SlideShare uma empresa Scribd logo
1 de 14
CYBER LAW

Submitted To:
Mr.
Bhupesh
Submitted By: Shobhit Krishan
Roll No: 11CS050 (B-45)
CYBER CRIME ~


In Simple language, we can define cyber crime,
that it is an act, against the law, wherein computer
is either a tool or a target both.



It involves theft, frauds, which has also given the
origin to a range of new age crimes that are
addressed by the Information Technology Act
2000.
WE CAN CATEGORIZE CYBER CRIME IN 2
WAYS ~
1. The computer as a target :- using a
computer to attack other computers.
Ex. Hacking, virus/worms.
2. The computer as weapon :- using a computer
to commit real world crimes.

Ex. Cyber terrorism, credit cards frauds.
SOME EXAMPLES OF CYBER CRIMES ~
Unauthorized access & Hacking :
Unauthorized access would therefore mean
any kind of access without the permission
of either the owner or the person in charge
of a computer system or computer network.
Every act committed towards breaking into
a computer or network is hacking. Hackers
use ready-made computer programs to
attack the target computer.
TROJAN ATTACK :
The program that act like something useful
but do the things that are quiet damping. The
programs of this kind are called as trojans. It
is popular from the name trojan horse
TCP/IP protocol is the usual protocol type
used for communications, but some functions
of the trojan use the UDP protocol as well.
WORMS AND VIRUSES :
A program that has capability to infect other
programs and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but spread
from computer to computer are called as
worms.
CYBER LAW
Cyber Law is the law governing cyber space.
Cyber space is a very wide term and includes
computers, networks, software, data storage
devices.
Law holds the rules of conduct :
That have been approved by the government,
which are in force over a certain territory, and
which must be obeyed by all persons on that
territory.
NEED FOR CYBER LAW

Cyberspace is an limitless dimension that is
impossible to govern and regulate using
conventional law.
Cyberspace is absolutely open for participation
by all.
A software source code worth crores of rupees or a
movie can be pirated across the globe within hours of
their release.
Hence, to stop this type of crime and to govern the
cyber space, various cyber laws were made.
HOW
CYBER LAW
CAME INTO
EXISTENCE ??
THE INFORMATION TECHNOLOGY ACT (2000)
The primary source of cyber law in India is the
Information Technology Act, 2000 (IT Act) which
came into force on 17 October 2000.
The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
the filing of electronic records with the Government.
The IT act also penalizes various cyber
crimes
and provides strict punishments
(imprisonment terms upto 10 years and
compensation up to rs 1 crore).
INFORMATION TECHNOLOGY (CERTIFYING
AUTHORITY) REGULATIONS, 2001 came into
force on 9 july 2001. They provide further
technical standards and procedures to be
used by a Certifying Authority.
Two important guidelines relating to certifying
authorities were issued :
1.

The first, are the guidelines for submission of
application for license to operate as a
certifying authority under the IT act. These
guidelines were issued on 9th july 2001.
2.

Next were the guidelines for submission of
certificates and certification lists to the
controller of certifying authorities for publishing In
national repository of digital certificates. These
were issued on 16th december 2002.
THANK
YOU


Mais conteúdo relacionado

Mais procurados

Mais procurados (18)

Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 

Destaque

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

Destaque (20)

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Introduction 2017
Introduction 2017Introduction 2017
Introduction 2017
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
it act
it act it act
it act
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Semelhante a Cyber law

Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 

Semelhante a Cyber law (20)

Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Cyber law

  • 1. CYBER LAW Submitted To: Mr. Bhupesh Submitted By: Shobhit Krishan Roll No: 11CS050 (B-45)
  • 2. CYBER CRIME ~  In Simple language, we can define cyber crime, that it is an act, against the law, wherein computer is either a tool or a target both.  It involves theft, frauds, which has also given the origin to a range of new age crimes that are addressed by the Information Technology Act 2000.
  • 3. WE CAN CATEGORIZE CYBER CRIME IN 2 WAYS ~ 1. The computer as a target :- using a computer to attack other computers. Ex. Hacking, virus/worms. 2. The computer as weapon :- using a computer to commit real world crimes. Ex. Cyber terrorism, credit cards frauds.
  • 4. SOME EXAMPLES OF CYBER CRIMES ~ Unauthorized access & Hacking : Unauthorized access would therefore mean any kind of access without the permission of either the owner or the person in charge of a computer system or computer network. Every act committed towards breaking into a computer or network is hacking. Hackers use ready-made computer programs to attack the target computer.
  • 5. TROJAN ATTACK : The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as trojans. It is popular from the name trojan horse TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojan use the UDP protocol as well.
  • 6. WORMS AND VIRUSES : A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 7. CYBER LAW Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices. Law holds the rules of conduct : That have been approved by the government, which are in force over a certain territory, and which must be obeyed by all persons on that territory.
  • 8. NEED FOR CYBER LAW Cyberspace is an limitless dimension that is impossible to govern and regulate using conventional law. Cyberspace is absolutely open for participation by all.
  • 9. A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release. Hence, to stop this type of crime and to govern the cyber space, various cyber laws were made.
  • 11. THE INFORMATION TECHNOLOGY ACT (2000) The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000. The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate the filing of electronic records with the Government.
  • 12. The IT act also penalizes various cyber crimes and provides strict punishments (imprisonment terms upto 10 years and compensation up to rs 1 crore). INFORMATION TECHNOLOGY (CERTIFYING AUTHORITY) REGULATIONS, 2001 came into force on 9 july 2001. They provide further technical standards and procedures to be used by a Certifying Authority.
  • 13. Two important guidelines relating to certifying authorities were issued : 1. The first, are the guidelines for submission of application for license to operate as a certifying authority under the IT act. These guidelines were issued on 9th july 2001. 2. Next were the guidelines for submission of certificates and certification lists to the controller of certifying authorities for publishing In national repository of digital certificates. These were issued on 16th december 2002.