SlideShare ist ein Scribd-Unternehmen logo
1 von 47
presentation
topic : cyber crimes
and
security
By ashwini awatare
Contents :-
• Introduction to cyber crimes
• History of cyber crimes
• Categories of cyber crimes
• Types
• Impact of cyber crimes
• Cyber security
• Cyber laws
• Prevention
• Conclusion
Introduction :-
The internet in India is growing rapidly. It has given
rise to new opportunities in every field we
can think of— be it entertainment, business, sports
or education.
There are two sides to a coin. Internet also has its
own disadvantages. One of the major
disadvantages is Cyber crime — illegal activity
committed on the internet.
What is cyber crime ?
• Using the Internet to commit a crime.
▫ Identity Theft
▫ Hacking
▫ Viruses
• Facilitation of traditional criminal activity
▫ Stalking
▫ Stealing information
▫ Child Pornography
Cyber Crimes :-
• Defining Cyber Crime :->
• It’s an unlawful act wherein the computer is either a
tool or a target or both.
• Cyber space is a virtual space that has become as
important as real space for business, politics, and
communities
History of Cyber Crime
• The first recorded cyber crime took place in the year
1820
• In 1820, Joseph-Marie Jacquard, a textile manufacturer
in France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard’s
- employees that their traditional employment and
livelihood were being threatened. They committed acts
of
sabotage to discourage Jacquard from further use of the
new technology. This is the first recorded cyber crime!
History of cyber crimes :-
 The first recorded cyber crime took place in
1820.
 That is not surprising considenng the fact that
the abacus, which is thought to be the earliest
from of a computer, has been around since 3500
B.c.
 In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
 The first spam email took place in 1976 when it
was sent out over the AR PANT.
 The first virus was installed on an Apple
computer in 1982 when a high school student,
Rich skrenta, developed the ElK Cloner.
Incident due to cyber crimes
Cybercrime Components
• Computers
• Cell Phones
• PDA’s
• Game Consoles
CATEGORIES OF CYBER
CRIME:
We can categorize cyber crime in two ways.
 The computer as a target :- using a computer to attacks
other computer, e.g. Hacking, virus/worms attacks, Dos
attack etc.
 The computer as a weapon :- using a
computer to commit real world crime e.g. cyber
terrorism, credit card fraud and
pornography etc.
CATEGORIES OF CYBER
CRIME:
Cyber crimes can be basically divided into 3
major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
FIRST CATEGORY
Cyber crimes against persons
Cyber harassment is a distinct Cyber crime.
Various kinds of harassment can and do occur in
cyberspace, or through the use of cyberspace.
Harassment can be sexual, racial, religious, or
other.
SECOND CATEGORY
Cyber crimes against property
These crimes include computer vandalism .
(Destruction of others’ property), Transmission
of harmful programs, Unauthorized trespassing
through cyber space, Unauthorized possession of
computer information.
THIRD CATEGORY
Cyber crimes against government
 Cyber terrorism is one distinct kind of crime in this
category.
 The growth of Internet has shown that the medium of
Cyberspace is being used by
individuals and groups to threaten the
international governments as also to terrorize the
citizens of a country.
Types Of Cyber Crime
Modification of a conventional crime by using
computers.
Frequently Used Cyber Crimes.
Modification of a
conventional
crime by using computers.
• Financial crimes
• Cyber pornography
• Sale of illegal articles
• Online gambling
• Intellectual Property crime
• Email spoofing
• Forgery
• Cyber Defamation
• Cyber stalking
Frequently Used Cyber
Crimes.
• Unauthorized access to computer systems or networks
• Theft of information contained in electronic form
• Email bombing
• Data diddling
• Salami attacks
• Denial of Service attack
• Virus / worm attacks
• Logic bombs
• Internet time thefts
• Web jacking
• Theft of computer system
• Physically damaging a computer system
Cyber Criminals
• Kids (age group 9-16 etc.)
• Organized hacktivists
• Disgruntled employees
• Professional hackers (corporate espionage)
Computer Security
Confidentiality
Only those authorized to view information.
Integrity
Information is correct and hasn’t been altered by
unauthorized users or software.
Availability
Data is accessible to authorized users.
Computer Security
Computer Security - Threats
 Malware
Software that has a malicious purpose
 Viruses
 Trojan horse
 Spyware
Computer Security - Threats
 Intrusions
▫ Any attempt to gain unauthorized access to a
system
▫ Cracking
▫ Hacking
▫ Social Engineering
▫ War-driving
Computer Security - Threats
Computer Security -
Terminology
People
▫ Hackers
 White Hat – Good guys. Report
hacks/vulnerabilities to appropriate people.
 Black Hat – Only interested in personal goals,
regardless of impact.
 Gray Hat – Somewhere in between.
Computer Security -
Terminology
Script Kiddies
▫ Someone that calls themselves a ‘hacker’ but really
isn’t.
Ethical Hacker
▫ Someone hired to hack a system to find
vulnerabilities and report on them.
▫ Also called a ‘sneaker’ .
Computer Security -
Terminology
Security Devices
▫ Firewall
 Barrier between network and the outside world.
▫ Proxy server
 Sits between users and server. Two main functions
are to improve performance and filter requests.
▫ Intrusion Detection Systems (IDS)
 Monitors network traffic for suspicious activity.
Cyber Laws :-
• Law governing cyber space
• Cyber law encompasses laws relating to:
— Cyber Crimes
Electronic and Digital Signatures
— Intellectual Property
— Data Protection and Privacy
• Cyber crime: it refers to criminal
exploitation of the internet
• Electronic and Digital signatures : it refers to
mathematical scheme for demonstrating the
authenticity of digital message or documents
Intellectual property: it refers to legal concept
which refers to creations of the mind for which
exclusive rights are recognized.
Data protection and privacy: it refers to effective
legislation helps minimize monitoring by
governments , regulate surveillance by information
is properly protected.
NEED OF
CYBER LAW
Cybercriminals ÷
computer technology =
difficulties to apply the
law.
Not only real-world
crimes by using
computers..
PREVENTION
 Disable and log off a specific user account to
prevent access.
Disable and log off a group of user accounts which
access a particular service that is being attacked.
Disable and dismount specific (network) devices, for
instance disk devices that are being swamped.
 Disable specific applications, for example, an
e-mail system subjected to a SPAM attack.
 Close down an entire system, and divert
processing to an alternative or backup service on
a secondary network.
conclusion
• Within the law enforcement agencies, a set of rules
must be developed to address the various categories
of computer crime.
• As such, investigators will know what and which
materials to search and seize, the
electronic evidence to recover, and the chain of
custody to maintain.
Cyber crimes and its security

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Ppt
PptPpt
Ppt
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 

Andere mochten auch

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...Codemotion
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crimeangbeelee
 
How biotechnology could improve life
How biotechnology could improve lifeHow biotechnology could improve life
How biotechnology could improve lifeCokhy Fasha
 
Neurosains dan moralitas
Neurosains dan moralitasNeurosains dan moralitas
Neurosains dan moralitasCokhy Fasha
 
Cybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies OffshoreCybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies Offshorebakerpartners
 
WooCommerce Meetup Utrecht
WooCommerce Meetup UtrechtWooCommerce Meetup Utrecht
WooCommerce Meetup UtrechtTheo van der Zee
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-Baljit Saini
 
The Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables ExpertThe Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables ExpertJoão Bocas
 
Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsYulian Slobodyan
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Shadow Economy
Shadow EconomyShadow Economy
Shadow EconomyKsyunya
 

Andere mochten auch (20)

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
Rendere sicure le esperienze dell'individuo nel mondo digitale allargato - Pi...
 
Cybersec
CybersecCybersec
Cybersec
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
How biotechnology could improve life
How biotechnology could improve lifeHow biotechnology could improve life
How biotechnology could improve life
 
Neurosains dan moralitas
Neurosains dan moralitasNeurosains dan moralitas
Neurosains dan moralitas
 
Cybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies OffshoreCybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies Offshore
 
WooCommerce Meetup Utrecht
WooCommerce Meetup UtrechtWooCommerce Meetup Utrecht
WooCommerce Meetup Utrecht
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-
 
The Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables ExpertThe Future of Wearables at WoHIT 2016 by The Wearables Expert
The Future of Wearables at WoHIT 2016 by The Wearables Expert
 
Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography Basics
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
it act
it actit act
it act
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Shadow Economy
Shadow EconomyShadow Economy
Shadow Economy
 

Ähnlich wie Cyber crimes and its security

Ähnlich wie Cyber crimes and its security (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 

Mehr von Ashwini Awatare

Integrated website using social plugins
Integrated website using social pluginsIntegrated website using social plugins
Integrated website using social pluginsAshwini Awatare
 
Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithmAshwini Awatare
 
Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm Ashwini Awatare
 
Dma and dma controller 8237
Dma and dma controller 8237Dma and dma controller 8237
Dma and dma controller 8237Ashwini Awatare
 
Image proccessing and its application
Image proccessing and its applicationImage proccessing and its application
Image proccessing and its applicationAshwini Awatare
 
Image proccessing and its applications.
Image proccessing and its applications.Image proccessing and its applications.
Image proccessing and its applications.Ashwini Awatare
 
Programming language design and implemenation
Programming language design and implemenationProgramming language design and implemenation
Programming language design and implemenationAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Event oriented programming
Event oriented programmingEvent oriented programming
Event oriented programmingAshwini Awatare
 

Mehr von Ashwini Awatare (10)

Integrated website using social plugins
Integrated website using social pluginsIntegrated website using social plugins
Integrated website using social plugins
 
Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithm
 
Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm
 
Dma and dma controller 8237
Dma and dma controller 8237Dma and dma controller 8237
Dma and dma controller 8237
 
Incredible india
Incredible indiaIncredible india
Incredible india
 
Image proccessing and its application
Image proccessing and its applicationImage proccessing and its application
Image proccessing and its application
 
Image proccessing and its applications.
Image proccessing and its applications.Image proccessing and its applications.
Image proccessing and its applications.
 
Programming language design and implemenation
Programming language design and implemenationProgramming language design and implemenation
Programming language design and implemenation
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Event oriented programming
Event oriented programmingEvent oriented programming
Event oriented programming
 

Cyber crimes and its security

  • 1. presentation topic : cyber crimes and security By ashwini awatare
  • 2.
  • 3. Contents :- • Introduction to cyber crimes • History of cyber crimes • Categories of cyber crimes • Types • Impact of cyber crimes • Cyber security • Cyber laws • Prevention • Conclusion
  • 4. Introduction :- The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet.
  • 5. What is cyber crime ? • Using the Internet to commit a crime. ▫ Identity Theft ▫ Hacking ▫ Viruses • Facilitation of traditional criminal activity ▫ Stalking ▫ Stealing information ▫ Child Pornography
  • 6. Cyber Crimes :- • Defining Cyber Crime :-> • It’s an unlawful act wherein the computer is either a tool or a target or both. • Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 7.
  • 8. History of Cyber Crime • The first recorded cyber crime took place in the year 1820 • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s - employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 9. History of cyber crimes :-  The first recorded cyber crime took place in 1820.  That is not surprising considenng the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.  In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.
  • 10.  The first spam email took place in 1976 when it was sent out over the AR PANT.  The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the ElK Cloner.
  • 11. Incident due to cyber crimes
  • 12. Cybercrime Components • Computers • Cell Phones • PDA’s • Game Consoles
  • 13. CATEGORIES OF CYBER CRIME: We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  • 14. CATEGORIES OF CYBER CRIME: Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  • 15. FIRST CATEGORY Cyber crimes against persons Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
  • 16. SECOND CATEGORY Cyber crimes against property These crimes include computer vandalism . (Destruction of others’ property), Transmission of harmful programs, Unauthorized trespassing through cyber space, Unauthorized possession of computer information.
  • 17. THIRD CATEGORY Cyber crimes against government  Cyber terrorism is one distinct kind of crime in this category.  The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes.
  • 24. Modification of a conventional crime by using computers. • Financial crimes • Cyber pornography • Sale of illegal articles • Online gambling
  • 25. • Intellectual Property crime • Email spoofing • Forgery • Cyber Defamation • Cyber stalking
  • 26. Frequently Used Cyber Crimes. • Unauthorized access to computer systems or networks • Theft of information contained in electronic form • Email bombing • Data diddling • Salami attacks • Denial of Service attack
  • 27. • Virus / worm attacks • Logic bombs • Internet time thefts • Web jacking • Theft of computer system • Physically damaging a computer system
  • 28. Cyber Criminals • Kids (age group 9-16 etc.) • Organized hacktivists • Disgruntled employees • Professional hackers (corporate espionage)
  • 29.
  • 30. Computer Security Confidentiality Only those authorized to view information. Integrity Information is correct and hasn’t been altered by unauthorized users or software. Availability Data is accessible to authorized users.
  • 32. Computer Security - Threats  Malware Software that has a malicious purpose  Viruses  Trojan horse  Spyware
  • 33.
  • 34. Computer Security - Threats  Intrusions ▫ Any attempt to gain unauthorized access to a system ▫ Cracking ▫ Hacking ▫ Social Engineering ▫ War-driving
  • 36. Computer Security - Terminology People ▫ Hackers  White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.  Black Hat – Only interested in personal goals, regardless of impact.  Gray Hat – Somewhere in between.
  • 37. Computer Security - Terminology Script Kiddies ▫ Someone that calls themselves a ‘hacker’ but really isn’t. Ethical Hacker ▫ Someone hired to hack a system to find vulnerabilities and report on them. ▫ Also called a ‘sneaker’ .
  • 38. Computer Security - Terminology Security Devices ▫ Firewall  Barrier between network and the outside world. ▫ Proxy server  Sits between users and server. Two main functions are to improve performance and filter requests. ▫ Intrusion Detection Systems (IDS)  Monitors network traffic for suspicious activity.
  • 39.
  • 40. Cyber Laws :- • Law governing cyber space • Cyber law encompasses laws relating to: — Cyber Crimes Electronic and Digital Signatures — Intellectual Property — Data Protection and Privacy
  • 41. • Cyber crime: it refers to criminal exploitation of the internet • Electronic and Digital signatures : it refers to mathematical scheme for demonstrating the authenticity of digital message or documents
  • 42. Intellectual property: it refers to legal concept which refers to creations of the mind for which exclusive rights are recognized. Data protection and privacy: it refers to effective legislation helps minimize monitoring by governments , regulate surveillance by information is properly protected.
  • 43. NEED OF CYBER LAW Cybercriminals ÷ computer technology = difficulties to apply the law. Not only real-world crimes by using computers..
  • 44. PREVENTION  Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
  • 45.  Disable specific applications, for example, an e-mail system subjected to a SPAM attack.  Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
  • 46. conclusion • Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. • As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.