2. CONTENTS
• What is cyber crime?
• Who are cyber criminal?
• What are cyber laws?
• Cyber laws in the world.
• How to prevent cyber crime?
3. Cyber Crime
Cybercrime is defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a tool to commit
an offense (child pornography, hate crimes). Cybercriminals may use
computer technology to access personal information, business trade
secrets or use the internet for exploitative or malicious purposes.
Cybercrime may also be referred to as computer crime.
Viruses, worms and industrial espionage, software piracy and hacking
are example where computers become the target of crime.
4. Categories and TYPES of Cyber Crime
• The computer as a target:-using a
computer to attack other computers. E.g.
Hacking, Virus/Worm attacks etc.
• The computer as a weapon:-using
computer to commit real world crimes.
E.g. Cyber terrorism, Credit card frauds
etc.
• Hacking
• Virus attack
• Credit card
fraud
• Phishing
• Cyber defamation
• Denial of service
attack
• Software
piracy
• Net
extortion
• Spoofing
• IRC crime
• Blue bugging
5. CYBER CRIMINALS
• Cybercriminals are individuals or teams of people who use
technology to commit malicious activities on digital systems or
networks with the intention of stealing sensitive company
information or personal data, and generating profit.
• They can be anyone of us like teenage, organized hacktivists,
disgruntled employees, professional hackers, terrorists.
6. Cyber Law is an attempt to apply laws designed for the physical
world to human activity on internet. They can be summarise as the
legal issues related to the use of communication technology
particularly the “cyberspace” i.e. internet.
It is an intersection of many legal fields like privacy, intellectual
property etc.
The abuse of computer has also given birth to new age crimes that
are addressed by the INFORMATION TECHNOLOGY ACT,2000.
7.
8. Encrypt all data
Continuously update software.
Use ad blockers
Set and communicate email response policies
Update, distribute and get signatures on acceptable use agreements