Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber law


Published on

Published in: Technology
  • Be the first to comment

Cyber law

  1. 1. CYBER LAW Submitted To: Mr. Bhupesh Submitted By: Shobhit Krishan Roll No: 11CS050 (B-45)
  2. 2. CYBER CRIME ~  In Simple language, we can define cyber crime, that it is an act, against the law, wherein computer is either a tool or a target both.  It involves theft, frauds, which has also given the origin to a range of new age crimes that are addressed by the Information Technology Act 2000.
  3. 3. WE CAN CATEGORIZE CYBER CRIME IN 2 WAYS ~ 1. The computer as a target :- using a computer to attack other computers. Ex. Hacking, virus/worms. 2. The computer as weapon :- using a computer to commit real world crimes. Ex. Cyber terrorism, credit cards frauds.
  4. 4. SOME EXAMPLES OF CYBER CRIMES ~ Unauthorized access & Hacking : Unauthorized access would therefore mean any kind of access without the permission of either the owner or the person in charge of a computer system or computer network. Every act committed towards breaking into a computer or network is hacking. Hackers use ready-made computer programs to attack the target computer.
  5. 5. TROJAN ATTACK : The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as trojans. It is popular from the name trojan horse TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojan use the UDP protocol as well.
  6. 6. WORMS AND VIRUSES : A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  7. 7. CYBER LAW Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices. Law holds the rules of conduct : That have been approved by the government, which are in force over a certain territory, and which must be obeyed by all persons on that territory.
  8. 8. NEED FOR CYBER LAW Cyberspace is an limitless dimension that is impossible to govern and regulate using conventional law. Cyberspace is absolutely open for participation by all.
  9. 9. A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release. Hence, to stop this type of crime and to govern the cyber space, various cyber laws were made.
  11. 11. THE INFORMATION TECHNOLOGY ACT (2000) The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000. The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate the filing of electronic records with the Government.
  12. 12. The IT act also penalizes various cyber crimes and provides strict punishments (imprisonment terms upto 10 years and compensation up to rs 1 crore). INFORMATION TECHNOLOGY (CERTIFYING AUTHORITY) REGULATIONS, 2001 came into force on 9 july 2001. They provide further technical standards and procedures to be used by a Certifying Authority.
  13. 13. Two important guidelines relating to certifying authorities were issued : 1. The first, are the guidelines for submission of application for license to operate as a certifying authority under the IT act. These guidelines were issued on 9th july 2001. 2. Next were the guidelines for submission of certificates and certification lists to the controller of certifying authorities for publishing In national repository of digital certificates. These were issued on 16th december 2002.
  14. 14. THANK YOU 