SlideShare a Scribd company logo
1 of 1
Cyber laws
The concept idea of cyber terrorism has always been a great treat for computer
technology since the first computer was invented in the late fifties; and grown up with the
technology that has developed extremely. The use of the computers within the business
and government sector have rapidly increased; this therefore provides a whole new
prospect for a distinctive criminal to prosper in most cases. The advances in the computer
technology has brought a new methodology in crime. Electronic crime has been
responsible for some of the most financially devastating victimizations in society.

In the recent past, society has seen different kinds of unauthorized access into classified
government computer files, phone card and credit card, and electronic emails. All these
crimes are committed in the name of "free speech." These new breed of criminals claim
that information should not be suppressed or protected and the information should be
freed. They think that the crimes they commit are really not crimes at all. Noone can deny
that the internet is the most useful tool for computer abusing.

There are many forms of computer abuse and yet they have not come to any solution.
Computer crime appears in a number of forms; malicious damage, un

.                              .                            .
They find these crimes less violent or public. Many adults go on to the net and access
pornographic material that would be unsuitable for children. Anyone or person can find
child pornography on the internet with just a few clicks of the mouse using any search
engine. These crimes are all that have been started with someone who accessed to others
computer and start getting into other peoples computer files. This brings a need for a case
of ethics in the Internet realm. Another reason for computer crime not being reported is
when the crime is discovered companies demand tremendous sums of money. To prevent
children from these actions, the pornographic sites has set, user and password login
protection for accessing into them illegally.

There are people who accept pirated software, pornographic pictures, animations, and
texts, instead of buyin registered ones. The pornographer will then post the pictures on
their web site. These numbers are looked at by hackers and then used again, when the
hacker calls the number he is accessed with a logon prompt, this is where the hacking
really begins, the hacker tries to bypass this to gain access to the system.

The computer systems are under attack from a multitude of sources. Many children first
come in contact with the Internet at a very young age. If any unauthorised access
happens, that carries a penalty of six months imprisonment. According to this, sex
becomes more popular and is spreading to children at a younger age.

On the other hand, if we look at the ethics of the internet, in conditions of the terms of
cyber crimes, we can say that many racy, illegal, and controversial materials are available
on the Internet such as pornography and pirated software; on the other hand, many
educational tools are on-line as well.

Common topics in this essay:

More Related Content

What's hot (20)

Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)Cyber and ethics(cyber crime and many more topics)
Cyber and ethics(cyber crime and many more topics)
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cybercrime by Suphiyaan
Cybercrime by SuphiyaanCybercrime by Suphiyaan
Cybercrime by Suphiyaan
 
trial
trialtrial
trial
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Peace Powerpoint by Natasha, Kyle, Joey and Caitlin
Peace Powerpoint by Natasha, Kyle, Joey and CaitlinPeace Powerpoint by Natasha, Kyle, Joey and Caitlin
Peace Powerpoint by Natasha, Kyle, Joey and Caitlinsmuench
 
terrorism by aamish garg
terrorism by aamish gargterrorism by aamish garg
terrorism by aamish gargaamish garg
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 

Viewers also liked (6)

Peace Powerpoint by Natasha, Kyle, Joey and Caitlin
Peace Powerpoint by Natasha, Kyle, Joey and CaitlinPeace Powerpoint by Natasha, Kyle, Joey and Caitlin
Peace Powerpoint by Natasha, Kyle, Joey and Caitlin
 
Ipw slides
Ipw slidesIpw slides
Ipw slides
 
Terrorism
TerrorismTerrorism
Terrorism
 
terrorism by aamish garg
terrorism by aamish gargterrorism by aamish garg
terrorism by aamish garg
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

Similar to Cyber laws (13)

Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from WAQAR AHMED

Disney mission statement
Disney mission statementDisney mission statement
Disney mission statementWAQAR AHMED
 
Dhl mission statement
Dhl mission statementDhl mission statement
Dhl mission statementWAQAR AHMED
 
Dell mission statement
Dell mission statementDell mission statement
Dell mission statementWAQAR AHMED
 
Coca cola mission statement
Coca cola mission statementCoca cola mission statement
Coca cola mission statementWAQAR AHMED
 
Burger king mission statement
Burger king mission statementBurger king mission statement
Burger king mission statementWAQAR AHMED
 
Amazon mission statement
Amazon mission statementAmazon mission statement
Amazon mission statementWAQAR AHMED
 
Google mission statement
Google mission statementGoogle mission statement
Google mission statementWAQAR AHMED
 
Ibm mission statement
Ibm mission statementIbm mission statement
Ibm mission statementWAQAR AHMED
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulationsWAQAR AHMED
 
Childrens magazines
Childrens magazinesChildrens magazines
Childrens magazinesWAQAR AHMED
 
13thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp0213thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp02WAQAR AHMED
 

More from WAQAR AHMED (20)

Disney mission statement
Disney mission statementDisney mission statement
Disney mission statement
 
Dhl mission statement
Dhl mission statementDhl mission statement
Dhl mission statement
 
Denny
DennyDenny
Denny
 
Dell mission statement
Dell mission statementDell mission statement
Dell mission statement
 
Coca cola mission statement
Coca cola mission statementCoca cola mission statement
Coca cola mission statement
 
Burger king mission statement
Burger king mission statementBurger king mission statement
Burger king mission statement
 
Amazon mission statement
Amazon mission statementAmazon mission statement
Amazon mission statement
 
Google mission statement
Google mission statementGoogle mission statement
Google mission statement
 
Ibm mission statement
Ibm mission statementIbm mission statement
Ibm mission statement
 
Cyber crime and regulations
Cyber crime and regulationsCyber crime and regulations
Cyber crime and regulations
 
Communications
CommunicationsCommunications
Communications
 
Childrens magazines
Childrens magazinesChildrens magazines
Childrens magazines
 
13thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp0213thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp02
 
Ali
AliAli
Ali
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch19
Ch19Ch19
Ch19
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch15
Ch15Ch15
Ch15
 

Cyber laws

  • 1. Cyber laws The concept idea of cyber terrorism has always been a great treat for computer technology since the first computer was invented in the late fifties; and grown up with the technology that has developed extremely. The use of the computers within the business and government sector have rapidly increased; this therefore provides a whole new prospect for a distinctive criminal to prosper in most cases. The advances in the computer technology has brought a new methodology in crime. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen different kinds of unauthorized access into classified government computer files, phone card and credit card, and electronic emails. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and the information should be freed. They think that the crimes they commit are really not crimes at all. Noone can deny that the internet is the most useful tool for computer abusing. There are many forms of computer abuse and yet they have not come to any solution. Computer crime appears in a number of forms; malicious damage, un . . . They find these crimes less violent or public. Many adults go on to the net and access pornographic material that would be unsuitable for children. Anyone or person can find child pornography on the internet with just a few clicks of the mouse using any search engine. These crimes are all that have been started with someone who accessed to others computer and start getting into other peoples computer files. This brings a need for a case of ethics in the Internet realm. Another reason for computer crime not being reported is when the crime is discovered companies demand tremendous sums of money. To prevent children from these actions, the pornographic sites has set, user and password login protection for accessing into them illegally. There are people who accept pirated software, pornographic pictures, animations, and texts, instead of buyin registered ones. The pornographer will then post the pictures on their web site. These numbers are looked at by hackers and then used again, when the hacker calls the number he is accessed with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this to gain access to the system. The computer systems are under attack from a multitude of sources. Many children first come in contact with the Internet at a very young age. If any unauthorised access happens, that carries a penalty of six months imprisonment. According to this, sex becomes more popular and is spreading to children at a younger age. On the other hand, if we look at the ethics of the internet, in conditions of the terms of cyber crimes, we can say that many racy, illegal, and controversial materials are available on the Internet such as pornography and pirated software; on the other hand, many educational tools are on-line as well. Common topics in this essay: