Sie sind auf Seite 1von 7

CYBER LAW INTRODUCTION: Cyber Law is the rapidly evolving area of civil and criminal law as applicable to the

use of computers, activities performed, and transactions conducted over the Internet and other networks.It is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.

CYBER CRIME: Any Crime which has been committed with the help of computer and telecommunication technology with the help of influencing the functioning of the computer and the computer system

INTERNATIONAL CYBER LAW: CYBER LAW IN THE USA:

Most perpetuated crime is copyright infringement due to illegal downloading. RIAA (Recording Industry Association of America) and MPAA (Motion Pictures Association of America) have sued many people for illegally obtaining material.In 2001, Napster. com was shut down after it lost a landmark case, which set the precedent for

future cases. US senate passed the CAN-SPAM act in 2003which allows legal action against spammers. The important point to remember is that financial engineer does not usually work alone. All the member of the team are carefully selected work together efficently and with the speed required by the solution.communication is considered to be the key element of Financial Engineering. Cyber Law in China:

China is criticized globally for its indiscriminate censorship of the Internet.Many popular sites like YouTube, BlogSpot Blogs, Live journal, Wikipedia etc. are blocked in China. Many bloggers have been arrested for protesting against the government through their blogs. Piracy is uncontrolled in China, because people cant afford to buy overpriced software and games.

Cyber Law in Canada:

Bills were passed in the 2000s dealing with identity theft, forgery of credit cards, unauthorized access among other things. Canada does not have a Online Copyright Protection act yet, but is about to pass a legislation which many have said to be use less and outdated. In 2000 a Canadian hacker calling himself Mafia Boy launched an attack against Yahoo!, Amazon. com, eBay etc. costing a total of USD$1.2 billion in damages. He was sentenced to 8months in prison and probation for a year.

ELECTRONIC AND DIGITAL SIGNATURE: Electronic signature" means an electronic or digital method of identification that is executed or adopted by a person with the intent to be bound by or to authenticate a record. A digital signature is a type of electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged

Hacking Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose .The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them

CYBER CRIMES: 1. Unauthorized access: This occurs when a user/hacker deliberately gets access into someone elses network either to monitor or data destruction purposes

2. Virus, Worms and Trojan attacks: Viruses are basically programs that are attached to a file which then gets circulated to other files and gradually to other computers in the network. Worms unlike Viruses do not need a host for attachments they make copies of themselves and do this repeatedly hence eating up all the memory of the computer. Trojans are unauthorized programs which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.

3. Email Bombing It refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing

4. Web Jacking This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website

CHALLENGES FACED BY LAW ENFORCEMENT: 1) Awareness: Technology is changing very rapidly. So does the increase in Cyber crimes, No proper awareness shared with regard to crime and latest tools. People are so

ignorant that makes it effortless for cyber criminals to attack. People fear to report crimes and some crimes are not properly recorded. The reason behind this is that the victim is either scared of police harassment or wrong media publicity. For minority and marginalised groups who already bear the brunt of media bias, reporting online harassment to the police may simply draw further unwanted attention. The public is not aware of the resources and services that law enforcement could provide them if being a victim of crime or witness

2) Technical Issues: Large amount of storage space required for storing the imaged evidences and also for storing retrieved evidence after analysis. Retrieved evidence might contain documents, pictures, videos and audio files which takes up a lot of space. Technical issues can further be categorised into software and hardware issues.

3) Software and Hardware Issues: The growth of Cyber crime as given rise to numerous Forensic software vendors. The challenge being to choose among them and no single forensic tool solves the entire case, there are loads of third party tools available. So is the case with Hardware tools, Most common and liable h/w tool is the FRED. But when it comes to Mobile forensics it is a challenge to decide the compatibility of different phones and which h/w to rely on..

4) Information sharing: Information sharing is a best practice and can be accomplished by a variety of means such as interacting with industry groups, attending briefings, meetings, seminars and conferences, and working actively with forensic bodies like CDAC..

5) Inadequate Training and Funds: Due to the growing of cyber forensic tools law enforcement does not get adequate training and awareness on innovative tools. Training bodies are limited and are pricey. Insufficient funding in order to send officers for training and investing on future enhancements. Transfers and recruiting officers adds to the loss of experienced staff and spending for training the newcomers. Cases become pending in such circumstances.

6) Wireless or Wi-Fi, Bluetooth, Infrared Issues: Latest wireless technologies which provide internet connections causes exploitation especially when it is not secured. This is the present technology terrorists and radical activists exploit. enforcement faces. This is another vulnerability that law

CONCLUSION: While there are several cases that have laid a foundation for cyber law, it is still in its infancy stage.Rules and regulations in countries have to be still more developed inorder to avoid the crimes which is being committed using latest technologies

Das könnte Ihnen auch gefallen