Sie sind auf Seite 1von 12

CYBER CRIME, CYBER

LAW AND CYBER ETHICS

PRABESH SHRESTHA
CYBER CRIME

 Refers to the use of computer technology for illegal


purposes or for unauthorized access of the
computer system with intention of damaging,
deleting or altering the data present in the
computer without the permission of the actual user.
TYPES OF CYBER CRIME

 Cyber Stalking: using internet or other electronic


means to stalk or harass individual, group or a
company
 Cyber Contraband: transferring illegal items
through the internet that are banned in some
countries like drugs, animal skin, etc.
 Cyber laundering: electronic transfer of illegally
obtained money so as to hide its source or
destination
 Cyber terrorism: terrorist activity intended to
damage or disrupt vital computer systems,
personal or public property etc
 Cyber theft: act of using the internet to steal any
property or to interfere with someone’s use and
enjoyment of property
 Hacking: activity of breaking into some other’s
computer system or entering into some other’s
personal account without the consent of the actual
user
 Phishing: activity of getting sensitive information
like passwords of online account, pin numbers of
ATM cards, Debit Cards, Credit Cards by showing
some kind of greed by sending e-mails, text
messages etc
 Virus: computer program that can harm the
computer system and replicate without the
knowledge of the system users
 Identity theft: activity of bearing other peoples’
identity and obtaining their personal or financial
information to make transaction or purchases
 Piracy: illegal copying, distribution or use of the
software, audio or video
ABOUT CYBER LAW IN NEPAL

 Cyber Law of Nepal is commonly known as


Electronic Transaction and Digital
Signature Act- Ordinance enacted in 2061 BS
(2004AD)
 Helps to legalize the different trading activities
through the global computer network and to enhance
the e-governance activities
 Set of moral principles that regulate the use of
computers
 Ten commandments issued by Cyber Ethics
Institute are as follows:
1. Do not use a computer to harm other
people.
2. Do not interfere with other people's
computer work.
3. Do not snoop around in other people's
computer files.
4. Do not use a computer to steal.
5. Do not use a computer to bear false
witness.
6. Do not copy or use proprietary
software for which you have not paid
(without permission).
7. Do not use other people's computer
resources without authorization or
proper compensation.
8. Do not appropriate other people's
intellectual output.
9. Always think about the social
consequences of the program you are
writing or the system you are designing.
10. Always use a computer in ways that
ensure consideration and respect for
your fellow humans.

Das könnte Ihnen auch gefallen