SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
CYBER CRIME & CYBER
        LAW



                Presented by:-
             himanshu munjal
                   Viii sem,cs
                    Roll no.26
STRUCTURE
•   Introduction
•   Cyber crime
•   Classification of cybercrime
•   Cyber Law & Need
•   Cyber law in US
•   Global efforts
WHAT DO YOU KNOW?
Crime & Cybercrime
• Crime
   – Engaging in conduct that has been outlawed by a particular
     society

• Cybercrime
   – Differ in the tool: guns are change for computers


   Harm to: Individuals, property, government and
    morality
CYBER CRIME

• Cybercrime is any illegal act committed using a computer network
  (especially the Internet).

• Criminal activities that take place in cyberspace (the Internet).

• Computer used to commit a crime
    – Child porn, threatening email, assuming someone’s identity, sexual
      harassment, defamation, spam, phishing

• Computer as a target of a crime
    – Viruses, worms, industrial espionage, software piracy, hacking
EXAMPLE OF CYBER CRIME
Classification OF CYBER CRIME
• Cybercrime includes a wide variety of crime

• Offences under cyber crime:

   – Offences against the confidentiality integrity and availability of
     computer data and systems

   – Content-related offences

   – Copyright-related offences
TYPES OF CYBER CRIME

  Viruses        Fraud
  Worms          Theft
  Trojans        Piracy
  Mail bombs     Break-ins
  Threats        Terrorism.
  Harassment
  DOS
CYBER LAW
• Law governing cyber space

• Cyber law encompasses laws relating to:

   – Cyber Crimes

   – Electronic and Digital Signatures

   – Intellectual Property

   – Data Protection and Privacy
NEED OF CYBER LAW




Cybercriminals + computer technology = difficulties to apply the law.



          not only real-world crimes by using computers…
CYBER LAW IN USA
• Protect America Act of 2007

• Key component “Electronic Surveillance”

• USA Patriot ACT
   – Hacking, cracking, extortion, fraud and malware.
• Advertising Law

• E-Signatures

• Electronic Contracts

• Cryptography Laws

• Electronic Evidence

• Copyright Law

• Domain Names

• Confidentiality
National & International Efforts
• First Wave (privacy)
   – Sweden (1973) ; USA (1974); Federal Republic of German
      (1977); Austria, Denmark, France and Norway (1978), etc.
• Second Wave (property)
   – Italy (1978); UK (1981,1990); USA (1980s); Canada and
      Denmark (1985), etc.
• Third Wave (intellectual property)
• Convention on Cybercrime
   – Ensuring that countries adopt procedural laws.
   – Harmonizing national cybercrime law.
PROTECT YOUR SYSTEM
• Use anti-virus software and firewalls - keep them up to date

• Keep your operating system up to date with critical security updates
  and patches

• Don't open emails or attachments from unknown sources

• Use hard-to-guess passwords. Don’t use words found in a dictionary.
  Remember that password cracking tools exist

• Back-up your computer data on disks or CDs often
• Don't share access to your computers with strangers

• If you have a wi-fi network, password protect it

• Disconnect from the Internet when not in use

• Reevaluate your security on a regular basis

• Make sure your employees and family members know this info too!
• Treat your password like you treat your
    toothbrush. Never give it to anyone
    else to use, and change it every few
                  months.



                THANKS
                  ????

Más contenido relacionado

La actualidad más candente (20)

cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 

Similar a cyber crime & cyber law

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Deepam Aggarwal
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpointlydneat
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and SecuritiesNayan Dagliya
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.pptJiaJunWang17
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 

Similar a cyber crime & cyber law (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and Securities
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

cyber crime & cyber law

  • 1. CYBER CRIME & CYBER LAW Presented by:- himanshu munjal Viii sem,cs Roll no.26
  • 2. STRUCTURE • Introduction • Cyber crime • Classification of cybercrime • Cyber Law & Need • Cyber law in US • Global efforts
  • 3. WHAT DO YOU KNOW?
  • 4. Crime & Cybercrime • Crime – Engaging in conduct that has been outlawed by a particular society • Cybercrime – Differ in the tool: guns are change for computers Harm to: Individuals, property, government and morality
  • 5. CYBER CRIME • Cybercrime is any illegal act committed using a computer network (especially the Internet). • Criminal activities that take place in cyberspace (the Internet). • Computer used to commit a crime – Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing • Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking
  • 7. Classification OF CYBER CRIME • Cybercrime includes a wide variety of crime • Offences under cyber crime: – Offences against the confidentiality integrity and availability of computer data and systems – Content-related offences – Copyright-related offences
  • 8. TYPES OF CYBER CRIME Viruses  Fraud Worms  Theft Trojans  Piracy Mail bombs  Break-ins Threats  Terrorism. Harassment DOS
  • 9. CYBER LAW • Law governing cyber space • Cyber law encompasses laws relating to: – Cyber Crimes – Electronic and Digital Signatures – Intellectual Property – Data Protection and Privacy
  • 10. NEED OF CYBER LAW Cybercriminals + computer technology = difficulties to apply the law. not only real-world crimes by using computers…
  • 11. CYBER LAW IN USA • Protect America Act of 2007 • Key component “Electronic Surveillance” • USA Patriot ACT – Hacking, cracking, extortion, fraud and malware.
  • 12. • Advertising Law • E-Signatures • Electronic Contracts • Cryptography Laws • Electronic Evidence • Copyright Law • Domain Names • Confidentiality
  • 13. National & International Efforts • First Wave (privacy) – Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc. • Second Wave (property) – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc. • Third Wave (intellectual property) • Convention on Cybercrime – Ensuring that countries adopt procedural laws. – Harmonizing national cybercrime law.
  • 14. PROTECT YOUR SYSTEM • Use anti-virus software and firewalls - keep them up to date • Keep your operating system up to date with critical security updates and patches • Don't open emails or attachments from unknown sources • Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist • Back-up your computer data on disks or CDs often
  • 15. • Don't share access to your computers with strangers • If you have a wi-fi network, password protect it • Disconnect from the Internet when not in use • Reevaluate your security on a regular basis • Make sure your employees and family members know this info too!
  • 16. • Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months. THANKS ????