Dons Cyber Law Ppt

4,269 views
3,954 views

Published on

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,269
On SlideShare
0
From Embeds
0
Number of Embeds
27
Actions
Shares
0
Downloads
184
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Dons Cyber Law Ppt

  1. 1. Electronic Cyber Law smi
  2. 2. DEFINITION OF ELECTRONIC CYBER LAW <ul><li>CYBER LAW IS A SYSTEM OF REGULATIONS FOR THE ELECTRONIC USESAGE OF THE INTERNET </li></ul><ul><li>SIMPLY SPEAKING ELECTRONIC CYBER LAW IS A GENERIC TERM WHICH REFERS TO ALL LEGAL & REGULATORY ASPECTS OF THE INTERNET , WORLDS TRANSACTION SYSTEM & ELECTRONIC COMMERCE </li></ul>
  3. 3. THE NEED OF ELECTRONIC CYBER LAW <ul><li>DUE TO ANONYMOUS MATURE OF THE INTERNET, IT IS POSSIBLE TO ENGAGE INTO A VARIETY OF CRIMINAL ACTIVITIES GROSSLY MISUSING THIS ASPECT OF THE INTERNET TO PERPETUATE CRIME ECSPECIALLY IN E-COMMERCE, SPAM & MONEY TRANSACTION USING THE ONLINE BANKING SERVICES. </li></ul>
  4. 4. Example of cyber crime which is against electronic cyber law
  5. 5. Electronic Cyber Crime New Zealand and a Teenager Police in New Zealand are investigating eighteen-year-old who is suspected to be the leader of a ring which has skimmed 25 million USD from bank accounts around the world Investigators in New Zealand, the US and the Netherlands believe the youth, who cannot be named but goes by the online name ‘Akill’ - wrote software used to attack more than a million computers. The software was allegedly used to bring down the computer server at the University of Pennsylvania last year. Police described the teenager as the ringleader of a ‘botnet’ - a network of computers infiltrated by a programme that surreptitiously installs itself to allow a hacker to control it.
  6. 6. Cheating and fraud Email spoofing forgery Indecent exposure Online gambling Time - thefts Unauthorized control over computer Sale of illegal articles Distribution of pirated software IP crimes defamation Financial crimes Cyber terrorism Unauthorized control Sending of obscene material Trafficking Possession of unauthorized information Net trespass Cyber-stalking Selling pornography Unauthorized control Transmitting virus Harassment via e-mails Against society at large Against organi-zations Against individual property Against individuals
  7. 7. FEW TIPS TO PROTECT YOU FROM ELECTRONIC CYBER CRIME <ul><li>PROTECT YOURSELF BY: </li></ul><ul><li>BANKING ONLINE SAFELY </li></ul><ul><li>USING STRONG PASSWORDS </li></ul><ul><li>BEING CAREFUL WITH ANY FILE OR DOCUMENT SHARING </li></ul><ul><li>BEING EXTRA CONCERNED WITH YOUR ANY BIL PAYMENT USING ONLINE SERVICES </li></ul>
  8. 8. That’s all <ul><li>Thank you…….. </li></ul><ul><li>For watching…… </li></ul>
  9. 9. <ul><li>MARIAMAH </li></ul><ul><li>ROCKSZZZ! </li></ul>

×