0% found this document useful (0 votes)
17 views15 pages

Cyber Ethics

Uploaded by

motichain2000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views15 pages

Cyber Ethics

Uploaded by

motichain2000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

CYBER

ETHICS
BY:- HARSH SHARMA
BCA 3rd SEMESTER
00627102021​
WHAT IS CYBER
ETHICS?
The term "cyber ethics" refers to a set of moral rules or a
code of behaviour applied to the online environment.
Ethics, in general, refers to propagating good behavior,
similarly by cyber ethics we refer to propagating good
behavior online that is not harsh or rude. Cyberethics
governs rules that individuals must be polite and
responsible when they use the internet. Cyberethics aim to
protect the moral, financial, social behavior of individuals.

2
EMERGENCE OF
CYBER SPACE
The term cyberspace was first used by the American-
Canadian author William Gibson in 1982.
Cyberspace is a concept describing a widespread
interconnected digital technology. "The expression dates
back from the first decade of the diffusion of the internet. It
refers to the online world as a world 'apart', as distinct from
everyday reality.

3
CYBER
JURISPRUDENCE
Cyber jurisprudence is the study of laws which is directly
related to cyber crimes. Cyber jurisprudence also describes
the principles of legal issue, which exclusively regulates the
cyberspace and internet.
It encompasses a wide range of topics, including freedom
of speech, privacy, intellectual property, and cybercrime.

4
CYBER LAW
Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device. Most
cybercrime is committed by cybercriminals or hackers who
want to make money. However, occasionally cybercrime
aims to damage computers or networks for reasons other
than profit.

5

THE IMORTANCE
OF CYBER LAW IN
INDIA

6 Presentation title

20XX
IMPORTANCE OF CYBER LAW
•It allows employees to work safely – with the help of
cyberlaw, you and the employees of your company haven’t got
any risk from a potential cyberattack. If your system becomes
infected than that can really hamper their productivity.
•It can protect your business – This is one of the biggest
factors, because of which cyber law is very important. It allows
the employees to surf the internet as and when they require it.
You have to ensure that they can’t at risk from potential
threats.
•It protects the personal information of the user – One of
the most important factors in the digital world is to keep your
personal information secret. It is very essential for the
customer that they are quite capable of selling the information.
•It protects productivity – There are many viruses present
which can slow down your personal computer. It may often
bring your personal business to a standstill.

7
SIGNIFICANCE OF
CYBER ETHICS
• Cyber ethics is a branch of applied ethics that examines moral,
legal, and social issues at the intersection of computer/
information and communication technologies.
• The Centre for Internet Security has defined cyber ethics as "the
code of responsible behaviour on the Internet.“
• "Cyber ethics" refers to the code of responsible behavior on the
Internet. Just as we are taught to act responsibly in everyday life
with lessons such as "Don't take what doesn't belong to you" and
"Do not harm others," we must act responsibly in the cyber world
as well.
• The basic rule is "Do not do something in cyberspace that you
would consider wrong or illegal in everyday life."

8
CYBER SPACE –
WEB SPACE
The web space, also known as storage space or disk
space, generally refers to the amount of space on a
web server that is allocated to website owners by the
web hosting companies. It is made up of the total
quantity of all text files, images, scripts, databases,
emails and other files related to your website.

9
WEB HOSTING
A web hosting is a type of Internet hosting service that
hosts websites for clients, i.e. it offers the facilities
required for them to create and maintain a site and
makes it accessible on the World Wide Web.
Companies providing web hosting services are
sometimes called web hosts.

10
WEB
DEVELOPMENT
AGGREMENT
A Website Development Agreement is a contract
between a company/business and the web developer.
The agreement lists the responsibilities and tasks of
the web developer, the liability of the company, terms
and conditions, website warranties and
representations, and the assignment of duties.

11
CYBER ATTACKS
Cyber attacks occur when an individual, group, or organized
gang attempts to maliciously breach the security system of
another person or organization. While this might prompt you
to envision hackers breaking into an online banking system
to steal billions.
Types of cyber attacks:-
•Malware Attack.
•Phishing Attack.
•Password Attack.
•Man-in-the-Middle Attack.
•SQL Injection Attack.
•Cryptojacking.

12
CYBER SECURITY
Computer security, cybersecurity (cyber security),
or information technology security (IT security) is the
protection of computer systems and networks from attack by
malicious actors that may result in unauthorized information
disclosure, theft of, or damage to hardware, software,
or data, as well as from the disruption or misdirection of the
services they provide.

13
PRIVACY ISSUES
There are many privacy issues related to information
technology, such as electronic surveillance, which
involves monitoring people with technology, often
without their knowledge. In addition, companies often
share or sell personal information to other companies.
Identity theft is also an important privacy issue. Privacy
is only an issue to the extent that it involves the use,
disclosure, etc. of personal information.

14
INTELLECTUAL
PROPERTY ISSUES
The most common types of intellectual property disputes are
likely to be related to either copyright infringement, trademark
infringement, or patent infringement.Ethical issues regarding
intellectual property frequently arise in IPRO projects
concerning how group member's contributions should be
measured and rewarded if the research project results in a
patent, how businesses, advisors, and other institutions may
have a claim to intellectual property resulting from projects

15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy