2. CONTENTS
โข What is cyber crime?
โข Who are cyber criminal?
โข What are cyber laws?
โข Cyber laws in the world.
โข How to prevent cyber crime?
3. Cyber Crime
Cybercrime is defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a tool to commit
an offense (child pornography, hate crimes). Cybercriminals may use
computer technology to access personal information, business trade
secrets or use the internet for exploitative or malicious purposes.
Cybercrime may also be referred to as computer crime.
Viruses, worms and industrial espionage, software piracy and hacking
are example where computers become the target of crime.
4. Categories and TYPES of Cyber Crime
โข The computer as a target:-using a
computer to attack other computers. E.g.
Hacking, Virus/Worm attacks etc.
โข The computer as a weapon:-using
computer to commit real world crimes.
E.g. Cyber terrorism, Credit card frauds
etc.
โข Hacking
โข Virus attack
โข Credit card
fraud
โข Phishing
โข Cyber defamation
โข Denial of service
attack
โข Software
piracy
โข Net
extortion
โข Spoofing
โข IRC crime
โข Blue bugging
5. CYBER CRIMINALS
โข Cybercriminals are individuals or teams of people who use
technology to commit malicious activities on digital systems or
networks with the intention of stealing sensitive company
information or personal data, and generating profit.
โข They can be anyone of us like teenage, organized hacktivists,
disgruntled employees, professional hackers, terrorists.
6. Cyber Law is an attempt to apply laws designed for the physical
world to human activity on internet. They can be summarise as the
legal issues related to the use of communication technology
particularly the โcyberspaceโ i.e. internet.
It is an intersection of many legal fields like privacy, intellectual
property etc.
The abuse of computer has also given birth to new age crimes that
are addressed by the INFORMATION TECHNOLOGY ACT,2000.
7.
8. Encrypt all data
Continuously update software.
Use ad blockers
Set and communicate email response policies
Update, distribute and get signatures on acceptable use agreements