensic Tools and Electronic Evidence) Forensic Tools and Processing of Electronic Evidence: Modern forensic tools, usages, and risks; Usage of Slack space; Tools for Disk Imaging and Data Recovery; Vulnerability Assessment and associated tools; Encase and FTK tools; Anti Forensics and probable counters; Vulnerability Assessment and associated tools; Encase and FTK tools; Anti Forensics and probable counters. Information retrieving and processing: Retrieving information and processing; Process of computer forensics and digital investigations; Processing of digital evidence, multimedia evidence, and digital images; Damaged SIM and data recovery; Retrieving and Processing of deleted data (desktops, laptops, mobiles, etc.); Retrieving data from slack space, renamed file, ghosting, compressed files. Cybercrime and network tracing: Technical aspects of Cyber Crime; Network Trace Route; Address Identification; Network tracing e mail headers; Digital Evidence Search and Seizure/Acquisition; Server software, RAID, Log Analysis, and major browser artefacts; Peer to Peer networks; BitTorrent Protocol; Bit-Torrent Forensic Artefacts. Targeted audiences and Forensic reports: Understanding your target audience; Creating a forensic report; Proper report writing. Legal Aspects: Legal Aspects of Cyber Crime; IT Act 2000/2008 and Privacy Issues; Involving Law enforcement.

Lecture 52 (Cyber Crime and computer crime)
Lecture 52 (Cyber Crime and computer crime) • Cyber Crime and computer crime: Definition and Origin of the Word, Cyber Crime and Information Security, who are Cyber Criminals, Classification of Cyber Crime; Cybercrimes and white collar crimes Cyber Crimes against individuals, Institution and State; Classification of Cybercrimes: E-mail Spoofing, Spamming, Cyber Defamation, Internet Time Theft, Salami Attack, Salami technique Data Diddling, Forgery, Web Jacking, Newsgroup Spam, Industrial Spying, Hacking, Online Frauds, Pornographic Offenders, Software Piracy, Computer Sabotage, Email Bombing, Computer Network Intrusion, Password Sniffing, Credit Card Frauds, Identity Theft, Hacking, System and data interference, Digital forgery, Cyber stalking/harassment, Cyber pornography, Identity theft and fraud, Cyber terrorism, Criminal Mind-Mens Rea, Different offences under the ICT Act, 2006; the Digital Security Act, 2018 and other statutes. Legal Provisions regarding Cyber Crimes

Lecture 53 (Cyber Law: Cyber Crime- Phishing and Identity Theft)
Lecture 53 (Cyber Law: Cyber Crime- Phishing and Identity Theft) Phishing: Methods of Phishing, Phishing Techniques, Types of Phishing Scams, Phishing countermeasures, Identity theft, Types and Techniques of identity thefts and its counter measures

Lecture 54 (Cyber Law – Dispute Resolution in Cyberspace)
Lecture 54 (Cyber Law - Dispute Resolution in Cyberspace) • Dispute Resolution in Cyberspace: Concept of Jurisdiction • Context of Jurisdiction and ICT Act, 2006 • International Law and Jurisdictional Issues in Cyberspace • Dispute Resolutions

Lecture 55 (Cyber Law: Cyber Security)
Lecture 55 (Cyber Law: Cyber Security) • Cyber Security: Meaning of cyber security • Various aspects of cyber security • Critical infrastructure • Network security • Application security • Internet of things (IoT) security • Endpoint security • Data/Information security • Identity management • Database and infrastructure security • Cloud security • Mobile security • Disaster recovery/ continuity planning • End user education • Appropriate and robust laws.

Student Ratings & Reviews

4.0
Total 1 Rating
5
0 Rating
4
1 Rating
3
0 Rating
2
0 Rating
1
0 Rating
SK
6 days ago
Nice