SlideShare a Scribd company logo
CYBER LAW

Submitted To:
Mr.
Bhupesh
Submitted By: Shobhit Krishan
Roll No: 11CS050 (B-45)
CYBER CRIME ~


In Simple language, we can define cyber crime,
that it is an act, against the law, wherein computer
is either a tool or a target both.



It involves theft, frauds, which has also given the
origin to a range of new age crimes that are
addressed by the Information Technology Act
2000.
WE CAN CATEGORIZE CYBER CRIME IN 2
WAYS ~
1. The computer as a target :- using a
computer to attack other computers.
Ex. Hacking, virus/worms.
2. The computer as weapon :- using a computer
to commit real world crimes.

Ex. Cyber terrorism, credit cards frauds.
SOME EXAMPLES OF CYBER CRIMES ~
Unauthorized access & Hacking :
Unauthorized access would therefore mean
any kind of access without the permission
of either the owner or the person in charge
of a computer system or computer network.
Every act committed towards breaking into
a computer or network is hacking. Hackers
use ready-made computer programs to
attack the target computer.
TROJAN ATTACK :
The program that act like something useful
but do the things that are quiet damping. The
programs of this kind are called as trojans. It
is popular from the name trojan horse
TCP/IP protocol is the usual protocol type
used for communications, but some functions
of the trojan use the UDP protocol as well.
WORMS AND VIRUSES :
A program that has capability to infect other
programs and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but spread
from computer to computer are called as
worms.
CYBER LAW
Cyber Law is the law governing cyber space.
Cyber space is a very wide term and includes
computers, networks, software, data storage
devices.
Law holds the rules of conduct :
That have been approved by the government,
which are in force over a certain territory, and
which must be obeyed by all persons on that
territory.
NEED FOR CYBER LAW

Cyberspace is an limitless dimension that is
impossible to govern and regulate using
conventional law.
Cyberspace is absolutely open for participation
by all.
A software source code worth crores of rupees or a
movie can be pirated across the globe within hours of
their release.
Hence, to stop this type of crime and to govern the
cyber space, various cyber laws were made.
HOW
CYBER LAW
CAME INTO
EXISTENCE ??
THE INFORMATION TECHNOLOGY ACT (2000)
The primary source of cyber law in India is the
Information Technology Act, 2000 (IT Act) which
came into force on 17 October 2000.
The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
the filing of electronic records with the Government.
The IT act also penalizes various cyber
crimes
and provides strict punishments
(imprisonment terms upto 10 years and
compensation up to rs 1 crore).
INFORMATION TECHNOLOGY (CERTIFYING
AUTHORITY) REGULATIONS, 2001 came into
force on 9 july 2001. They provide further
technical standards and procedures to be
used by a Certifying Authority.
Two important guidelines relating to certifying
authorities were issued :
1.

The first, are the guidelines for submission of
application for license to operate as a
certifying authority under the IT act. These
guidelines were issued on 9th july 2001.
2.

Next were the guidelines for submission of
certificates and certification lists to the
controller of certifying authorities for publishing In
national repository of digital certificates. These
were issued on 16th december 2002.
THANK
YOU


More Related Content

What's hot

What's hot (18)

Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792The E-Commerce Act - Republic Act 8792
The E-Commerce Act - Republic Act 8792
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 

Viewers also liked

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 

Viewers also liked (20)

An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Introduction 2017
Introduction 2017Introduction 2017
Introduction 2017
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
it act
it act it act
it act
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 

Similar to Cyber law

Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptxkumagirl
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 

Similar to Cyber law (20)

Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Cyber law

  • 1. CYBER LAW Submitted To: Mr. Bhupesh Submitted By: Shobhit Krishan Roll No: 11CS050 (B-45)
  • 2. CYBER CRIME ~  In Simple language, we can define cyber crime, that it is an act, against the law, wherein computer is either a tool or a target both.  It involves theft, frauds, which has also given the origin to a range of new age crimes that are addressed by the Information Technology Act 2000.
  • 3. WE CAN CATEGORIZE CYBER CRIME IN 2 WAYS ~ 1. The computer as a target :- using a computer to attack other computers. Ex. Hacking, virus/worms. 2. The computer as weapon :- using a computer to commit real world crimes. Ex. Cyber terrorism, credit cards frauds.
  • 4. SOME EXAMPLES OF CYBER CRIMES ~ Unauthorized access & Hacking : Unauthorized access would therefore mean any kind of access without the permission of either the owner or the person in charge of a computer system or computer network. Every act committed towards breaking into a computer or network is hacking. Hackers use ready-made computer programs to attack the target computer.
  • 5. TROJAN ATTACK : The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as trojans. It is popular from the name trojan horse TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojan use the UDP protocol as well.
  • 6. WORMS AND VIRUSES : A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 7. CYBER LAW Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices. Law holds the rules of conduct : That have been approved by the government, which are in force over a certain territory, and which must be obeyed by all persons on that territory.
  • 8. NEED FOR CYBER LAW Cyberspace is an limitless dimension that is impossible to govern and regulate using conventional law. Cyberspace is absolutely open for participation by all.
  • 9. A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release. Hence, to stop this type of crime and to govern the cyber space, various cyber laws were made.
  • 11. THE INFORMATION TECHNOLOGY ACT (2000) The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000. The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate the filing of electronic records with the Government.
  • 12. The IT act also penalizes various cyber crimes and provides strict punishments (imprisonment terms upto 10 years and compensation up to rs 1 crore). INFORMATION TECHNOLOGY (CERTIFYING AUTHORITY) REGULATIONS, 2001 came into force on 9 july 2001. They provide further technical standards and procedures to be used by a Certifying Authority.
  • 13. Two important guidelines relating to certifying authorities were issued : 1. The first, are the guidelines for submission of application for license to operate as a certifying authority under the IT act. These guidelines were issued on 9th july 2001. 2. Next were the guidelines for submission of certificates and certification lists to the controller of certifying authorities for publishing In national repository of digital certificates. These were issued on 16th december 2002.