CYBER CRIME & CYBER LAW
Presented by:-himanshu munjal
Viii sem,csRoll no.26
STRUCTURE
• Introduction• Cyber crime • Classification of cybercrime• Cyber Law & Need• Cyber law in US• Global efforts
WHAT DO YOU KNOW?
Crime & Cybercrime
• Crime– Engaging in conduct that has been outlawed by a particular
society
• Cybercrime– Differ in the tool: guns are change for computers
Harm to: Individuals, property, government and morality
CYBER CRIME
• Cybercrime is any illegal act committed using a computer network
(especially the Internet).
• Criminal activities that take place in cyberspace (the Internet).
• Computer used to commit a crime– Child porn, threatening email, assuming someone’s identity, sexual
harassment, defamation, spam, phishing
• Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking
EXAMPLE OF CYBER CRIME
Classification OF CYBER CRIME
• Cybercrime includes a wide variety of crime
• Offences under cyber crime:
– Offences against the confidentiality integrity and availability of computer data and systems
– Content-related offences
– Copyright-related offences
TYPES OF CYBER CRIME
Viruses
Worms
Trojans
Mail bombs
Threats
Harassment
DOS
Fraud
Theft
Piracy
Break-ins
Terrorism.
CYBER LAW
• Law governing cyber space
• Cyber law encompasses laws relating to:
– Cyber Crimes
– Electronic and Digital Signatures
– Intellectual Property
– Data Protection and Privacy
NEED OF CYBER LAW
Cybercriminals + computer technology = difficulties to apply the law.
not only real-world crimes by using computers…
CYBER LAW IN USA• Protect America Act of 2007
• Key component “Electronic Surveillance”
• USA Patriot ACT
– Hacking, cracking, extortion, fraud and malware.
• Advertising Law
• E-Signatures
• Electronic Contracts
• Cryptography Laws
• Electronic Evidence
• Copyright Law
• Domain Names
• Confidentiality
National & International Efforts
• First Wave (privacy)– Sweden (1973) ; USA (1974); Federal Republic of German
(1977); Austria, Denmark, France and Norway (1978), etc.• Second Wave (property)
– Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.
• Third Wave (intellectual property)• Convention on Cybercrime
– Ensuring that countries adopt procedural laws.– Harmonizing national cybercrime law.
PROTECT YOUR SYSTEM• Use anti-virus software and firewalls - keep them up to date
• Keep your operating system up to date with critical security updates and patches
• Don't open emails or attachments from unknown sources
• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist
• Back-up your computer data on disks or CDs often
• Don't share access to your computers with strangers
• If you have a wi-fi network, password protect it
• Disconnect from the Internet when not in use
• Reevaluate your security on a regular basis
• Make sure your employees and family members know this info too!
• Treat your password like you treat your toothbrush. Never
give it to anyone else to use, and change it every few months.
THANKS
????