Cyber Crime

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

CYBER CRIME

Cyber Law
• Cyber law also termed as digital or internet law, which
basically provides the legal framework and regulations which
governs digital activities.
• It covers a wide range of issues like digital privacy and the
prevention and prosecution of cybercrime.
• Cyber law provides a framework for protecting individuals
and organizations from cyber threats , ensuring the privacy
and security of digital transactions, and establishing crucial
guidelines for ethical and legal conduct in cyberspace.
Need of Cyber Law
1. For providing protection against cybercrimes: The Cyber law
acts as a deterrent by offering legal recourse and prescribing
penalties for various cybercrime. Helps to curb illegal online
activities and provides a safer digital environment for individuals
and business alike.
2. For e-commerce regulation: Cyber laws defines rules for online
transactions, contracts, and consumer protection, thereby fostering a
fair and secure online marketplace.
3. For protecting intellectual property rights: In the digital age, the
unauthorized reproduction and distribution of copyrighted materials such
as software, music, movies, and books are rampant. Cyber law helps
protect intellectual property rights by preventing piracy and penalizing
copyright infringement.

4. For Cybersecurity: Cyber laws are vital in protecting critical


infrastructure such as banking systems, healthcare networks, power grids,
and government services from cyberattacks. By mandating cybersecurity
standards and best practices, cyber laws ensure that organizations are
equipped to defend against threats.
Cyber Safety
• Cyber safety refers to the practices and measures that individuals and
organizations take to protect themselves from risks and dangers that
arise from online activities. It focuses on ensuring safe behaviour
while interacting with digital devices, the internet, and online
platforms. Cyber safety is primarily concerned with the personal well-
being of users in the digital world, protecting them from harm and
ensuring their digital interactions are secure.
Key facets of Cyber safety

1. Personal Information Protection


2. Safe Online Behaviour
3. Avoiding Cyberbullying and Online Harassment
4. Parental Controls and Online Safety for Children
Cyber Security
• Cyber security refers to the practice of protecting computers,
networks, servers, mobile devices, data, and other digital systems from
malicious attacks, damage, or unauthorized access. It focuses on
safeguarding the integrity, confidentiality, and availability of
information and systems against a wide range of cyber threats.
• Cyber security is the application of technologies, processes, and
controls to protect systems, networks, programs, devices and data
from cyber attacks.
• It aims to reduce the risk of cyber attacks and protect against the
unauthorised exploitation of systems, networks, and technologies.
Key Facet of Cyber security
1. Network Security
2. Information Security
3. Application Security
4. Threat Intelligence and Monitoring
Difference between Cyber safety and Cyber Security

S.No. Cyber safety Cyber Security

1 Cyber safety is more focused on Cyber security is concerned with the


protecting individuals and their protection of systems, networks, and data
personal information from from cyber threats.
dangers in the online world
2 Cyber safety involves user Cyber security involves technical
behaviour, safe online practices, measures, security protocols, and
and awareness organizational policies to defend against
attacks.
Cyber Crime
• The oxford Dictionary defined the term Cyber Crime as “Criminal
activities carried out by means of computers or the Internet”.
• Cyber Crime means any criminal or other offence that is facilitated by
or involves the use of electronic communications or information
systems, including any device or the Internet or any one or more of
them.
• Cyber Crime can halt any railway where it is.
• It may cause any important military data to fall in the hands of foreign
countries.
Child Pornography or Child Sexually Abusive
Material (CSAM )

• Child pornography is defined in a manner that covers any depiction of minors


in a sexual context, regardless of whether the child consents. Minors cannot
legally consent to being involved in such material.
• Child pornography represents a form of sexual exploitation and abuse of
minors. The creation, distribution, and consumption of such material are
considered criminal acts globally.
• Child Sexually Abusive Material (CSAM) refers to any content, including
images, videos, or other media, that depicts a minor (typically defined as a
person under the age of 18) involved in sexually explicit activities or being
sexually exploited. This content is created, distributed, and possessed for the
purpose of sexual gratification or exploitation, and it represents a severe
violation of the rights and dignity of the child.
Specific types of Cyber Crimes

1. Cyberbullying: Is the use of technology to harass, threaten,


embarrass, or target another person.

2. Cyberstalking: a crime committed when someone uses the internet


and other technologies to harass or stalk another person online.

3. Cyber grooming: refers to the process by which an individual, often


an adult, uses the internet to establish an emotional connection with a
child in order to gain their trust and prepare them for sexual exploitation.
Conti..

• Online job fraud: a type of employment fraud where scammers


pretend to be hiring on behalf of companies, recruitment agencies, or
online shopping platforms to steal your money and identity details.

• Online sextortion: occurs when a fraudster threatens to circulate your


private and sensitive material online, if you do not provide images of a
sexual nature, sexual favours, or money.
• Phishing: Phishing is a type of cyber crime where malicious
individuals (called phishers) attempt to trick victims into sharing
sensitive information, such as passwords, credit card numbers, or other
personal data. This is typically done by impersonating a legitimate
entity, such as a bank, through emails.

• Vishing: Vishing, short for “voice phishing,” is a type of phishing


attack that uses phone calls to deceive victims into revealing sensitive
information. Like ATM pin, card expiry date, cvv etc.
• Smishing: attack that uses fake mobile text messages to trick people
into downloading malware, sharing sensitive information or sending
money to cybercriminals.
• Credit card or debit card fraud: Involves unauthorized use of
another’s credit card or debit card information for the purpose of
purchases or withdrawing funds from it.
• Impersonation and identity theft: is an act of fraudulently or
dishonestly making use of the electronic signature, password or any
other unique identification feature of any other person.

You might also like