Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
CYBER CRIME & CYBER        LAW                Presented by:-             himanshu munjal                   Viii sem,cs    ...
STRUCTURE•   Introduction•   Cyber crime•   Classification of cybercrime•   Cyber Law & Need•   Cyber law in US•   Global ...
WHAT DO YOU KNOW?
Crime & Cybercrime• Crime   – Engaging in conduct that has been outlawed by a particular     society• Cybercrime   – Diffe...
CYBER CRIME• Cybercrime is any illegal act committed using a computer network  (especially the Internet).• Criminal activi...
EXAMPLE OF CYBER CRIME
Classification OF CYBER CRIME• Cybercrime includes a wide variety of crime• Offences under cyber crime:   – Offences again...
TYPES OF CYBER CRIME  Viruses        Fraud  Worms          Theft  Trojans        Piracy  Mail bombs     Break-ins ...
CYBER LAW• Law governing cyber space• Cyber law encompasses laws relating to:   – Cyber Crimes   – Electronic and Digital ...
NEED OF CYBER LAWCybercriminals + computer technology = difficulties to apply the law.          not only real-world crimes...
CYBER LAW IN USA• Protect America Act of 2007• Key component “Electronic Surveillance”• USA Patriot ACT   – Hacking, crack...
• Advertising Law• E-Signatures• Electronic Contracts• Cryptography Laws• Electronic Evidence• Copyright Law• Domain Names...
National & International Efforts• First Wave (privacy)   – Sweden (1973) ; USA (1974); Federal Republic of German      (19...
PROTECT YOUR SYSTEM• Use anti-virus software and firewalls - keep them up to date• Keep your operating system up to date w...
• Dont share access to your computers with strangers• If you have a wi-fi network, password protect it• Disconnect from th...
• Treat your password like you treat your    toothbrush. Never give it to anyone    else to use, and change it every few  ...
Nächste SlideShare
Wird geladen in …5
×

cyber crime & cyber law

48.519 Aufrufe

Veröffentlicht am

  • Login to see the comments

cyber crime & cyber law

  1. 1. CYBER CRIME & CYBER LAW Presented by:- himanshu munjal Viii sem,cs Roll no.26
  2. 2. STRUCTURE• Introduction• Cyber crime• Classification of cybercrime• Cyber Law & Need• Cyber law in US• Global efforts
  3. 3. WHAT DO YOU KNOW?
  4. 4. Crime & Cybercrime• Crime – Engaging in conduct that has been outlawed by a particular society• Cybercrime – Differ in the tool: guns are change for computers Harm to: Individuals, property, government and morality
  5. 5. CYBER CRIME• Cybercrime is any illegal act committed using a computer network (especially the Internet).• Criminal activities that take place in cyberspace (the Internet).• Computer used to commit a crime – Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing• Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking
  6. 6. EXAMPLE OF CYBER CRIME
  7. 7. Classification OF CYBER CRIME• Cybercrime includes a wide variety of crime• Offences under cyber crime: – Offences against the confidentiality integrity and availability of computer data and systems – Content-related offences – Copyright-related offences
  8. 8. TYPES OF CYBER CRIME Viruses  Fraud Worms  Theft Trojans  Piracy Mail bombs  Break-ins Threats  Terrorism. Harassment DOS
  9. 9. CYBER LAW• Law governing cyber space• Cyber law encompasses laws relating to: – Cyber Crimes – Electronic and Digital Signatures – Intellectual Property – Data Protection and Privacy
  10. 10. NEED OF CYBER LAWCybercriminals + computer technology = difficulties to apply the law. not only real-world crimes by using computers…
  11. 11. CYBER LAW IN USA• Protect America Act of 2007• Key component “Electronic Surveillance”• USA Patriot ACT – Hacking, cracking, extortion, fraud and malware.
  12. 12. • Advertising Law• E-Signatures• Electronic Contracts• Cryptography Laws• Electronic Evidence• Copyright Law• Domain Names• Confidentiality
  13. 13. National & International Efforts• First Wave (privacy) – Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc.• Second Wave (property) – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.• Third Wave (intellectual property)• Convention on Cybercrime – Ensuring that countries adopt procedural laws. – Harmonizing national cybercrime law.
  14. 14. PROTECT YOUR SYSTEM• Use anti-virus software and firewalls - keep them up to date• Keep your operating system up to date with critical security updates and patches• Dont open emails or attachments from unknown sources• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist• Back-up your computer data on disks or CDs often
  15. 15. • Dont share access to your computers with strangers• If you have a wi-fi network, password protect it• Disconnect from the Internet when not in use• Reevaluate your security on a regular basis• Make sure your employees and family members know this info too!
  16. 16. • Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months. THANKS ????

×