SlideShare uma empresa Scribd logo
1 de 14
1
Cyber Crime
 Also Known as Computer-oriented crime.
 Refers to the use of technology for illegal purpose
which may harm others.
 Involves a computer and network.
 Increasing day by day in order to earn money in short
time.
2
Examples of Cyber Crime
 Hacking/Cracking
 Cyberbully
 Cyber terrorism
 Phishing
 Cyber theft
 Virus
 Cyber contraband
 Cyberwarfare
 Drug Trafficking
3
Hacking
 One of the most common cyber crime where people involves in
illegal hacking.
 People involving in hacking is known as hacker.
 It is the gaining of unauthorized access to data in computer
system.
 White hat hackers, known as ethical hackers are not criminals
as they ensures security to data of an individuals or
organization.
4
Cyberbully
 Also known as Cyber Harassment
 Form of bullying others through electronic means.
 May includes posting rumors or person information of someone
in internet.
 Increasing among teens and young generation.
 Many serious cases which has resulted to many suicide.
5
Phishing
 An activity of getting sensitive information of an individuals
or organizations such as password, pin number by sending
e-mails, messages, etc.
 An example of social engineering technique to deceive user.
 A simple technique mostly used by hackers or technology
expert to obtain passwords of accounts.
6
Cyberterrorism
 Use of internet to conduct violent acts that result in, or
threaten, loss of life or damage of public property.
 Experienced cyberterrorists, who are very skilled in
terms of hacking can cause massive damage to
government systems, hospital records, and national
security programs.
7
Piracy
 the use of works protected by copyright law without
permission.
 Copying or selling of software, videos, etc. in
copyright.
 Many laws has been implemented against the use of
pirated works.
8
Cyber Law
 The law of using Information Technology including
computing and the internet.
 It is very necessary to eradicate cyber crime.
 Cyber Law of Nepal is known as Electronic
Transaction and Digital Signature Act-Ordinance
enacted in 2061 BS.
9
Computer Ethics
 Set of moral principles that regulate the use of
computers.
 Walter Manner coins the term ‘Computer Ethics’ in
1976.
 a part of practical philosophy concerned with how
computing professionals should make decisions
regarding professional and social conduct
10
Ten Commandments issued by Cyber Ethics Institution
 Do not use computer to harm other people.
 Do not interfere with other’s computer works.
 Do not snoop around in other’s computer files.
 Do not use computer to steal.
 Do not use computer to bear false witness.
 Do not copy software without permission for which you have not paid.
 Do not use other’s computer resources without authorization.
 Do not appropriate other’s intellectual output.
11
 Always think about the social consequences of the program or the system you are
designing.
 Always use a computer in such a way that ensure consideration and respect for your
fellow humans.
12
“ The Computer was born to
problems that didn’t exist
before.
-Bill Gates
13
14

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Society, law and ethics Privacy Laws
Society, law and ethics Privacy LawsSociety, law and ethics Privacy Laws
Society, law and ethics Privacy Laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Semelhante a Cyber Law and Cyber Crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 

Semelhante a Cyber Law and Cyber Crime (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Cyber Law and Cyber Crime

  • 1. 1
  • 2. Cyber Crime  Also Known as Computer-oriented crime.  Refers to the use of technology for illegal purpose which may harm others.  Involves a computer and network.  Increasing day by day in order to earn money in short time. 2
  • 3. Examples of Cyber Crime  Hacking/Cracking  Cyberbully  Cyber terrorism  Phishing  Cyber theft  Virus  Cyber contraband  Cyberwarfare  Drug Trafficking 3
  • 4. Hacking  One of the most common cyber crime where people involves in illegal hacking.  People involving in hacking is known as hacker.  It is the gaining of unauthorized access to data in computer system.  White hat hackers, known as ethical hackers are not criminals as they ensures security to data of an individuals or organization. 4
  • 5. Cyberbully  Also known as Cyber Harassment  Form of bullying others through electronic means.  May includes posting rumors or person information of someone in internet.  Increasing among teens and young generation.  Many serious cases which has resulted to many suicide. 5
  • 6. Phishing  An activity of getting sensitive information of an individuals or organizations such as password, pin number by sending e-mails, messages, etc.  An example of social engineering technique to deceive user.  A simple technique mostly used by hackers or technology expert to obtain passwords of accounts. 6
  • 7. Cyberterrorism  Use of internet to conduct violent acts that result in, or threaten, loss of life or damage of public property.  Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems, hospital records, and national security programs. 7
  • 8. Piracy  the use of works protected by copyright law without permission.  Copying or selling of software, videos, etc. in copyright.  Many laws has been implemented against the use of pirated works. 8
  • 9. Cyber Law  The law of using Information Technology including computing and the internet.  It is very necessary to eradicate cyber crime.  Cyber Law of Nepal is known as Electronic Transaction and Digital Signature Act-Ordinance enacted in 2061 BS. 9
  • 10. Computer Ethics  Set of moral principles that regulate the use of computers.  Walter Manner coins the term ‘Computer Ethics’ in 1976.  a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct 10
  • 11. Ten Commandments issued by Cyber Ethics Institution  Do not use computer to harm other people.  Do not interfere with other’s computer works.  Do not snoop around in other’s computer files.  Do not use computer to steal.  Do not use computer to bear false witness.  Do not copy software without permission for which you have not paid.  Do not use other’s computer resources without authorization.  Do not appropriate other’s intellectual output. 11
  • 12.  Always think about the social consequences of the program or the system you are designing.  Always use a computer in such a way that ensure consideration and respect for your fellow humans. 12
  • 13. “ The Computer was born to problems that didn’t exist before. -Bill Gates 13
  • 14. 14