Cyber Laws Sybcom D

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

GROUP MEMBERS

• NAME ROLL NO: CLASS/DIVISION


1. AKANKSHA SINGH 501 SYBCOM “D”
2. SOUNDARIYA KONAR 504 SYBCOM “D”
3. DIVIKSHA SUVARNA 507 SYBCOM “D”
4. SHWETA YADAV 536 SYBCOM “D”
CYBER CRIME
• Cybercrime , or computer-oriented crime, is a crime that involves a computer
and a network . The computer may have been used in the commission of a
crime , or it may be the target . Cybercrimes can be defined as : “offences
that are committed against individuals or group of individuals with a
criminal motive to intentionally harm the reputation of the victim directly or
indirectly , using modern telecommunication network such as internet
(network including chat rooms , emails , noticeboards and groups) and
mobile phones (Bluetooth / SMS / MMS)” . Cybercrime may threaten a person
or a nation’s securities and financial health . Issues surrounding these types
of crimes have become high-profile , particularly those surrounding hacking ,
copyright infringement , unwarranted mass-surveillance , sextortion , child
pornography , and child grooming .
DIFFUSION OF CYBERCRIMES
• MEANING OF DIFFUSION MEANS ‘THE SPREADING OF SOMETHING MORE WIDELY’.
• THE BRAOD DIFFUSION OF CYBERCRIMES ACTIVITIES IS AN ISSUE IN COMPUTER CRIMES
DECTECTION AND PROSECUTION.
• INDEED , HACKING IS MUCH LESS COMPLEX THAN IT WAS A FEW YEARS AGO, AS HACKING
COMMUNITIES HAVE GREATLY DIFFUSED THEIR KNOWLEDGE THROUGH INTERNET.
• BLOGS AND COMMUNITIES HAVE HUGELY CONTRIBUTED TO INFORMATION SHARING
BEGINNERS COULD BENEFIT FROM OLDER HACKER’S KNOWLEDGE AND ADVICE .
• FUTHERMOTR HACKING IS CHEAPER THAN EVER; BEFORE THE CLOUD COMPUTING ERA, IN
ORDER TO SPAM OR SCAM ONE NEEDED A DEDICATED SERVER , SKILLS IN SERVER
MANAGAMENT, NETWORK CONFIGURATION , AND MAINTENANCE , KNOWLEDEGE OF
INTERNET SERVICE PROVIDER STANDARDS ETC.
• BY COMPARISION, A MAIL SOFTWARE-AS-A-SERVICE IS A SCALABE, INEXPENSIVE, BULK,
AND TRANSACTIONAL E-MAIL-SENDING SERVICE FOR MARKETING PURPOSE AND COULD
BE EASILY SET UP FOR SPAM.
INVESTIGATION
METHODOLOGY OF CYBERCRIME INVESTIGATION
• THEREARE MANY WAYS FOR CYBERCRIMES TO TAKE PLACE, AND INVESTIGATIONS
TEND TO START WITH AN IP ADDRESS TRACES, HOWEVER THAT IS NOT NECESSARY A
FACTUAL BASIS UPON WHICH DETECTIVES CAN SOLVE A CASE.
• DIFFERENT TYPES OF HIGH-TECH CRIME MAY ALSO INCLUDE ELEMENTS OF LOW-
TECH CRIME, AND VICE VERSA, MAKING CYBERCRIMES INVESTIGATOR AN
INDISPENSABLE PART OF MODERN LAW-ENFORCEMENT.
• METHODOGLY OF CYBERCRIME DETECTIVE WORK IS DYNAMIC AND IS CONSTANTLY
IMPROVING, WHETHER IN CLOSED POLICE UNITS, OR IN INTERNATIONAL
COOPERATION FRAMEWORK.
PENALTIES
• SOME HACKERS HAVE BEEN HIRED AS INFORMATION SECURITY EXPERTS BY PRIVATE
COMPANIES DUE TO THEIR INSIDE KNOWLEDGE OF COMPUTER CRIME, A
PHENOMENON WHICH THEORETICALLY COULD CREATE PERVERSE INCENTIVES.
• A POSSIBLE COUNTER TO THIS IS FOR COURTS TO BAN CONVICTED HACKERS FROM
USING THE INTERNET OR COMPUTERS, EVEN AFTER THEY HAVE BEEN RELEASED FROM
PRISON-THOUGH AS COMPUTER AND THE INTERNET BECOME MORE AND MORE
CENTRAL TO EVRYDAY LIFE, THIS TYPE OF PUNISHMENT MAY BE VIEWED AS MORE AND
MORE HARSH AND DRACONIAN.
• HOWEVER, NUANCED APPROACHES HAVE BEEN DEVELOPED THAT MANAGE CYBER
OFFENDER’S BEHAVIOUR WITHOUT RESTOETING TO TOTAL COMPUTER OR INTERNET
BANS.
• THESE APPROACHES INVOLVE RESTRICTING INDIDVIDUALS TO SPECIFIC DEVICES
WHICH ARE SUBJECT TO COMPUTER MONITORING OR COMPUTER SEARCHES BY
PROBATION OR PAROLE OFFICERS.
AWARENESS
• AS TECHNOLOGY ADVANCES AND MORE PEOPLE RELY ON THE INTERNET TO
STORE SENSITIVE INFORMATION SUCH AS BANKING OR CREDIT CARD
INFORMATION, CRIMINALS INCREASINGLY ATTEMPT TO STEAL THAT INFORMATION
• CYBERCIME IS BECOMING MORE OF A THREAT TO PEOPLE ACROSS THE WORLD .
• RAISING AWARENESS ABOUT HOW IN FORMATION IS BEING PROTECTED AND
THE TATAICS CRIMINALS USE TO STEAL THAT INFORMATION CONTINUES TO
GROW IN IMPORTANCES.
• ACCOORDING TO THE FBI’S INTERNET CRIMES COMPLAINT CENTRE IN 2014,
THERE WERE 269,422 COMPLAINTS FILED.
• WITH ALL THE CLAIMS COMBINED THERE WERE A REPORTED TOTAL LOSS OF
$800,492,073.
CYBER LAWS
MEANING
CYBER LAW IS THE PART OF THE OVERALL LEGAL SYSTEM
THAT DEALS WITH INTERNET , CYBERSPACE , AND THEIR RESPECTIVE
LEGAL ISSUES .
CYBER LAW COVERS A FAIRLY BROAD AREA ,
ENCOMPASSING SEVERAL SUBTOPICS INCLUDING FREEDOM OF
EXPRESSION , ACCESS TO AND USAGE OF THE INTERNET , AND
ONLINE PRIVACY .
IMPORTANCE OF CYBER LAWS
CYBERLAW IS IMPORTANT BECAUSE IT TOUCHES ALMOST ALL ASPECTS OF
TRANSACTION AND ACTIVITIES ON AND CONCERNING THE INTERNET , THE
WIDE AND CYBERSPACE .
IINTIALLY IT MAY SEEM THAT CYBERLAW IS A VERY TECHNICAL FIELD FIELD
AND THAT IT DOES NOT HAVE ANY BEARING TO MOST ACTIVITIES IN
CYBERSPACE.
BUT THE ACTUAL IS THAT NOTHING COULD BE FURTHER THAN THE TRUE.
WHETHER WE REALIZE IT OR NOT, EVERY ACTION AND EVERY REACTION IN
CYBERSPACE HAS SOME LEGAL AND CYBER LEGAL PERSPECTIVES.
ADVANTAGES OF CYBER LAWS
THE IT ACT 2000 ATTEMPTS TO CHANGE OUTDATED LAWS AND
PROVIDES WAYS TO DEAL WITH CYBER CRIMES . WE NEED SUCH
LAWS SO THAT PEOPLE CAN PERFORM PURCHASE TRANSACTION
OVER THE NET THROUGH CREDIT CARDS WITHOUT FEAR OF
MISUSE . THE ACT OFFERS THE MUCH NEEDED LEGAL FRAMEWORK
SO THAT INFORMATION IS NOT DENIED LEGAL EFFECT , VALIDITY
OR ENFORCEABILITY , SOLELY ON THE GROUND THAT IT IS IN THE
FORM OF ELECTRONIC RECORDS .
FOLLOWING ARE THE POINTS OF CYBER LAWS
ADVANTAGES
1. FROM THE PERSPECTIVE OF E COMMERCE IN INDIA , THE IT ACT 2000 AND ITS
PROVISION CONTAIN MANY POSITIVE ASPECTS . FIRSTLY THE IMPLICATION OF THIS
PROVISION FOR THE E BUSSINESS WOULD BE THAT EMAIL WOULD NOW BE A VALID
AND LEGAL FORM OF COMMUNICATION IN OUR COUNTRY THAT CAN DUELY
PRODUCED AND APPROVED IN COURT OF LAW
2. COMAPANIES SHALL NOW BE ABLE TO CARRY OUT ELECTRONIC COMMERCE USING
THE LEGAL INFRANSTRUCTURE PROVIDED BY THE ACT .
3. DIGITAL SIGNATURES HAVE BEEN GIVEN A LEGAL VALIDITY AND SANCTION IN THE
ACT.
4. THE ACT THROWS OPEN THE DOORS FOR THE ENTY OF CORPORATE COMPANIES IN
THE BUSSINESS OF BEING CERTIFYING AUTHORITIES FOR ISSUING DIGITAL
SIGNATURE CERTIFICATE.
CYBER LAWS CASES IN INDIA AND WORLD

MYSPACE CATCHES A MURDERER


MYSPACE HAS PLAYED AN IMPORTANT ROLE IN HELPING OAKLAND
POLICE APPREHEND A 19- YEAR OLD MAN ACCUSED OF SHOOTING A SAN
LEANDRO HIGH SCHOOL FOOTBALL PLAYER GREG “DOODY” BALLARD , JR.
OAKLAND POLICE HAD A STREET NAME OF A SUSPECT AND WERE ABLE TO
IDENTIFY DWAYNE STANCILL , 19 OF OAKLAND FROM A PICTURE THEY FOUND ON
A GANG’S MYSPACE PAGE . POLICE BROUGHT THE SUSPECT TO THEIR HEAD
QUARTERS WHERE DETECTIVIES SAY HE CONFESSED . WHAT WAS MOST
TROUBLING TO INVESTIGATORS WAS THE LACK OF MOTIVE FOR THE KILLING .

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy