SlideShare a Scribd company logo
CYBER POLICY - CYBER
LAWS
E ESTHER
Cyber policy
Cyber policy regulates all aspects of digital data exchange, including the internet, data
privacy and network usage as well as cyber defense
Cyber policy must strike a balance between necessary regulation and social freedom ,
home users small, medium, and large Enterprises ,Government and non-government
entities
It serves as an authority framework that defines and guides the activities associated
with the security of cyberspace. It allows all sectors and organizations in designing
suitable cybersecurity policies to meet their requirements. The policy provides an
outline to effectively protect information, information systems and networks.
Cyber laws
The advent of internet connection across the global scale has enable millions of user to connect
via computer. Many users may misuse the network by performing illegal activity on the
computer and targets the security of the system and data such activity is termed as cyber crime
Cyber crime can be defined as a criminal activity doing things like stealing the personal
information of the business trade secrets or other malicious purpose, they obtain these
information by hacking , spamming and phishing
Various types of Cyber Crime
➔ Cyberspace the term cyberspace was coined by WILLIAM GIBSON in his book
NEUROMANCER 1984, It is a worldwide network of computers that uses internet
for communication, transmission and exchange of data, chatting , research ,
exploring and play , It is a large computer network made up of many worldwide
computer networks that employ TCP/IP PROTOCOL to aid in communications
and data exchange activities
➔ CyberSquatting is a type of crime where in the hackers register sells and uses
domain name of some company with the aim of gaining profit from the goodwill Of
its trade mark
➔ Cyberpunk and cyber warfare in terms of technology the cyber punk is coined as cyber
and punk it signifies two primary aspects of cyber punk i.e., technology and individualism.
the purpose of referring it as a cyberpunk is to specify the side by side position of punk
attitudes and high technology.
➔ Cyber warfare refers to a conflict based on internet. It includes malicious attacks on info
and information systems , attacks are capable of disabling official websites and networks
and disrupting essential services
➔ Cyber terrorism is an internet based attacks in terrorist activities , it is referred to as a
deliberate usage of computer networks and public internet in order to effect the personal
objectives by using tools such as computer virus
Cyber crime
scenario in INDIA -
IT ACT
Act and Sections: All Cyber
Crimes do not come under
the Information Technology
Act, 2000. To deal new type
of cyber-crimes such as
tampering of source code,
hacking, and publication of
obscene information in
electronic form, the new act
can be invoked.
The term cyberCrime is not being defined by the indian law , even after
amendment made in the IPC act of IT 2000, while on the other hand chapter XI of
Indian ITA act deals with offences relating to cyber crimes , the offenses which
falls under chapter XI of the Indian ITA 2000 act,
★ Interfering with the computer source code or computer source documents
★ Using others information without permission ex: Hacking
★ Practising breach of confidentiality and privacy
★ Issuing digital signature certificate with fraudulent motives
★ Misrepresenting facts to acquire the license of Certifying Authority or any
Digital Signature
National cyber security policy
The national cyber security policy 2013 was build to achieve protection
against information , its infrastructure and to make the system capable of
handling treats associated with cyber crime
Objectives of NCSP 2013
● To provide platform with which protection can be provided at all times
(24*7) with appropriate security mechanisms that can be operated all the
times
● Imposing various laws for illegal activities involved in cyber space system
● To make organizations elect a chief information security officer who
handles all the security related activities associated with cyber space

More Related Content

What's hot

Cyber law
Cyber lawCyber law
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
It act chapter 8
It act chapter 8It act chapter 8
It act chapter 8
Yash Kansal
 
Cyber law
Cyber lawCyber law
Cyber law
Shobhit Krishan
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Cyber laws
Cyber lawsCyber laws
Cyberlaw
CyberlawCyberlaw
Cyberlaw
ambadesuhas
 
IT Act
IT ActIT Act
cyber crime
cyber crime cyber crime
cyber crime
christovinod
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Miz Malinz
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
n|u - The Open Security Community
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
shanueduthoughts
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Muktadir Shoaib
 
Internet
InternetInternet
Internet
Jodip
 
Cyber security
Cyber security Cyber security
Cyber security
REVA UNIVERSITY
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
maneeshchandran1
 

What's hot (19)

Cyber law
Cyber lawCyber law
Cyber law
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
It act chapter 8
It act chapter 8It act chapter 8
It act chapter 8
 
Cyber law
Cyber lawCyber law
Cyber law
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
IT Act
IT ActIT Act
IT Act
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet
InternetInternet
Internet
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyberlaws
CyberlawsCyberlaws
Cyberlaws
 

Similar to Cyberpolicy laws

Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
Harini Sai
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
mohdadil02912
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
senguptasouvik99
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
kumagirl
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
kratoskkd
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
ManuGupta344215
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
buraq karim.pptx
buraq karim.pptxburaq karim.pptx
buraq karim.pptx
BuraqKarim
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
Shylesh BC
 

Similar to Cyberpolicy laws (20)

Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Cyber Law and IT act.pptx
 Cyber Law and IT act.pptx Cyber Law and IT act.pptx
Cyber Law and IT act.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
English in written
English in writtenEnglish in written
English in written
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
buraq karim.pptx
buraq karim.pptxburaq karim.pptx
buraq karim.pptx
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 

Recently uploaded

ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 

Recently uploaded (20)

ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 

Cyberpolicy laws

  • 1. CYBER POLICY - CYBER LAWS E ESTHER
  • 2. Cyber policy Cyber policy regulates all aspects of digital data exchange, including the internet, data privacy and network usage as well as cyber defense Cyber policy must strike a balance between necessary regulation and social freedom , home users small, medium, and large Enterprises ,Government and non-government entities It serves as an authority framework that defines and guides the activities associated with the security of cyberspace. It allows all sectors and organizations in designing suitable cybersecurity policies to meet their requirements. The policy provides an outline to effectively protect information, information systems and networks.
  • 3. Cyber laws The advent of internet connection across the global scale has enable millions of user to connect via computer. Many users may misuse the network by performing illegal activity on the computer and targets the security of the system and data such activity is termed as cyber crime Cyber crime can be defined as a criminal activity doing things like stealing the personal information of the business trade secrets or other malicious purpose, they obtain these information by hacking , spamming and phishing
  • 4. Various types of Cyber Crime ➔ Cyberspace the term cyberspace was coined by WILLIAM GIBSON in his book NEUROMANCER 1984, It is a worldwide network of computers that uses internet for communication, transmission and exchange of data, chatting , research , exploring and play , It is a large computer network made up of many worldwide computer networks that employ TCP/IP PROTOCOL to aid in communications and data exchange activities ➔ CyberSquatting is a type of crime where in the hackers register sells and uses domain name of some company with the aim of gaining profit from the goodwill Of its trade mark
  • 5. ➔ Cyberpunk and cyber warfare in terms of technology the cyber punk is coined as cyber and punk it signifies two primary aspects of cyber punk i.e., technology and individualism. the purpose of referring it as a cyberpunk is to specify the side by side position of punk attitudes and high technology. ➔ Cyber warfare refers to a conflict based on internet. It includes malicious attacks on info and information systems , attacks are capable of disabling official websites and networks and disrupting essential services ➔ Cyber terrorism is an internet based attacks in terrorist activities , it is referred to as a deliberate usage of computer networks and public internet in order to effect the personal objectives by using tools such as computer virus
  • 6. Cyber crime scenario in INDIA - IT ACT Act and Sections: All Cyber Crimes do not come under the Information Technology Act, 2000. To deal new type of cyber-crimes such as tampering of source code, hacking, and publication of obscene information in electronic form, the new act can be invoked.
  • 7.
  • 8.
  • 9.
  • 10. The term cyberCrime is not being defined by the indian law , even after amendment made in the IPC act of IT 2000, while on the other hand chapter XI of Indian ITA act deals with offences relating to cyber crimes , the offenses which falls under chapter XI of the Indian ITA 2000 act, ★ Interfering with the computer source code or computer source documents ★ Using others information without permission ex: Hacking ★ Practising breach of confidentiality and privacy ★ Issuing digital signature certificate with fraudulent motives ★ Misrepresenting facts to acquire the license of Certifying Authority or any Digital Signature
  • 11. National cyber security policy The national cyber security policy 2013 was build to achieve protection against information , its infrastructure and to make the system capable of handling treats associated with cyber crime Objectives of NCSP 2013 ● To provide platform with which protection can be provided at all times (24*7) with appropriate security mechanisms that can be operated all the times ● Imposing various laws for illegal activities involved in cyber space system ● To make organizations elect a chief information security officer who handles all the security related activities associated with cyber space