Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

cyber crime & cyber law

48.568 visualizaciones

Publicado el

  • Inicia sesión para ver los comentarios

cyber crime & cyber law

  1. 1. CYBER CRIME & CYBER LAW Presented by:- himanshu munjal Viii sem,cs Roll no.26
  2. 2. STRUCTURE• Introduction• Cyber crime• Classification of cybercrime• Cyber Law & Need• Cyber law in US• Global efforts
  4. 4. Crime & Cybercrime• Crime – Engaging in conduct that has been outlawed by a particular society• Cybercrime – Differ in the tool: guns are change for computers Harm to: Individuals, property, government and morality
  5. 5. CYBER CRIME• Cybercrime is any illegal act committed using a computer network (especially the Internet).• Criminal activities that take place in cyberspace (the Internet).• Computer used to commit a crime – Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing• Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking
  7. 7. Classification OF CYBER CRIME• Cybercrime includes a wide variety of crime• Offences under cyber crime: – Offences against the confidentiality integrity and availability of computer data and systems – Content-related offences – Copyright-related offences
  8. 8. TYPES OF CYBER CRIME Viruses  Fraud Worms  Theft Trojans  Piracy Mail bombs  Break-ins Threats  Terrorism. Harassment DOS
  9. 9. CYBER LAW• Law governing cyber space• Cyber law encompasses laws relating to: – Cyber Crimes – Electronic and Digital Signatures – Intellectual Property – Data Protection and Privacy
  10. 10. NEED OF CYBER LAWCybercriminals + computer technology = difficulties to apply the law. not only real-world crimes by using computers…
  11. 11. CYBER LAW IN USA• Protect America Act of 2007• Key component “Electronic Surveillance”• USA Patriot ACT – Hacking, cracking, extortion, fraud and malware.
  12. 12. • Advertising Law• E-Signatures• Electronic Contracts• Cryptography Laws• Electronic Evidence• Copyright Law• Domain Names• Confidentiality
  13. 13. National & International Efforts• First Wave (privacy) – Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc.• Second Wave (property) – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.• Third Wave (intellectual property)• Convention on Cybercrime – Ensuring that countries adopt procedural laws. – Harmonizing national cybercrime law.
  14. 14. PROTECT YOUR SYSTEM• Use anti-virus software and firewalls - keep them up to date• Keep your operating system up to date with critical security updates and patches• Dont open emails or attachments from unknown sources• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist• Back-up your computer data on disks or CDs often
  15. 15. • Dont share access to your computers with strangers• If you have a wi-fi network, password protect it• Disconnect from the Internet when not in use• Reevaluate your security on a regular basis• Make sure your employees and family members know this info too!
  16. 16. • Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months. THANKS ????