SlideShare una empresa de Scribd logo
1 de 9
Electronic   Cyber  Law smi
DEFINITION OF ELECTRONIC CYBER LAW ,[object Object],[object Object]
THE NEED OF ELECTRONIC CYBER LAW ,[object Object]
Example of cyber crime which is against electronic cyber law
Electronic Cyber Crime New Zealand and a Teenager Police in New Zealand are investigating eighteen-year-old who is suspected to be the leader of a ring which has skimmed 25 million USD from bank accounts around the world Investigators in New Zealand, the US and the Netherlands believe the youth, who cannot be named but goes by the online name ‘Akill’ - wrote software used to attack more than a million computers. The software was allegedly used to bring down the computer server at the University of Pennsylvania last year. Police described the teenager as the ringleader of a ‘botnet’ - a network of computers infiltrated by a programme that surreptitiously installs itself to allow a hacker to control it.
Cheating and fraud Email spoofing forgery Indecent exposure Online gambling Time - thefts Unauthorized control over computer Sale of illegal articles Distribution of pirated software IP crimes defamation Financial crimes Cyber terrorism Unauthorized control Sending of obscene material Trafficking Possession of unauthorized information Net trespass Cyber-stalking Selling pornography Unauthorized control Transmitting virus Harassment via e-mails Against society at large Against organi-zations Against individual property Against individuals
FEW TIPS TO PROTECT YOU FROM ELECTRONIC CYBER CRIME ,[object Object],[object Object],[object Object],[object Object],[object Object]
That’s all ,[object Object],[object Object]
[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

La actualidad más candente (19)

Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar a Dons Cyber Law Ppt

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
asha mali
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 

Similar a Dons Cyber Law Ppt (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Dons Cyber Law Ppt

  • 1. Electronic Cyber Law smi
  • 2.
  • 3.
  • 4. Example of cyber crime which is against electronic cyber law
  • 5. Electronic Cyber Crime New Zealand and a Teenager Police in New Zealand are investigating eighteen-year-old who is suspected to be the leader of a ring which has skimmed 25 million USD from bank accounts around the world Investigators in New Zealand, the US and the Netherlands believe the youth, who cannot be named but goes by the online name ‘Akill’ - wrote software used to attack more than a million computers. The software was allegedly used to bring down the computer server at the University of Pennsylvania last year. Police described the teenager as the ringleader of a ‘botnet’ - a network of computers infiltrated by a programme that surreptitiously installs itself to allow a hacker to control it.
  • 6. Cheating and fraud Email spoofing forgery Indecent exposure Online gambling Time - thefts Unauthorized control over computer Sale of illegal articles Distribution of pirated software IP crimes defamation Financial crimes Cyber terrorism Unauthorized control Sending of obscene material Trafficking Possession of unauthorized information Net trespass Cyber-stalking Selling pornography Unauthorized control Transmitting virus Harassment via e-mails Against society at large Against organi-zations Against individual property Against individuals
  • 7.
  • 8.
  • 9.