SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Electronic   Cyber  Law smi
DEFINITION OF ELECTRONIC CYBER LAW ,[object Object],[object Object]
THE NEED OF ELECTRONIC CYBER LAW ,[object Object]
Example of cyber crime which is against electronic cyber law
Electronic Cyber Crime New Zealand and a Teenager Police in New Zealand are investigating eighteen-year-old who is suspected to be the leader of a ring which has skimmed 25 million USD from bank accounts around the world Investigators in New Zealand, the US and the Netherlands believe the youth, who cannot be named but goes by the online name ‘Akill’ - wrote software used to attack more than a million computers. The software was allegedly used to bring down the computer server at the University of Pennsylvania last year. Police described the teenager as the ringleader of a ‘botnet’ - a network of computers infiltrated by a programme that surreptitiously installs itself to allow a hacker to control it.
Cheating and fraud Email spoofing forgery Indecent exposure Online gambling Time - thefts Unauthorized control over computer Sale of illegal articles Distribution of pirated software IP crimes defamation Financial crimes Cyber terrorism Unauthorized control Sending of obscene material Trafficking Possession of unauthorized information Net trespass Cyber-stalking Selling pornography Unauthorized control Transmitting virus Harassment via e-mails Against society at large Against organi-zations Against individual property Against individuals
FEW TIPS TO PROTECT YOU FROM ELECTRONIC CYBER CRIME ,[object Object],[object Object],[object Object],[object Object],[object Object]
That’s all ,[object Object],[object Object]
[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

Was ist angesagt? (19)

Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Ähnlich wie Dons Cyber Law Ppt

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
asha mali
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 

Ähnlich wie Dons Cyber Law Ppt (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 

Kürzlich hochgeladen

MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 

Kürzlich hochgeladen (20)

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 

Dons Cyber Law Ppt

  • 1. Electronic Cyber Law smi
  • 2.
  • 3.
  • 4. Example of cyber crime which is against electronic cyber law
  • 5. Electronic Cyber Crime New Zealand and a Teenager Police in New Zealand are investigating eighteen-year-old who is suspected to be the leader of a ring which has skimmed 25 million USD from bank accounts around the world Investigators in New Zealand, the US and the Netherlands believe the youth, who cannot be named but goes by the online name ‘Akill’ - wrote software used to attack more than a million computers. The software was allegedly used to bring down the computer server at the University of Pennsylvania last year. Police described the teenager as the ringleader of a ‘botnet’ - a network of computers infiltrated by a programme that surreptitiously installs itself to allow a hacker to control it.
  • 6. Cheating and fraud Email spoofing forgery Indecent exposure Online gambling Time - thefts Unauthorized control over computer Sale of illegal articles Distribution of pirated software IP crimes defamation Financial crimes Cyber terrorism Unauthorized control Sending of obscene material Trafficking Possession of unauthorized information Net trespass Cyber-stalking Selling pornography Unauthorized control Transmitting virus Harassment via e-mails Against society at large Against organi-zations Against individual property Against individuals
  • 7.
  • 8.
  • 9.