SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Mukesh N Tekwani mukeshtekwani@outlook.com
2
What is Cyber Law?
1. Cyber law – all legal and regulatory aspects of the
Internet.
2. Cyber space - governed by a system of laws and
regulations called cyber law.
3. Why is cyber law needed? Millions of people around the
world use Internet for business, banking, social
interactions, and Internet is misused for criminal
activities. Hence the need for laws
3
Cyber Security Law – What you can do
1. In case you become a victim of cyber crime, what can you do?
2. Preserve the relevant incriminating electronic evidence.
3. Legal liability can be:
a) Civil liability
b) Criminal liability
4. Even if you are the victim, you still have a legal liability. The law
expects you to have the duty of due diligence.
5. If you are the victim, you must report the breach to the relevant
statutory authorities
6. Example – getting email from a bank with a bank statement/invoice
meant for someone else
4
Cyber Security Law – Challenges
1. The person committing cybercrime may not be located in your
country and so legal remedies could be difficult.
2. Anyone sitting in one country could target the network of a
company or a govt in another country.
3. There is no international legal law for such matters. So jurisdiction is
going to pay a very important role in tackling cybercrime.
5
International Cyber Law
1. There are no international cyber laws.
2. Every country has its own cyber laws – only for its citizens.
3. What happens if a cyber crime is committed on country X from
country Y ?
4. Some countries have come up with bilateral agreements with other
countries – but no international laws in place
5. July 2015 – Germany came up with cyber laws – laws to protect
critical infrastructure only. Equipment, plants that are important for
running the country.
6. June 2017 – China’s cyber security law – very broad – personal
information also covered
6
What should companies do?
1. Inform customers of the breach
2. Tell customers what to do in this case
3. Examples –
1. Yahoo password leaks.
2. British Airways credit card and other info leak
7
Copyright
1. Copyright is an intellectual property right attached to
original works – e.g., books, movies, music, logo,

2. Copyright is a protection provided by law to authors of
original works. This includes literature, films, music,
paintings, etc
3. Copyright laws apply to published and unpublished
work.
4. Copyright law helps to determine authorship, duration
of protection and laws for transfering rights to others
8
Security
1. Security is an organisational concern.
2. Every business needs safeguards that protect computer
systems and data from damage or unlawful use.
3. Protect systems from hackers
4. Protect data from unlawful use.
9
Controls
1. What are controls? These are policies, procedures,
rules, techniques designed to prevent errors in data and
systems.
2. Examples are :
a. access privileges – who, what, when
b. Data validation – numeric data for DOB, no numeric
for name, etc
c. Input authorizations, view rights, edit rights
10
Privacy
1. Security is an organisational concern
2. Privacy is an individual concern.
3. People need assurance that their personal information
such as employment, financial records, medical records,
employment history will not be misused.
4. You must ensure that you don’t reveal your personal /
private information to others.
5. Info such as – bank details, date of birth, medical
history, employment records, educational records
..
11
Software Piracy
1. It is the unauthorized copying and distribution of
copyrighted software
2. How is it done ? – Downloading, copying, sharing, selling
copies of original software
3. Software license – how many copies can be installed. If
you install more than the specified number of copies, it is
piracy
4. Sharing login credentials used to access a web-based
software application – e.g. one person pays for an online
service and many use that service by sharing password.
12
Code of Ethics
1. Ethics => Ethics is a branch of philosophy. Ethics defines
what is good and bad, what is right and wrong, obligations.
2. All software professionals (programmers, systems admins,
)
have the responsibility to provide certain quality or work
and assure control, privacy and security in their services and
products.
3. What does a code of ethics do? It gives these norms and
principles. Code of ethics sets standards.
4. Code of ethics sets commitments, requirements and
responsibilities for members of an organization.
13
Code of Ethics for Computer Professionals
1. Fair Treatment – treat everyone fairly. No discrimination on
grounds of age, gender, post, etc
2. Access private info only when it is extremely necessary for
your official duties, after taking permissions from concerned
authorities.
3. Don’t use confidential information for your personal gain.
14
Code of Ethics for Computer Professionals
4. Maintain the privacy of users and professionals.
5. Maintain good communication with users – inform users of
which resources can be shared, legal obligations, etc.
6. Maintain good system integrity – regularly perform
maintenance of hardware and software, check network and
Internet availability. Analyze system performance
(download speeds, bootup times for computers, etc)
7. Prevent unauthorized access to systems and resources
(applications, printers, data, 
)
15
Code of Ethics for Computer Professionals
8. Maintain healthy cooperation. ‘We’, not ‘I’.
9. Support your colleagues – cooperate with other colleagues.
Learn from them if you don’t know something. Train them
if they need help in learning
10. Acknowledge the responsibility of the team – the
community.
11. Be honest – honesty is the best policy. Take help of seniors
if it is necessary, to perform your duties efficiently.
12. Update yourself with latest technology, software, systems
practices. If necessary, go for training, self-study.
16
Code of Ethics for Computer Professionals
13. Update yourself on social ad legal issues relating to
computing. Share with others whatever new you have
learnt. Encourage others to adopt changes in policies – this
is social responsibility
14. If you make mistakes, admit them and correct them. Don’t
try to blame others for your mistakes. Maintain
professionalism while performing your duties.
15. Remove any wrong data about individuals.
17
Do’s for Computer Professionals
1. Use the Internet to enhance your knowledge. Take courses
from sites such as Udacity, Udemy, Coursera, MIT, etc
2. When communicating with strangers, don’t share your
personal data. Personal data = family, financial, job, health
3. Respect privacy of others
4. Avoid political discussions with strangers
5. Use antivirus software to protect your computer systems
6. Download software from reliable sites only
18
Don’ts for Computer Professionals
1. Don’t share your passwords and usernames with others
2. Don’t arrange to meet unknown persons whom you met on
Internet
3. Don’t use unauthorized or pirated software
4. Don’t break / hack into computers. It’s a crime.
5. Don’t answer any improper messages
6. Don’t fall prey to lottery, cashback, loan schemes.
7. Don’t fall into traps of friendship from strangers.
19
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
20
Cyber Insurance
1. A cyber insurance policy protects you from cyber breaches.
2. All gadgets are covered under these policies – laptops,
computers, mobile phones, ..
3. Some companies that offer Cyber Security Insurance are:
HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber
Safe Insurance Policy)
21
Cyber Insurance
Cyber Insurance covers the following:
i. A financial loss resulting from being a victim of email spoofing and
phishing
ii. Fraudulent online transactions in bank account, debit/credit card or e-
wallet
iii. Reputational liability, including claims alleging defamation and invasion of
privacy
iv. Losses and expenses related to defence and prosecution cost related to
identity theft
v. Restoration cost to retrieve data or computer program damaged by entry
of the malware
vi. Cyber extortion loss
THANK YOU
Prof Mukesh N Tekwani
mukeshtekwani@outlook.com
November 9, 2019

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismShivam Lohiya
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIMEKunal Sinha
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 

Was ist angesagt? (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Ähnlich wie Cyber Laws

Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethicsMelvin DCruz
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 

Ähnlich wie Cyber Laws (20)

Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
E commerce
E commerce E commerce
E commerce
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 

Mehr von Mukesh Tekwani

ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - PhysicsMukesh Tekwani
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion Mukesh Tekwani
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Mukesh Tekwani
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversionMukesh Tekwani
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion Mukesh Tekwani
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code? Mukesh Tekwani
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversionMukesh Tekwani
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Mukesh Tekwani
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prismMukesh Tekwani
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surfaceMukesh Tekwani
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrorsMukesh Tekwani
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomMukesh Tekwani
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesMukesh Tekwani
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEMukesh Tekwani
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019Mukesh Tekwani
 

Mehr von Mukesh Tekwani (20)

Circular motion
Circular motionCircular motion
Circular motion
 
Gravitation
GravitationGravitation
Gravitation
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - Physics
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversion
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversion
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prism
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surface
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrors
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atom
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lenses
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
 
XML
XMLXML
XML
 
Social media
Social mediaSocial media
Social media
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019OSI Model of Networking-09-Nov-2019
OSI Model of Networking-09-Nov-2019
 

KĂŒrzlich hochgeladen

ćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠ
ćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠ
ćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠzdzoqco
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€Fs
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€Fs
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
ă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠ
ă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠ
ă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠrnrncn29
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 

KĂŒrzlich hochgeladen (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
ćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠ
ćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠ
ćŠžç†ć€šäŒŠć€šć€§ć­ŠæŻ•äžšèŻæˆç»©ć•|莭äč°ćŠ æ‹żć€§UTSGæ–‡ć‡­èŻäčŠ
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(ManagementæŻ•äžšèŻäčŠ)æ–°ćŠ ćĄçźĄç†ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
ćźšćˆ¶(AUTæŻ•äžšèŻäčŠ)æ–°è„żć…°ć„„ć…‹ć…°ç†ć·„ć€§ć­ŠæŻ•äžšèŻæˆç»©ć•ćŽŸç‰ˆäž€æŻ”äž€
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
ă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠ
ă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠ
ă€ŽæŸłæŽČæ–‡ć‡­ă€äč°è©č槆棫ćș“ć…‹ć€§ć­ŠæŻ•äžšèŻäčŠæˆç»©ć•ćŠžç†æŸłæŽČJCUæ–‡ć‡­ć­ŠäœèŻäčŠ
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 

Cyber Laws

  • 1. Mukesh N Tekwani mukeshtekwani@outlook.com
  • 2. 2 What is Cyber Law? 1. Cyber law – all legal and regulatory aspects of the Internet. 2. Cyber space - governed by a system of laws and regulations called cyber law. 3. Why is cyber law needed? Millions of people around the world use Internet for business, banking, social interactions, and Internet is misused for criminal activities. Hence the need for laws
  • 3. 3 Cyber Security Law – What you can do 1. In case you become a victim of cyber crime, what can you do? 2. Preserve the relevant incriminating electronic evidence. 3. Legal liability can be: a) Civil liability b) Criminal liability 4. Even if you are the victim, you still have a legal liability. The law expects you to have the duty of due diligence. 5. If you are the victim, you must report the breach to the relevant statutory authorities 6. Example – getting email from a bank with a bank statement/invoice meant for someone else
  • 4. 4 Cyber Security Law – Challenges 1. The person committing cybercrime may not be located in your country and so legal remedies could be difficult. 2. Anyone sitting in one country could target the network of a company or a govt in another country. 3. There is no international legal law for such matters. So jurisdiction is going to pay a very important role in tackling cybercrime.
  • 5. 5 International Cyber Law 1. There are no international cyber laws. 2. Every country has its own cyber laws – only for its citizens. 3. What happens if a cyber crime is committed on country X from country Y ? 4. Some countries have come up with bilateral agreements with other countries – but no international laws in place 5. July 2015 – Germany came up with cyber laws – laws to protect critical infrastructure only. Equipment, plants that are important for running the country. 6. June 2017 – China’s cyber security law – very broad – personal information also covered
  • 6. 6 What should companies do? 1. Inform customers of the breach 2. Tell customers what to do in this case 3. Examples – 1. Yahoo password leaks. 2. British Airways credit card and other info leak
  • 7. 7 Copyright 1. Copyright is an intellectual property right attached to original works – e.g., books, movies, music, logo,
 2. Copyright is a protection provided by law to authors of original works. This includes literature, films, music, paintings, etc 3. Copyright laws apply to published and unpublished work. 4. Copyright law helps to determine authorship, duration of protection and laws for transfering rights to others
  • 8. 8 Security 1. Security is an organisational concern. 2. Every business needs safeguards that protect computer systems and data from damage or unlawful use. 3. Protect systems from hackers 4. Protect data from unlawful use.
  • 9. 9 Controls 1. What are controls? These are policies, procedures, rules, techniques designed to prevent errors in data and systems. 2. Examples are : a. access privileges – who, what, when b. Data validation – numeric data for DOB, no numeric for name, etc c. Input authorizations, view rights, edit rights
  • 10. 10 Privacy 1. Security is an organisational concern 2. Privacy is an individual concern. 3. People need assurance that their personal information such as employment, financial records, medical records, employment history will not be misused. 4. You must ensure that you don’t reveal your personal / private information to others. 5. Info such as – bank details, date of birth, medical history, employment records, educational records
..
  • 11. 11 Software Piracy 1. It is the unauthorized copying and distribution of copyrighted software 2. How is it done ? – Downloading, copying, sharing, selling copies of original software 3. Software license – how many copies can be installed. If you install more than the specified number of copies, it is piracy 4. Sharing login credentials used to access a web-based software application – e.g. one person pays for an online service and many use that service by sharing password.
  • 12. 12 Code of Ethics 1. Ethics => Ethics is a branch of philosophy. Ethics defines what is good and bad, what is right and wrong, obligations. 2. All software professionals (programmers, systems admins,
) have the responsibility to provide certain quality or work and assure control, privacy and security in their services and products. 3. What does a code of ethics do? It gives these norms and principles. Code of ethics sets standards. 4. Code of ethics sets commitments, requirements and responsibilities for members of an organization.
  • 13. 13 Code of Ethics for Computer Professionals 1. Fair Treatment – treat everyone fairly. No discrimination on grounds of age, gender, post, etc 2. Access private info only when it is extremely necessary for your official duties, after taking permissions from concerned authorities. 3. Don’t use confidential information for your personal gain.
  • 14. 14 Code of Ethics for Computer Professionals 4. Maintain the privacy of users and professionals. 5. Maintain good communication with users – inform users of which resources can be shared, legal obligations, etc. 6. Maintain good system integrity – regularly perform maintenance of hardware and software, check network and Internet availability. Analyze system performance (download speeds, bootup times for computers, etc) 7. Prevent unauthorized access to systems and resources (applications, printers, data, 
)
  • 15. 15 Code of Ethics for Computer Professionals 8. Maintain healthy cooperation. ‘We’, not ‘I’. 9. Support your colleagues – cooperate with other colleagues. Learn from them if you don’t know something. Train them if they need help in learning 10. Acknowledge the responsibility of the team – the community. 11. Be honest – honesty is the best policy. Take help of seniors if it is necessary, to perform your duties efficiently. 12. Update yourself with latest technology, software, systems practices. If necessary, go for training, self-study.
  • 16. 16 Code of Ethics for Computer Professionals 13. Update yourself on social ad legal issues relating to computing. Share with others whatever new you have learnt. Encourage others to adopt changes in policies – this is social responsibility 14. If you make mistakes, admit them and correct them. Don’t try to blame others for your mistakes. Maintain professionalism while performing your duties. 15. Remove any wrong data about individuals.
  • 17. 17 Do’s for Computer Professionals 1. Use the Internet to enhance your knowledge. Take courses from sites such as Udacity, Udemy, Coursera, MIT, etc 2. When communicating with strangers, don’t share your personal data. Personal data = family, financial, job, health 3. Respect privacy of others 4. Avoid political discussions with strangers 5. Use antivirus software to protect your computer systems 6. Download software from reliable sites only
  • 18. 18 Don’ts for Computer Professionals 1. Don’t share your passwords and usernames with others 2. Don’t arrange to meet unknown persons whom you met on Internet 3. Don’t use unauthorized or pirated software 4. Don’t break / hack into computers. It’s a crime. 5. Don’t answer any improper messages 6. Don’t fall prey to lottery, cashback, loan schemes. 7. Don’t fall into traps of friendship from strangers.
  • 19. 19 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 20. 20 Cyber Insurance 1. A cyber insurance policy protects you from cyber breaches. 2. All gadgets are covered under these policies – laptops, computers, mobile phones, .. 3. Some companies that offer Cyber Security Insurance are: HDFC (Cyber Security) and Bajaj Allianz (Individual Cyber Safe Insurance Policy)
  • 21. 21 Cyber Insurance Cyber Insurance covers the following: i. A financial loss resulting from being a victim of email spoofing and phishing ii. Fraudulent online transactions in bank account, debit/credit card or e- wallet iii. Reputational liability, including claims alleging defamation and invasion of privacy iv. Losses and expenses related to defence and prosecution cost related to identity theft v. Restoration cost to retrieve data or computer program damaged by entry of the malware vi. Cyber extortion loss
  • 22. THANK YOU Prof Mukesh N Tekwani mukeshtekwani@outlook.com November 9, 2019