16
CYBER CRIME & CYBER LAW Presented by:- himanshu munjal Viii sem,cs Roll no.26

cyber crime & cyber law

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: cyber crime & cyber law

CYBER CRIME & CYBER LAW

Presented by:-himanshu munjal

Viii sem,csRoll no.26

Page 2: cyber crime & cyber law

STRUCTURE

• Introduction• Cyber crime • Classification of cybercrime• Cyber Law & Need• Cyber law in US• Global efforts

Page 3: cyber crime & cyber law

WHAT DO YOU KNOW?

Page 4: cyber crime & cyber law

Crime & Cybercrime

• Crime– Engaging in conduct that has been outlawed by a particular

society

• Cybercrime– Differ in the tool: guns are change for computers

Harm to: Individuals, property, government and morality

Page 5: cyber crime & cyber law

CYBER CRIME

• Cybercrime is any illegal act committed using a computer network

(especially the Internet).

• Criminal activities that take place in cyberspace (the Internet).

• Computer used to commit a crime– Child porn, threatening email, assuming someone’s identity, sexual

harassment, defamation, spam, phishing

• Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking

Page 6: cyber crime & cyber law

EXAMPLE OF CYBER CRIME

Page 7: cyber crime & cyber law

Classification OF CYBER CRIME

• Cybercrime includes a wide variety of crime

• Offences under cyber crime:

– Offences against the confidentiality integrity and availability of computer data and systems

– Content-related offences

– Copyright-related offences

Page 8: cyber crime & cyber law

TYPES OF CYBER CRIME

Viruses

Worms

Trojans

Mail bombs

Threats

Harassment

DOS

Fraud

Theft

Piracy

Break-ins

Terrorism.

Page 9: cyber crime & cyber law

CYBER LAW

• Law governing cyber space

• Cyber law encompasses laws relating to:

– Cyber Crimes

– Electronic and Digital Signatures

– Intellectual Property

– Data Protection and Privacy

Page 10: cyber crime & cyber law

NEED OF CYBER LAW

Cybercriminals + computer technology = difficulties to apply the law.

not only real-world crimes by using computers…

Page 11: cyber crime & cyber law

CYBER LAW IN USA• Protect America Act of 2007

• Key component “Electronic Surveillance”

• USA Patriot ACT

– Hacking, cracking, extortion, fraud and malware.

Page 12: cyber crime & cyber law

• Advertising Law

• E-Signatures

• Electronic Contracts

• Cryptography Laws

• Electronic Evidence

• Copyright Law

• Domain Names

• Confidentiality

Page 13: cyber crime & cyber law

National & International Efforts

• First Wave (privacy)– Sweden (1973) ; USA (1974); Federal Republic of German

(1977); Austria, Denmark, France and Norway (1978), etc.• Second Wave (property)

– Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.

• Third Wave (intellectual property)• Convention on Cybercrime

– Ensuring that countries adopt procedural laws.– Harmonizing national cybercrime law.

Page 14: cyber crime & cyber law

PROTECT YOUR SYSTEM• Use anti-virus software and firewalls - keep them up to date

• Keep your operating system up to date with critical security updates and patches

• Don't open emails or attachments from unknown sources

• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist

• Back-up your computer data on disks or CDs often

Page 15: cyber crime & cyber law

• Don't share access to your computers with strangers

• If you have a wi-fi network, password protect it

• Disconnect from the Internet when not in use

• Reevaluate your security on a regular basis

• Make sure your employees and family members know this info too!

Page 16: cyber crime & cyber law

• Treat your password like you treat your toothbrush. Never

give it to anyone else to use, and change it every few months.

THANKS

????