Sei sulla pagina 1di 16

CYBER CRIME & CYBER

LAW

Presented by:-
himanshu munjal
Viii sem,cs
Roll no.26
STRUCTURE
• Introduction
• Cyber crime
• Classification of cybercrime
• Cyber Law & Need
• Cyber law in US
• Global efforts
WHAT DO YOU KNOW?
Crime & Cybercrime
• Crime
– Engaging in conduct that has been outlawed by a particular
society

• Cybercrime
– Differ in the tool: guns are change for computers

Harm to: Individuals, property, government and


morality
CYBER CRIME

• Cybercrime is any illegal act committed using a computer network


(especially the Internet).

• Criminal activities that take place in cyberspace (the Internet).

• Computer used to commit a crime


– Child porn, threatening email, assuming someone’s identity, sexual
harassment, defamation, spam, phishing

• Computer as a target of a crime


– Viruses, worms, industrial espionage, software piracy, hacking
EXAMPLE OF CYBER CRIME
Classification OF CYBER CRIME
• Cybercrime includes a wide variety of crime

• Offences under cyber crime:

– Offences against the confidentiality integrity and availability of


computer data and systems

– Content-related offences

– Copyright-related offences
TYPES OF CYBER CRIME

Viruses  Fraud
Worms  Theft
Trojans  Piracy
Mail bombs  Break-ins
Threats  Terrorism.
Harassment
DOS
CYBER LAW
• Law governing cyber space

• Cyber law encompasses laws relating to:

– Cyber Crimes

– Electronic and Digital Signatures

– Intellectual Property

– Data Protection and Privacy


NEED OF CYBER LAW

Cybercriminals + computer technology = difficulties to apply the law.

not only real-world crimes by using computers…


CYBER LAW IN USA
• Protect America Act of 2007

• Key component “Electronic Surveillance”

• USA Patriot ACT


– Hacking, cracking, extortion, fraud and malware.
• Advertising Law

• E-Signatures

• Electronic Contracts

• Cryptography Laws

• Electronic Evidence

• Copyright Law

• Domain Names

• Confidentiality
National & International Efforts
• First Wave (privacy)
– Sweden (1973) ; USA (1974); Federal Republic of German
(1977); Austria, Denmark, France and Norway (1978), etc.
• Second Wave (property)
– Italy (1978); UK (1981,1990); USA (1980s); Canada and
Denmark (1985), etc.
• Third Wave (intellectual property)
• Convention on Cybercrime
– Ensuring that countries adopt procedural laws.
– Harmonizing national cybercrime law.
PROTECT YOUR SYSTEM
• Use anti-virus software and firewalls - keep them up to date

• Keep your operating system up to date with critical security updates


and patches

• Don't open emails or attachments from unknown sources

• Use hard-to-guess passwords. Don’t use words found in a dictionary.


Remember that password cracking tools exist

• Back-up your computer data on disks or CDs often


• Don't share access to your computers with strangers

• If you have a wi-fi network, password protect it

• Disconnect from the Internet when not in use

• Reevaluate your security on a regular basis

• Make sure your employees and family members know this info too!
• Treat your password like you treat your
toothbrush. Never give it to anyone
else to use, and change it every few
months.

THANKS
????

Potrebbero piacerti anche