SlideShare a Scribd company logo
1 of 7
Download to read offline
KKEEMMEENNTTEERRIIAANN PPEELLAAJJAARRAANN MMAALLAAYYSSIIAA
SSeellff AAcccceessss LLeeaarrnniinngg MMoodduullee
NNEETTWWOORRKKSS AANNDD TTHHEE IINNTTEERRNNEETT
CCyybbeerr LLaaww
II
PUSAT PERKEMBANGAN KURIKULUM
KEMENTERIAN PELAJARAN MALAYSIA
ICCCTTT LLLiiittteeerrraaacccyyy fffooorrr
SSSeeecccooonnndddaaarrryyy SSSccchhhoooooolll
PPPrrrooogggrrraaammmmmmeee
ICTL for Secondary School - Networks and The Internet Module
MODULE 4
Cyber Law
Curriculum Development Centre
Ministry of Education Malaysia
2
ICTL for Secondary School - Networks and The Internet Module
1. Name of Module : Cyber Law
2. Learning Outcomes : The students should be able to:
a. describe the need for cyber law
3. Knowledge and Skills :
a. Internet.
b. various forms of communication on the internet.
4. Module Summary : At the end of the module, the student is able to
a. describe the need to understand cyber law.
This module contains two activities:
Activity : Discussion on the reasons needed for cyber law.
3
ICTL for Secondary School - Networks and The Internet Module
Activity : Discussion On Reasons For The Need Of Cyber Law
What is Cyber Law?
Cyber law refers to any laws relating to protecting the Internet and other online
communication technologies.
The Cyber Law Acts In Malaysia
The Malaysian Government has already passed several cyber laws to control and reduce
Internet abuse.
These cyber laws include:
• Digital Signature Act 1997
• Computer Crimes Act 1997
• Telemedicine Act 1997
• Communications and Multimedia Act 1998
Beside these cyber laws, there are three other cyber laws being drafted.
• Private Data Protection Bill
• Electronic Government Activities Bill
• Electronic Transactions Bill
Digital Signature Act 1997
Digital Signature is an identity verification standard that uses
encryption techniques to protect against e-mail forgery. The
encrypted code consists of the user’s name and a hash of all the
parts of the message.
By attaching the digital signature, one can ensure that nobody can
eavesdrop, intercept or temper with transmitted data.
Computer Crimes Act 1997
Gives protection against the misuse of computers and computer
criminal activities such as unauthorised use of programmes, illegal
transmission of data or messages over computers, hacking and
cracking of computer systems and networks.
Users can protect their rights to privacy and build trust in the
computer system.
The government can have control at a certain level over cyberspace to reduce cyber crime
activities.
4
ICTL for Secondary School - Networks and The Internet Module
Telemedicine Act 1997
The Telemedicine Act 1997 ensures that only qualified medical
practitioners can practice telemedicine and that their patient's rights
and interests are protected.
This act provides future development and delivery of healthcare in
Malaysia.
Communications And Multimedia Act 1998
The implementation of Communication and Telecommunication Act
1998 ensures that information is secure, the network is reliable and
affordable all over Malaysia.
Needs for Cyber Law
CYBER LAW
Integrity and Security
of Information
Legal Status of Online
Transactions
Privacy and Confidentially
of Information
Security of
Government Data
Intellectual Property
Rights
Examples of Cyber abuse on the users
• sending a computer virus via e-mail
• hacking into your school’s database to change your examination
results.
• selling pirated software in a night market
5
ICTL for Secondary School - Networks and The Internet Module
Worksheet :
Write a short essay on the need of cyber law
6
ICTL for Secondary School - Networks and The Internet Module
Reference
Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology.
Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT)
Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd.
CD courseware ICT, Pusat Perkembangan Kurikulum. KPM
http://www.wikipedia.org
http://images.search.yahoo.com
http://www.google.com.my
7

More Related Content

What's hot

What's hot (19)

Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Internet
InternetInternet
Internet
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Pre itact
Pre itactPre itact
Pre itact
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyber law
Cyber lawCyber law
Cyber law
 
La1 Computer Crimes
La1 Computer CrimesLa1 Computer Crimes
La1 Computer Crimes
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber law
Cyber lawCyber law
Cyber law
 
IT Act
IT ActIT Act
IT Act
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 

Viewers also liked

Module 1 Introduction to Network
Module 1 Introduction to NetworkModule 1 Introduction to Network
Module 1 Introduction to NetworkIra Raji
 
Pertemuan 9 keamanan jaringan
Pertemuan 9 keamanan jaringanPertemuan 9 keamanan jaringan
Pertemuan 9 keamanan jaringanjumiathyasiz
 
Sp kbsr kbsm_p_kesihatan
Sp kbsr kbsm_p_kesihatanSp kbsr kbsm_p_kesihatan
Sp kbsr kbsm_p_kesihatanIra Raji
 
Pertemuan 11 removable media
Pertemuan 11 removable mediaPertemuan 11 removable media
Pertemuan 11 removable mediajumiathyasiz
 
Sp pj kbsr_kbsm
Sp pj kbsr_kbsmSp pj kbsr_kbsm
Sp pj kbsr_kbsmIra Raji
 
Pertemuan 11 keamanan teknologi informasi
Pertemuan 11 keamanan teknologi informasiPertemuan 11 keamanan teknologi informasi
Pertemuan 11 keamanan teknologi informasijumiathyasiz
 
Jawatankuasa pengurusan koko smk valdor 2015
Jawatankuasa pengurusan koko smk valdor 2015Jawatankuasa pengurusan koko smk valdor 2015
Jawatankuasa pengurusan koko smk valdor 2015Ira Raji
 
Pertemuan 8 mail server
Pertemuan 8 mail serverPertemuan 8 mail server
Pertemuan 8 mail serverjumiathyasiz
 
Pertemuan 14 cisco
Pertemuan 14 ciscoPertemuan 14 cisco
Pertemuan 14 ciscojumiathyasiz
 
Jawatankuasa pengurusan smk valdor 2015
Jawatankuasa pengurusan smk valdor 2015Jawatankuasa pengurusan smk valdor 2015
Jawatankuasa pengurusan smk valdor 2015Ira Raji
 
Pertemuan 12 perawatan & pemeliharaan jaringan
Pertemuan 12 perawatan & pemeliharaan jaringanPertemuan 12 perawatan & pemeliharaan jaringan
Pertemuan 12 perawatan & pemeliharaan jaringanjumiathyasiz
 
Pertemuan 16 ipv4 & ipv6
Pertemuan 16 ipv4 & ipv6Pertemuan 16 ipv4 & ipv6
Pertemuan 16 ipv4 & ipv6jumiathyasiz
 
Jawatankuasa pengurusan hem smk valdor 2015
Jawatankuasa pengurusan hem smk valdor 2015Jawatankuasa pengurusan hem smk valdor 2015
Jawatankuasa pengurusan hem smk valdor 2015Ira Raji
 
Pertemuan 15 ancaman sistem keamanan komputer
Pertemuan 15 ancaman sistem keamanan komputerPertemuan 15 ancaman sistem keamanan komputer
Pertemuan 15 ancaman sistem keamanan komputerjumiathyasiz
 
Pertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringanPertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringanjumiathyasiz
 
Pertemuan 10 keamanan jaringan dgn firewall
Pertemuan 10 keamanan jaringan dgn firewallPertemuan 10 keamanan jaringan dgn firewall
Pertemuan 10 keamanan jaringan dgn firewalljumiathyasiz
 
Module Creating Website
Module Creating WebsiteModule Creating Website
Module Creating WebsiteIra Raji
 
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachMobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachColeago Consulting
 

Viewers also liked (18)

Module 1 Introduction to Network
Module 1 Introduction to NetworkModule 1 Introduction to Network
Module 1 Introduction to Network
 
Pertemuan 9 keamanan jaringan
Pertemuan 9 keamanan jaringanPertemuan 9 keamanan jaringan
Pertemuan 9 keamanan jaringan
 
Sp kbsr kbsm_p_kesihatan
Sp kbsr kbsm_p_kesihatanSp kbsr kbsm_p_kesihatan
Sp kbsr kbsm_p_kesihatan
 
Pertemuan 11 removable media
Pertemuan 11 removable mediaPertemuan 11 removable media
Pertemuan 11 removable media
 
Sp pj kbsr_kbsm
Sp pj kbsr_kbsmSp pj kbsr_kbsm
Sp pj kbsr_kbsm
 
Pertemuan 11 keamanan teknologi informasi
Pertemuan 11 keamanan teknologi informasiPertemuan 11 keamanan teknologi informasi
Pertemuan 11 keamanan teknologi informasi
 
Jawatankuasa pengurusan koko smk valdor 2015
Jawatankuasa pengurusan koko smk valdor 2015Jawatankuasa pengurusan koko smk valdor 2015
Jawatankuasa pengurusan koko smk valdor 2015
 
Pertemuan 8 mail server
Pertemuan 8 mail serverPertemuan 8 mail server
Pertemuan 8 mail server
 
Pertemuan 14 cisco
Pertemuan 14 ciscoPertemuan 14 cisco
Pertemuan 14 cisco
 
Jawatankuasa pengurusan smk valdor 2015
Jawatankuasa pengurusan smk valdor 2015Jawatankuasa pengurusan smk valdor 2015
Jawatankuasa pengurusan smk valdor 2015
 
Pertemuan 12 perawatan & pemeliharaan jaringan
Pertemuan 12 perawatan & pemeliharaan jaringanPertemuan 12 perawatan & pemeliharaan jaringan
Pertemuan 12 perawatan & pemeliharaan jaringan
 
Pertemuan 16 ipv4 & ipv6
Pertemuan 16 ipv4 & ipv6Pertemuan 16 ipv4 & ipv6
Pertemuan 16 ipv4 & ipv6
 
Jawatankuasa pengurusan hem smk valdor 2015
Jawatankuasa pengurusan hem smk valdor 2015Jawatankuasa pengurusan hem smk valdor 2015
Jawatankuasa pengurusan hem smk valdor 2015
 
Pertemuan 15 ancaman sistem keamanan komputer
Pertemuan 15 ancaman sistem keamanan komputerPertemuan 15 ancaman sistem keamanan komputer
Pertemuan 15 ancaman sistem keamanan komputer
 
Pertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringanPertemuan 13 penanganan masalah jaringan
Pertemuan 13 penanganan masalah jaringan
 
Pertemuan 10 keamanan jaringan dgn firewall
Pertemuan 10 keamanan jaringan dgn firewallPertemuan 10 keamanan jaringan dgn firewall
Pertemuan 10 keamanan jaringan dgn firewall
 
Module Creating Website
Module Creating WebsiteModule Creating Website
Module Creating Website
 
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's ApproachMobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
Mobile Network Infrastructure Sharing - Industry Overview & Coleago's Approach
 

Similar to Module Cyber Law

Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber lawFatin Izzaty
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32KLIBEL
 
Module Introduction
Module IntroductionModule Introduction
Module IntroductionIra Raji
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internetairiel hamka
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internetNick Racers
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdfShieAnneGarcia
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalEdi Suryadi
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Habib Noroozi
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internetFatin Izzaty
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Maganathin Veeraragaloo
 

Similar to Module Cyber Law (20)

Module 7 cyber law
Module 7   cyber lawModule 7   cyber law
Module 7 cyber law
 
document
documentdocument
document
 
Klibel5 law 32
Klibel5 law 32Klibel5 law 32
Klibel5 law 32
 
Module Introduction
Module IntroductionModule Introduction
Module Introduction
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internet
 
Module Internet
Module Internet Module Internet
Module Internet
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdf
 
Cyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1Securing ever growing and complex business systems v1 1
Securing ever growing and complex business systems v1 1
 

More from Ira Raji

Module Skype
Module SkypeModule Skype
Module SkypeIra Raji
 
Module E-mail
Module E-mailModule E-mail
Module E-mailIra Raji
 
Module Internet Application
Module Internet ApplicationModule Internet Application
Module Internet ApplicationIra Raji
 
Module Internet Communication
Module Internet CommunicationModule Internet Communication
Module Internet CommunicationIra Raji
 
Module 3 Sharing Hardware
Module 3 Sharing HardwareModule 3 Sharing Hardware
Module 3 Sharing HardwareIra Raji
 
Module 2 Sharing Document
Module 2 Sharing DocumentModule 2 Sharing Document
Module 2 Sharing DocumentIra Raji
 
Ms powerpoint
Ms powerpointMs powerpoint
Ms powerpointIra Raji
 
Jawatankuasa pengurusan smk valdor 2014
Jawatankuasa pengurusan smk valdor 2014Jawatankuasa pengurusan smk valdor 2014
Jawatankuasa pengurusan smk valdor 2014Ira Raji
 
Jawatankuasa pengurusan koko smk valdor 2014
Jawatankuasa pengurusan koko smk valdor 2014Jawatankuasa pengurusan koko smk valdor 2014
Jawatankuasa pengurusan koko smk valdor 2014Ira Raji
 
Jawatankuasa pengurusan hem smk valdor 2014
Jawatankuasa pengurusan hem smk valdor 2014Jawatankuasa pengurusan hem smk valdor 2014
Jawatankuasa pengurusan hem smk valdor 2014Ira Raji
 
Hari anugerah kecemerlangan pelajar 2013
Hari anugerah kecemerlangan pelajar 2013Hari anugerah kecemerlangan pelajar 2013
Hari anugerah kecemerlangan pelajar 2013Ira Raji
 
Frog vle software update may 2013 en
Frog vle software update may 2013 enFrog vle software update may 2013 en
Frog vle software update may 2013 enIra Raji
 
Frog software update april 2013
Frog software update april 2013Frog software update april 2013
Frog software update april 2013Ira Raji
 
Sps standard presentation 2013
Sps standard presentation 2013Sps standard presentation 2013
Sps standard presentation 2013Ira Raji
 
Pengintegrasian data kpm (21 jan2013)
Pengintegrasian data kpm (21 jan2013)Pengintegrasian data kpm (21 jan2013)
Pengintegrasian data kpm (21 jan2013)Ira Raji
 
Frog vle software update feb 13
Frog vle software update feb 13Frog vle software update feb 13
Frog vle software update feb 13Ira Raji
 
Jawatan kuasa hal ehwal murid 2013
Jawatan kuasa hal ehwal murid 2013Jawatan kuasa hal ehwal murid 2013
Jawatan kuasa hal ehwal murid 2013Ira Raji
 

More from Ira Raji (20)

Module Skype
Module SkypeModule Skype
Module Skype
 
Module E-mail
Module E-mailModule E-mail
Module E-mail
 
Module Internet Application
Module Internet ApplicationModule Internet Application
Module Internet Application
 
Module Internet Communication
Module Internet CommunicationModule Internet Communication
Module Internet Communication
 
Module 3 Sharing Hardware
Module 3 Sharing HardwareModule 3 Sharing Hardware
Module 3 Sharing Hardware
 
Module 2 Sharing Document
Module 2 Sharing DocumentModule 2 Sharing Document
Module 2 Sharing Document
 
Ms word
Ms wordMs word
Ms word
 
Ms powerpoint
Ms powerpointMs powerpoint
Ms powerpoint
 
Ms access
Ms accessMs access
Ms access
 
Ms excel
Ms  excelMs  excel
Ms excel
 
Jawatankuasa pengurusan smk valdor 2014
Jawatankuasa pengurusan smk valdor 2014Jawatankuasa pengurusan smk valdor 2014
Jawatankuasa pengurusan smk valdor 2014
 
Jawatankuasa pengurusan koko smk valdor 2014
Jawatankuasa pengurusan koko smk valdor 2014Jawatankuasa pengurusan koko smk valdor 2014
Jawatankuasa pengurusan koko smk valdor 2014
 
Jawatankuasa pengurusan hem smk valdor 2014
Jawatankuasa pengurusan hem smk valdor 2014Jawatankuasa pengurusan hem smk valdor 2014
Jawatankuasa pengurusan hem smk valdor 2014
 
Hari anugerah kecemerlangan pelajar 2013
Hari anugerah kecemerlangan pelajar 2013Hari anugerah kecemerlangan pelajar 2013
Hari anugerah kecemerlangan pelajar 2013
 
Frog vle software update may 2013 en
Frog vle software update may 2013 enFrog vle software update may 2013 en
Frog vle software update may 2013 en
 
Frog software update april 2013
Frog software update april 2013Frog software update april 2013
Frog software update april 2013
 
Sps standard presentation 2013
Sps standard presentation 2013Sps standard presentation 2013
Sps standard presentation 2013
 
Pengintegrasian data kpm (21 jan2013)
Pengintegrasian data kpm (21 jan2013)Pengintegrasian data kpm (21 jan2013)
Pengintegrasian data kpm (21 jan2013)
 
Frog vle software update feb 13
Frog vle software update feb 13Frog vle software update feb 13
Frog vle software update feb 13
 
Jawatan kuasa hal ehwal murid 2013
Jawatan kuasa hal ehwal murid 2013Jawatan kuasa hal ehwal murid 2013
Jawatan kuasa hal ehwal murid 2013
 

Recently uploaded

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 

Recently uploaded (9)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 

Module Cyber Law

  • 1. KKEEMMEENNTTEERRIIAANN PPEELLAAJJAARRAANN MMAALLAAYYSSIIAA SSeellff AAcccceessss LLeeaarrnniinngg MMoodduullee NNEETTWWOORRKKSS AANNDD TTHHEE IINNTTEERRNNEETT CCyybbeerr LLaaww II PUSAT PERKEMBANGAN KURIKULUM KEMENTERIAN PELAJARAN MALAYSIA ICCCTTT LLLiiittteeerrraaacccyyy fffooorrr SSSeeecccooonnndddaaarrryyy SSSccchhhoooooolll PPPrrrooogggrrraaammmmmmeee
  • 2. ICTL for Secondary School - Networks and The Internet Module MODULE 4 Cyber Law Curriculum Development Centre Ministry of Education Malaysia 2
  • 3. ICTL for Secondary School - Networks and The Internet Module 1. Name of Module : Cyber Law 2. Learning Outcomes : The students should be able to: a. describe the need for cyber law 3. Knowledge and Skills : a. Internet. b. various forms of communication on the internet. 4. Module Summary : At the end of the module, the student is able to a. describe the need to understand cyber law. This module contains two activities: Activity : Discussion on the reasons needed for cyber law. 3
  • 4. ICTL for Secondary School - Networks and The Internet Module Activity : Discussion On Reasons For The Need Of Cyber Law What is Cyber Law? Cyber law refers to any laws relating to protecting the Internet and other online communication technologies. The Cyber Law Acts In Malaysia The Malaysian Government has already passed several cyber laws to control and reduce Internet abuse. These cyber laws include: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Telemedicine Act 1997 • Communications and Multimedia Act 1998 Beside these cyber laws, there are three other cyber laws being drafted. • Private Data Protection Bill • Electronic Government Activities Bill • Electronic Transactions Bill Digital Signature Act 1997 Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data. Computer Crimes Act 1997 Gives protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks. Users can protect their rights to privacy and build trust in the computer system. The government can have control at a certain level over cyberspace to reduce cyber crime activities. 4
  • 5. ICTL for Secondary School - Networks and The Internet Module Telemedicine Act 1997 The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected. This act provides future development and delivery of healthcare in Malaysia. Communications And Multimedia Act 1998 The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia. Needs for Cyber Law CYBER LAW Integrity and Security of Information Legal Status of Online Transactions Privacy and Confidentially of Information Security of Government Data Intellectual Property Rights Examples of Cyber abuse on the users • sending a computer virus via e-mail • hacking into your school’s database to change your examination results. • selling pirated software in a night market 5
  • 6. ICTL for Secondary School - Networks and The Internet Module Worksheet : Write a short essay on the need of cyber law 6
  • 7. ICTL for Secondary School - Networks and The Internet Module Reference Cashman, S. (2006) Discovering Computers 2006. USA : Thomson Course Technology. Ibrahim Ahmad, Mohd Hafiz et al (2007) Information and Communication Technology (ICT) Based on SPM Syllabus. Selangor: Venton Publishing (M) Sdn Bhd. CD courseware ICT, Pusat Perkembangan Kurikulum. KPM http://www.wikipedia.org http://images.search.yahoo.com http://www.google.com.my 7