SlideShare a Scribd company logo
SARDAR PATEL COLLEGE OF ENGINEERING, BAKROL
CYBER SECURITY
 TOPIC : INTRODUCTION OF CYBER CRIME AND LAW
 SUBJECT CODE : 2150002
 PREPARED BY : BHAVIN PATEL[151240119028]
 FACULTY ADVISER : PROF. SHITAL MEHTA
Content
 Introduction
 Cyber crime
 History
 Classification of cybercrime
 Types of Cybercrime
 Cyber Law
 Forms of Cybercrime
 Conclusion
Introduction
 Technology is growing at lightening speed. While the
technology brings lots of good things, it also brings equal
amount of risk and challenges.
 Everyday, we read in the newspapers about the various
cyber crimes like credit card Frauds, spoofing, phishing,
etc.
Cybercrime
 Crime committed using a computer and the
internet to steal data or information.
 Cybercrime is nothing but where the computer
used as an object or subject of crime.
History
First Record in the history of
cybercrime took place in 1820.
Classification of Cyber Crime
The Computer as a Target
The Computer as a weapon
Types of CyberCrime
1. Hacking
2. Denial of Service attack
3. Virus Circulation (virus dissemination)
4. Computer Destruction ( computer vandalism)
5. Cyber Terrorism
6. Software Piracy
Hacking
 Hacking can be defined as illegal disturbance into
a computer system and network.
Denial of Service attack
 In DOS the attacker sends continuous request to the
server.
 The server has limits to accept the request.
 Once the server gets overloaded and if the authorized
person sends request to that server then the request will be
received by attacker.
Virus Circulation
A Harmful Software that attaches itself
to software.
Such as virus, worms, Logic bomb, Time
bomb, etc.
Computer Destruction
 The name itself defines that destroying data rather
then stealing.
 By transmitting virus.
Cyber Terrorism
Using internet based attacks in terrorism
activities.
Software Piracy
Software Piracy can be defined as illegal
copying of genuine programs.
CYBER LAW
 Law governing cyber space
 Cyber law Covers laws relating to:
 Cyber Crimes
 Electronic and Digital Signatures
 Data Protection and Privacy
Cybercrime Forms
1) E-mail spoofing
2) Spamming
3) Cyber vilification
4) Internet Time Theft
6) Web Jacking
7) Newsgroup Spam
8) Identity Theft
9) Industrial Spying
10) Hacking
11) Online Frauds
12) Software Privacy
13)Email Bombing/Mail Bombs
14) Password Sniffing
15) Credit Card Frauds
Conclusion
Introduction to cyber crime & law

More Related Content

What's hot

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 

What's hot (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 

Similar to Introduction to cyber crime & law

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rishabh Jain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
BigBoss647822
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
ananthu07
 
cyber crime
 cyber crime cyber crime
cyber crime
sonalpandey11
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Muddasarahmed5
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
Yagnesh Garud
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary

Similar to Introduction to cyber crime & law (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
cyber crime
 cyber crime cyber crime
cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Introduction to cyber crime & law

  • 1. SARDAR PATEL COLLEGE OF ENGINEERING, BAKROL CYBER SECURITY  TOPIC : INTRODUCTION OF CYBER CRIME AND LAW  SUBJECT CODE : 2150002  PREPARED BY : BHAVIN PATEL[151240119028]  FACULTY ADVISER : PROF. SHITAL MEHTA
  • 2. Content  Introduction  Cyber crime  History  Classification of cybercrime  Types of Cybercrime  Cyber Law  Forms of Cybercrime  Conclusion
  • 3. Introduction  Technology is growing at lightening speed. While the technology brings lots of good things, it also brings equal amount of risk and challenges.  Everyday, we read in the newspapers about the various cyber crimes like credit card Frauds, spoofing, phishing, etc.
  • 4. Cybercrime  Crime committed using a computer and the internet to steal data or information.  Cybercrime is nothing but where the computer used as an object or subject of crime.
  • 5. History First Record in the history of cybercrime took place in 1820.
  • 6. Classification of Cyber Crime The Computer as a Target The Computer as a weapon
  • 7. Types of CyberCrime 1. Hacking 2. Denial of Service attack 3. Virus Circulation (virus dissemination) 4. Computer Destruction ( computer vandalism) 5. Cyber Terrorism 6. Software Piracy
  • 8. Hacking  Hacking can be defined as illegal disturbance into a computer system and network.
  • 9. Denial of Service attack  In DOS the attacker sends continuous request to the server.  The server has limits to accept the request.  Once the server gets overloaded and if the authorized person sends request to that server then the request will be received by attacker.
  • 10. Virus Circulation A Harmful Software that attaches itself to software. Such as virus, worms, Logic bomb, Time bomb, etc.
  • 11. Computer Destruction  The name itself defines that destroying data rather then stealing.  By transmitting virus.
  • 12. Cyber Terrorism Using internet based attacks in terrorism activities.
  • 13. Software Piracy Software Piracy can be defined as illegal copying of genuine programs.
  • 14. CYBER LAW  Law governing cyber space  Cyber law Covers laws relating to:  Cyber Crimes  Electronic and Digital Signatures  Data Protection and Privacy
  • 15. Cybercrime Forms 1) E-mail spoofing 2) Spamming 3) Cyber vilification 4) Internet Time Theft 6) Web Jacking 7) Newsgroup Spam 8) Identity Theft 9) Industrial Spying 10) Hacking 11) Online Frauds 12) Software Privacy 13)Email Bombing/Mail Bombs 14) Password Sniffing 15) Credit Card Frauds