0% found this document useful (0 votes)
145 views5 pages

Unit - 6: C C C L 6.1 Cyber Crime

The document discusses various types of cyber crimes including hacking, digital forgery, cyber stalking/harassment, cyber pornography, identity theft and fraud, cyber terrorism, and cyber defamation. It also covers cyber laws, the need for cyber laws, categories of cyber laws, and compliance standards for information security management.

Uploaded by

Shubham Palaskar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views5 pages

Unit - 6: C C C L 6.1 Cyber Crime

The document discusses various types of cyber crimes including hacking, digital forgery, cyber stalking/harassment, cyber pornography, identity theft and fraud, cyber terrorism, and cyber defamation. It also covers cyber laws, the need for cyber laws, categories of cyber laws, and compliance standards for information security management.

Uploaded by

Shubham Palaskar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIT - 6

CYBER CRIME AND CYBER LAWS

6.1 Cyber Crime

INTRODUCTION:

• Cybercrime refers to any criminal activity that involves the use of digital
technology, such as computers, networks, or the internet.
• Cybercrime can take many forms, including hacking, identity theft,
cyberstalking, cyberterrorism, and more.
• It is a growing problem that affects individuals, businesses, and
governments worldwide.

HACKING:
Hacking is the act of gaining unauthorized access to a computer system or
network. These intrusions are often conducted in order to launch malicious
programs known as viruses, worms, and Trojan Horses that can shutdown or
destroy an entire computer network.

A hacker is someone who nd out and exploits the weaknesses of a


computer system or network. Hackers can use a different techniques to gain
access to a system, such as brute force attacks. Hacking is also carried out as
a way to take credit card numbers, internet passwords, and other personal
information

DIGITAL FORGERY:
Forgery has been de ned as the crime of falsely altering or manipulating a
document with the intension of misleading others. It may include the
production of falsi ed documents or counterfeited items.

Digital forgery is falsely altering digital contents such as pictures, images,


documents, and music perhaps for economic gain. It may involve electronic
forgery and identity theft. For example, images of children (child
pornography) involved in sexually explicit conduct can be created from
innocent images, or even without the involvement of an actual child.

UNIT 6 CYBER CRIME & CYBER LAWS 1


fi
fi
fi
CYBER STALKING/HARASSMENT:

• Cyber Stalking/Harassment refers to using the internet or other electronic


means to harass or stalk someone.
• It can involve sending threatening messages, monitoring someone's online
activity, or using social media to spread false information.
• Cyber Stalking/Harassment is a serious crime and can have serious
psychological and emotional effects on the victim.

CYBER PORNOGRAPHY:

• Cyber pornography refers to the distribution or creation of sexually explicit


content using digital technology. It can involve images, videos, or live
streaming of sexual acts.
• The crime of child pornography includes the possession, production,
distribution or sale of pornographic images or videos that exploit or portray
children.

IDENTITY THEFT & FRAUD:


Identity theft is a speci c form of fraud in which cybercriminals steal
personal data, including passwords, data about the bank account, credit
cards, debit cards, and other sensitive information. Through identity theft
criminals can steal money.

Fraud is a term used to describe a cybercrime that intends to deceive a


person in order to gain important data or information. Fraud can be done by
altering, destroying, stealing, or suppressing any information to secure
unlawful or unfair gain.

CYBER TERRORISM:

• Cyber Terrorism refers to using the internet or other electronic means to


carry out terrorist activities.
• It can involve disrupting critical infrastructure, spreading propaganda, or
stealing sensitive information.
• Cyber terrorist will target the banking industry, military installations, power
plants, air traf c control centers and water systems.

UNIT 6 CYBER CRIME & CYBER LAWS 2


fi
fi
CYBER DEFAMATION:

• Cyber Defamation refers to spreading false or defamatory information about


someone over the internet.
• It can involve posting negative reviews, spreading rumours, or creating fake
social media pro les.
• The following are mediums by which cyber defamation can be committed:
‣ World Wide Web
‣ Discussion groups
‣ Intranets
‣ Social Media
‣ E-mail

OS FINGERPRINTING:

• OS ngerprinting refers to the technique of identifying the operating system


running on a remote computer system or network.
• OS ngerprinting can be used by hackers to identify vulnerabilities in the
system and launch attacks.
• OS ngerprinting is also used by security professionals to identify and patch
vulnerabilities before they can be exploited.

6.2 Cyber Laws

INTRODUCTION:
• Cyber laws refer to the laws that govern the use of digital technology,
including computers, networks, and the internet.
• Cyber laws are designed to protect individuals and organizations from
various forms of cybercrime, such as hacking, identity theft, cyberstalking,
and more.
• Cyber laws are essential for promoting a safe and secure digital
environment.
• Cyber law includes laws relating to:
‣ Cyber Crimes
‣ Intellectual Property
‣ Data Protection and Privacy
‣ Electronic and Digital Signatures

UNIT 6 CYBER CRIME & CYBER LAWS 3


fi
fi
fi
fi
NEED FOR CYBER LAWS:
• With the rapid growth of digital technology, cybercrime has become a major
threat to individuals, organizations, and governments worldwide.
• Cyber laws are needed to address the unique challenges posed by digital
technology and to ensure that individuals and organizations are protected
from cybercrime.
• Cyber laws are essential for promoting a safe and secure digital environment
and for protecting the privacy and security of individuals and organizations.

CATEGORIES OF CYBER LAWS:


1. CRIMES AGAINST INDIVIDUALS:
These crimes include cyber harassment and stalking, distribution of child
pornography, credit card fraud, human traf cking, spoo ng, identity theft,
and online libel or slander.

2. CRIME AGAINST GOVERNMENT:


When a cyber crime is committed against the government, it is considered
an attack on that nation's security. Cybercrimes against the government
include hacking, accessing con dential information, cyber warfare, cyber
terrorism, and pirated software.

3. CRIME AGAINST PROPERTY:


Some online crimes occur against property, such as a computer or server.
These crimes include DDOS attacks, hacking, virus transmission, cyber and
typo squatting, computer vandalism, copyright infringement, and IPR
violations.

UNIT 6 CYBER CRIME & CYBER LAWS 4


fi
fi
fi
6.3 Compliance Standards
A number of governments and organizations have set up benchmarks,
standards and legal regulations on information security to help ensure an
adequate level of security is maintained, resources are used in the right way,
and the best security practices are adopted.

Such practices can come from various sources and frameworks like ITIL,
COBIT and CMMI, standards like ISO/IEC 20000 and ISO 9000, and by
suf cient knowledge of people and organizations.

IMPLEMENTING AN INFORMATION SECURITY MANAGEMENT SYSTEM


(ISMS):
An Information Security Management System (ISMS) is a set of policies and
procedures which speci es the instruments and methods that the management
should use to clearly manage (plan, adopt, implement, supervise and improve)
the tasks and activities aimed at achieving information security.

The main objective of ISMS is to provide systematic approach for managing an


organization's sensitive information in order to protect it. ISMS involves the
following essential components:
‣ Personal
‣ Processes
‣ Information

UNIT 6 CYBER CRIME & CYBER LAWS 5


fi
fi

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy