SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Certified Cyber Law Analyst
VS-1154
Certified Cyber Law Analyst
www.vskills.in
CCCCertifiedertifiedertifiedertified Cyber Law AnalystCyber Law AnalystCyber Law AnalystCyber Law Analyst
Certification CodeCertification CodeCertification CodeCertification Code VS-1154
Vskills certification for Cyber Law Analyst assesses the candidate as per the company’s
need for securing against internet related offenses. The certification tests the candidates on
various areas in electronic signature, UNCITRAL, attribution, acknowledgement and
dispatch of electronic records, certifying authority, IPR protection, international
organization, COE, IT Act and judicial review.
Why should one take this certifWhy should one take this certifWhy should one take this certifWhy should one take this certification?ication?ication?ication?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Cyber Law Analyst Certification can help candidate differentiate in today's
competitive job market, broaden their employment opportunities by displaying their
advanced skills, and result in higher earning potential.
Who will benefit from taking this certificatioWho will benefit from taking this certificatioWho will benefit from taking this certificatioWho will benefit from taking this certification?n?n?n?
Job seekers looking to find employment in legal or IT departments of various companies,
students generally wanting to improve their skill set and make their CV stronger and
existing employees looking for a better role can prove their employers the value of their
skills through this certification.
Test DetailsTest DetailsTest DetailsTest Details
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
Fee StructureFee StructureFee StructureFee Structure
Rs. 4,000/- (Includes all taxes)
Companies that hireCompanies that hireCompanies that hireCompanies that hire VskillsVskillsVskillsVskills Cyber Law AnalystCyber Law AnalystCyber Law AnalystCyber Law Analyst
Cyber Law Analysts are in great demand. Companies specializing in legal or internet
related services or IT are constantly hiring skilled Cyber Law Analysts. Various public and
private companies also need Cyber Law Analysts for their legal or IT departments.
Certified Cyber Law Analyst
www.vskills.in
Table of ContentsTable of ContentsTable of ContentsTable of Contents
1.1.1.1. Understanding Internet and Cyber LawsUnderstanding Internet and Cyber LawsUnderstanding Internet and Cyber LawsUnderstanding Internet and Cyber Laws
1.1 Modem Era
1.2 Need for Cyber Laws
1.3 Historical Perspective
1.4 The Character and Use of Internet Technology
2.2.2.2. Conceptual FrameworkConceptual FrameworkConceptual FrameworkConceptual Framework
2.1 What is E-commerce?
2.2 Growth and Development of E-commerce
2.3 Various Modes of E-commerce
2.4 Mechanism Involved in the Operation of Internet
2.5 Types of Players in E-commerce
2.6 Web Development and Hosting Agreements
2.7 Web Hosting
2.8 The Problem of Internet Jurisdiction
2.9 Illustrative Cases
2.10 Type of Websites
3. The Role oThe Role oThe Role oThe Role of Electronic Signaturef Electronic Signaturef Electronic Signaturef Electronic Signature
3.1 Indian Economy
3.2 Basic Laws
3.3 Authentication of Digital Signature and Electronic Records
3.4 UNCITRAL
3.5 Securing Electronic Transactions
3.6 Hash Function Basics
3.7 Digital Signature’s Verification
3.8 Certifying Authorities and Electronic Signature under Indian Law
3.9 The Functions of Controller and Other Officers
3.10 Feasibility of Implementing Digital Signature
3.11 Security and Privacy of Digital Signatures
3.12 Private Key Escrow and Key Recovery System
3.13 Obligation of a Certifying Authority and Certificate Management
3.14 Security Threats
3.15 International Efforts
3.16 The Singapore Electronic Transaction Act, 1998
3.17 Different Approaches of Digital Signatures
4.4.4.4. Legal Aspects of Electronic RecordsLegal Aspects of Electronic RecordsLegal Aspects of Electronic RecordsLegal Aspects of Electronic Records
4.1 Electronic Records Recognition
4.2 The Position in the US and Australia
4.3 Electronic Records Retention in India
4.4 UNCITRAL Model Law for Retention
4.5 Attribution, Acknowledgement and Dispatch in India
Certified Cyber Law Analyst
www.vskills.in
4.6 UNCITRAL on Attribution and Acknowledgement
4.7 Acknowledgement of Receipt in India
5.5.5.5. Certifying Authorities in IndiaCertifying Authorities in IndiaCertifying Authorities in IndiaCertifying Authorities in India
5.1 The Role of Certifying Authority (CA)
5.2 Functions and Appointment of Controller
5.3 License to Issue Digital Signature
5.4 Renewal and Suspension of CA License
5.5 Security Guidelines for CA
5.6 Surrender of License and Cessation as CA
5.7 CA and Disclosure of Information
5.8 Electronic Signature Certificate issuance and suspension by CA
5.9 Archiving and Revocation of Digital Signature Certificates
5.10 Rules of Compromise
5.11 Confidential Information and Access Rules
5.12 Duties of Subscribers
6.6.6.6. IPRIPRIPRIPR ProtectionProtectionProtectionProtection in Indiain Indiain Indiain India
6.1 The Domain Name Relevance in IPR
6.2 Cyberspace Squatting
6.3 Bad Faith and Domain Name Infringement
6.4 Some Complaints from India before WIPO
6.5 Protection of Copying in Cyberspace
6.6 Rights of Software Copyright Owners
6.7 Infringement of Copyright
6.8 Linking, Hyper-Linking and Framing
6.9 Remedies for Infringement
6.10 The Liabilities of an Internet Services Provider (ISP)
6.11 Cyberspace and the Protection of Patents in India
7.7.7.7. International Cyberspace LawsInternational Cyberspace LawsInternational Cyberspace LawsInternational Cyberspace Laws
7.1 United Nations Commission on International Trade Law
7.2 The Organization for Economic Cooperation Development (OECD)
7.3 World Trade Organisation (WTO) and E-Commerce
7.4 The World Intellectual Property Organisation (WIPO) and E-commerce
7.5 The Internet Corporation for Assigned Name and Numbers (ICANN)
7.6 Asia Pacific Economic Cooperation (APEC)
7.7 US Agencies for E-commerce Law and Policy
7.8 Internet Law and Forum
7.9 International Chamber of Commerce
7.10 Singapore Electronic Transactions Guidelines
8.8.8.8. Council of Europe’s (Council of Europe’s (Council of Europe’s (Council of Europe’s (COECOECOECOE)))) ConventionConventionConventionConvention
8.1 Domestic Measures on Child Pornography
8.2 Infringements of Copyrights and Related Rights Offences
8.3 Extradition under COE
Certified Cyber Law Analyst
www.vskills.in
8.4 Mutual Assistance between the States
9.9.9.9. IT Act and Judicial ReviewIT Act and Judicial ReviewIT Act and Judicial ReviewIT Act and Judicial Review
9.1 Penalty and Compensation for Damage
9.2 Compensation for Failure to Protect Data
9.3 Penalty for Failure to Furnish Information
9.4 Adjudication of Disputes under the IT Act
9.5 Cyber Appellate Tribunal
9.6 Compounding of Contraventions and Recovery of Penalty
9.7 Appeal to the High Court under the IT Act
10.10.10.10. Important Offences under the Cyberspace LawImportant Offences under the Cyberspace LawImportant Offences under the Cyberspace LawImportant Offences under the Cyberspace Law
10.1 Obscenity and Pornography
10.2 Hacking
10.3 Other Offences
10.4 Violation of the Right Privacy
10.5 Violation of Privacy, Breach of Confidentially and Privacy
10.6 Terrorism
11.11.11.11. Offences under theOffences under theOffences under theOffences under the ITITITIT Act in IndiaAct in IndiaAct in IndiaAct in India
11.1 Cyber crimes offence by Intermediaries
11.2 Power of the Controller
11.3 Directions for Monitoring of Information
11.4 Collecting Traffic Data
11.5 Protected System Offences
11.6 The Misrepresentation Offence
11.7 Electronic Signature Certificate with False Particulars
11.8 Confiscation as Penalty
11.9 Compounding of Offences under the IT Act
11.10 Cognizance of Offences and Bail under the IT Act
11.11 Punishment for Abetment and Attempt to Commit Offences
11.12 Commission of Offences by Companies under the IT Act
11.13 The Power of Police to Enter and Search
11.14 Protection of Action Taken in a Goods Faith
11.15 Amendments to IT Act
12.12.12.12. Electronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT Act
12.1 Indian Evidence Act
12.2 Examiner of Electronic Evidence
12.3 Amendments to the Indian Evidence Act 1872,
12.4 The Appointment of National Nodal Agency
12.5 Indian Computer Emergency Response Team (CERT)
12.6 Electronic Cheques Laws
12.7 Advisory Committee
12.8 Security Practices and Sensitive Personal Information
Certified Cyber Law Analyst
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. Which of the following crimesWhich of the following crimesWhich of the following crimesWhich of the following crimes is done using a computer as the instrument?is done using a computer as the instrument?is done using a computer as the instrument?is done using a computer as the instrument?
A. Computer manipulation
B. Money laundering
C. Data alteration
D. Theft of services
2222.... Which of the following crimes targets a computer?Which of the following crimes targets a computer?Which of the following crimes targets a computer?Which of the following crimes targets a computer?
A. Denial of service
B. Money laundering
C. Theft of services
D. Intellectual property violations
3333.... Which of the following best defines computer abuse?Which of the following best defines computer abuse?Which of the following best defines computer abuse?Which of the following best defines computer abuse?
A. Denial of service
B. Money laundering
C. An illegal act in which knowledge of computer technology is used to commit the act
D. An intentional act involving a computer in which the perpetrator may have gained at the
victim’s expense
4444.... What is a “Hacktivist”?What is a “Hacktivist”?What is a “Hacktivist”?What is a “Hacktivist”?
A. Politically motivated hacker
B. Denial of service attacker
C. A proponent of Napster
D. A person engaging in an intentional act involving a computer in which the person may
have gained at the victim’s expense
5555.... Which of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner of
a tangible asset?a tangible asset?a tangible asset?a tangible asset?
A. Hacking
B. Money laundering
C. Manipulating the price of a stock
D. Salami slice
Answers: 1 (D), 2 (A), 3 (D), 4 (A), 5 (D)
PHP Developer Certification

Contenu connexe

Plus de Vskills

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample materialVskills
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample materialVskills
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample materialVskills
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample materialVskills
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample materialVskills
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample materialVskills
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample materialVskills
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample materialVskills
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample materialVskills
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample materialVskills
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample materialVskills
 

Plus de Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Dernier

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Dernier (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

PHP Developer Certification

  • 1. Certified Cyber Law Analyst VS-1154
  • 2. Certified Cyber Law Analyst www.vskills.in CCCCertifiedertifiedertifiedertified Cyber Law AnalystCyber Law AnalystCyber Law AnalystCyber Law Analyst Certification CodeCertification CodeCertification CodeCertification Code VS-1154 Vskills certification for Cyber Law Analyst assesses the candidate as per the company’s need for securing against internet related offenses. The certification tests the candidates on various areas in electronic signature, UNCITRAL, attribution, acknowledgement and dispatch of electronic records, certifying authority, IPR protection, international organization, COE, IT Act and judicial review. Why should one take this certifWhy should one take this certifWhy should one take this certifWhy should one take this certification?ication?ication?ication? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Cyber Law Analyst Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certificatioWho will benefit from taking this certificatioWho will benefit from taking this certificatioWho will benefit from taking this certification?n?n?n? Job seekers looking to find employment in legal or IT departments of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification. Test DetailsTest DetailsTest DetailsTest Details • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee StructureFee StructureFee StructureFee Structure Rs. 4,000/- (Includes all taxes) Companies that hireCompanies that hireCompanies that hireCompanies that hire VskillsVskillsVskillsVskills Cyber Law AnalystCyber Law AnalystCyber Law AnalystCyber Law Analyst Cyber Law Analysts are in great demand. Companies specializing in legal or internet related services or IT are constantly hiring skilled Cyber Law Analysts. Various public and private companies also need Cyber Law Analysts for their legal or IT departments.
  • 3. Certified Cyber Law Analyst www.vskills.in Table of ContentsTable of ContentsTable of ContentsTable of Contents 1.1.1.1. Understanding Internet and Cyber LawsUnderstanding Internet and Cyber LawsUnderstanding Internet and Cyber LawsUnderstanding Internet and Cyber Laws 1.1 Modem Era 1.2 Need for Cyber Laws 1.3 Historical Perspective 1.4 The Character and Use of Internet Technology 2.2.2.2. Conceptual FrameworkConceptual FrameworkConceptual FrameworkConceptual Framework 2.1 What is E-commerce? 2.2 Growth and Development of E-commerce 2.3 Various Modes of E-commerce 2.4 Mechanism Involved in the Operation of Internet 2.5 Types of Players in E-commerce 2.6 Web Development and Hosting Agreements 2.7 Web Hosting 2.8 The Problem of Internet Jurisdiction 2.9 Illustrative Cases 2.10 Type of Websites 3. The Role oThe Role oThe Role oThe Role of Electronic Signaturef Electronic Signaturef Electronic Signaturef Electronic Signature 3.1 Indian Economy 3.2 Basic Laws 3.3 Authentication of Digital Signature and Electronic Records 3.4 UNCITRAL 3.5 Securing Electronic Transactions 3.6 Hash Function Basics 3.7 Digital Signature’s Verification 3.8 Certifying Authorities and Electronic Signature under Indian Law 3.9 The Functions of Controller and Other Officers 3.10 Feasibility of Implementing Digital Signature 3.11 Security and Privacy of Digital Signatures 3.12 Private Key Escrow and Key Recovery System 3.13 Obligation of a Certifying Authority and Certificate Management 3.14 Security Threats 3.15 International Efforts 3.16 The Singapore Electronic Transaction Act, 1998 3.17 Different Approaches of Digital Signatures 4.4.4.4. Legal Aspects of Electronic RecordsLegal Aspects of Electronic RecordsLegal Aspects of Electronic RecordsLegal Aspects of Electronic Records 4.1 Electronic Records Recognition 4.2 The Position in the US and Australia 4.3 Electronic Records Retention in India 4.4 UNCITRAL Model Law for Retention 4.5 Attribution, Acknowledgement and Dispatch in India
  • 4. Certified Cyber Law Analyst www.vskills.in 4.6 UNCITRAL on Attribution and Acknowledgement 4.7 Acknowledgement of Receipt in India 5.5.5.5. Certifying Authorities in IndiaCertifying Authorities in IndiaCertifying Authorities in IndiaCertifying Authorities in India 5.1 The Role of Certifying Authority (CA) 5.2 Functions and Appointment of Controller 5.3 License to Issue Digital Signature 5.4 Renewal and Suspension of CA License 5.5 Security Guidelines for CA 5.6 Surrender of License and Cessation as CA 5.7 CA and Disclosure of Information 5.8 Electronic Signature Certificate issuance and suspension by CA 5.9 Archiving and Revocation of Digital Signature Certificates 5.10 Rules of Compromise 5.11 Confidential Information and Access Rules 5.12 Duties of Subscribers 6.6.6.6. IPRIPRIPRIPR ProtectionProtectionProtectionProtection in Indiain Indiain Indiain India 6.1 The Domain Name Relevance in IPR 6.2 Cyberspace Squatting 6.3 Bad Faith and Domain Name Infringement 6.4 Some Complaints from India before WIPO 6.5 Protection of Copying in Cyberspace 6.6 Rights of Software Copyright Owners 6.7 Infringement of Copyright 6.8 Linking, Hyper-Linking and Framing 6.9 Remedies for Infringement 6.10 The Liabilities of an Internet Services Provider (ISP) 6.11 Cyberspace and the Protection of Patents in India 7.7.7.7. International Cyberspace LawsInternational Cyberspace LawsInternational Cyberspace LawsInternational Cyberspace Laws 7.1 United Nations Commission on International Trade Law 7.2 The Organization for Economic Cooperation Development (OECD) 7.3 World Trade Organisation (WTO) and E-Commerce 7.4 The World Intellectual Property Organisation (WIPO) and E-commerce 7.5 The Internet Corporation for Assigned Name and Numbers (ICANN) 7.6 Asia Pacific Economic Cooperation (APEC) 7.7 US Agencies for E-commerce Law and Policy 7.8 Internet Law and Forum 7.9 International Chamber of Commerce 7.10 Singapore Electronic Transactions Guidelines 8.8.8.8. Council of Europe’s (Council of Europe’s (Council of Europe’s (Council of Europe’s (COECOECOECOE)))) ConventionConventionConventionConvention 8.1 Domestic Measures on Child Pornography 8.2 Infringements of Copyrights and Related Rights Offences 8.3 Extradition under COE
  • 5. Certified Cyber Law Analyst www.vskills.in 8.4 Mutual Assistance between the States 9.9.9.9. IT Act and Judicial ReviewIT Act and Judicial ReviewIT Act and Judicial ReviewIT Act and Judicial Review 9.1 Penalty and Compensation for Damage 9.2 Compensation for Failure to Protect Data 9.3 Penalty for Failure to Furnish Information 9.4 Adjudication of Disputes under the IT Act 9.5 Cyber Appellate Tribunal 9.6 Compounding of Contraventions and Recovery of Penalty 9.7 Appeal to the High Court under the IT Act 10.10.10.10. Important Offences under the Cyberspace LawImportant Offences under the Cyberspace LawImportant Offences under the Cyberspace LawImportant Offences under the Cyberspace Law 10.1 Obscenity and Pornography 10.2 Hacking 10.3 Other Offences 10.4 Violation of the Right Privacy 10.5 Violation of Privacy, Breach of Confidentially and Privacy 10.6 Terrorism 11.11.11.11. Offences under theOffences under theOffences under theOffences under the ITITITIT Act in IndiaAct in IndiaAct in IndiaAct in India 11.1 Cyber crimes offence by Intermediaries 11.2 Power of the Controller 11.3 Directions for Monitoring of Information 11.4 Collecting Traffic Data 11.5 Protected System Offences 11.6 The Misrepresentation Offence 11.7 Electronic Signature Certificate with False Particulars 11.8 Confiscation as Penalty 11.9 Compounding of Offences under the IT Act 11.10 Cognizance of Offences and Bail under the IT Act 11.11 Punishment for Abetment and Attempt to Commit Offences 11.12 Commission of Offences by Companies under the IT Act 11.13 The Power of Police to Enter and Search 11.14 Protection of Action Taken in a Goods Faith 11.15 Amendments to IT Act 12.12.12.12. Electronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT ActElectronic Evidence and the Miscellaneous Provisions of the IT Act 12.1 Indian Evidence Act 12.2 Examiner of Electronic Evidence 12.3 Amendments to the Indian Evidence Act 1872, 12.4 The Appointment of National Nodal Agency 12.5 Indian Computer Emergency Response Team (CERT) 12.6 Electronic Cheques Laws 12.7 Advisory Committee 12.8 Security Practices and Sensitive Personal Information
  • 6. Certified Cyber Law Analyst www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. Which of the following crimesWhich of the following crimesWhich of the following crimesWhich of the following crimes is done using a computer as the instrument?is done using a computer as the instrument?is done using a computer as the instrument?is done using a computer as the instrument? A. Computer manipulation B. Money laundering C. Data alteration D. Theft of services 2222.... Which of the following crimes targets a computer?Which of the following crimes targets a computer?Which of the following crimes targets a computer?Which of the following crimes targets a computer? A. Denial of service B. Money laundering C. Theft of services D. Intellectual property violations 3333.... Which of the following best defines computer abuse?Which of the following best defines computer abuse?Which of the following best defines computer abuse?Which of the following best defines computer abuse? A. Denial of service B. Money laundering C. An illegal act in which knowledge of computer technology is used to commit the act D. An intentional act involving a computer in which the perpetrator may have gained at the victim’s expense 4444.... What is a “Hacktivist”?What is a “Hacktivist”?What is a “Hacktivist”?What is a “Hacktivist”? A. Politically motivated hacker B. Denial of service attacker C. A proponent of Napster D. A person engaging in an intentional act involving a computer in which the person may have gained at the victim’s expense 5555.... Which of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner ofWhich of the following is a computer crime that deprives the legitimate owner of a tangible asset?a tangible asset?a tangible asset?a tangible asset? A. Hacking B. Money laundering C. Manipulating the price of a stock D. Salami slice Answers: 1 (D), 2 (A), 3 (D), 4 (A), 5 (D)