Sie sind auf Seite 1von 40

L.D.

COLLEGE OF ENGINEERING
CHEMICAL DEPARTMENT
CYBER SECURITY
PREPARE BY,
GOLWALA MEET 140280105016(5TH SEM)
JAIMIN PANDYA 140280105020(5TH SEM)
MAKHIJA ASHISH 140280105023(5TH SEM)
CONTENT :

REALMS OF CYBER WORLD


A BRIEF HISTOERY OF THE INTERNET
RECOGNIZING AND DEFINING COMPUTER CRIME
CONTEMPORARY CRIME
INDIAN IT ACT 2000
REALMS OF CYBER WORLD

There are different levels of network system


Intranets
Internet
Intranets are small ,local network connecting computer which are
within one organization.
Internet is the largest network in the world ,international connection
of all types and sizes of computers and networks.
INTRODUCTION OF INTERNET

The Internet is the largest network in the world ,international


connection of all types and sizes of computers and networks.
It is a system of small networks of computers linked with other
computer via routers and software protocols.
This TCP/IP based network link.
Some Common Terms

The Internet is a network of computers spanning the


globe. It is also called the World Wide Web.

An Internet Browser is a software program that enables


you to view Web pages on your computer. Browsers
connect computers to the Internet, and allow people to
surf the Web.

Internet Explorer is one of the browsers most commonly


used. There are other browsers available as well,
including Netscape.
A site or area on the World Wide Web that is accessed by its
own Internet address is called a Web site.

A Web Page is like a page in a book. Websites often have


several pages that you can access by clicking on links. A
Web site can be a collection of related Web pages.

Each Web site contains a home page (this is the original


starting page) and may also contain additional pages.

Different computers will have different home pages. You


can set your own webpage.
Layout of a Web Page

1. Title bar tells you the name of the web page


2. Menu bar has commands for moving around the webpage, printing, etc
3. Tool bar short cuts to commands. Each picture represents a command
4. Address bar webpage address. If you want to go directly to a web page,
you will need to know the address.
Parts of a Web Address

A web address is typically composed of four parts:


For example, the address http://www.google.com is
made up of the following areas:
http://
This Web server uses Hypertext Transfer Protocol
(HTTP). This is the most common protocol on
the Internet.
www
This site is on the World Wide Web.
Google
The Web server and site maintainer.
com
This tells us it is a commercial site
Endings of web pages tells us a bit about the page. Some common endings
to web addresses are:

com (commercial)
edu (educational institution)
gov (government)
net (network)
org (organization)

You might also see addresses that add a country code as the last part of the
address such as:
ca (Canada)
uk (United Kingdom)
fr (France)
us (United States of America)
au (Australia)
COMPUTER CRIME

Computer crime or cyber crime is an act performed by a


knowledgeable computer user, sometimes referred to as a hacker
that illegally steals a companys or individuals information.
Sometimes this person or group of individuals may destroy or
otherwise corrupt the computer or data file.
Crime committed using a computer and the internet to steal a
persons identity or illegal imports or malicious programs.
Cybercrime is nothing but where the computer used as an object or
subject of crime.
First computer crime is really unkown.
Prior to the 1980s ,computer crime was consider non-issue.
In 1988, Robert Morris created a worm which is destoy computer
connect with internet.
It is caused millions of dollars in damage.
Examples os computer crime
Cyber terrorism
Child pornography
Fraud
Scam
Unauthorized access
Creating malware
The first recorded cyber crime took place in the year 1820 That is not
surprising considering the fact that the abacus, which is thought to be
the earliest form of a computer, has been around since 3500 B.C.
HACKING
CHILD PORNOGRAPHY
DENIAL OF SERVICE ATTACK
VIRUS DISSEMINITION
COMPUTER VANDALISM
CYBER TERRORISM
SOFTWARE PIRACY
Hacking in simple terms
means an illegal intrusion into a
computer system and/or
network. It is also known as
CRACKING. Government
websites are the hot targets of
the hackers due to the press
coverage, it receives. Hackers
enjoy the media coverage.
The Internet is being highly used by its abusers to reach and abuse
children sexually, worldwide. As more homes have access to internet,
more children would be using the internet and more are the chances
of falling victim to the aggression of pedophiles.
This is an act by the criminal, who floods the bandwidth of the victims
network or fills his e-mail box with spam mail depriving him of the
services he is entitled to access or provide
Malicious software that attaches itself to other software or computer
system and then propagates itself to other computers via networks or
disks. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
Damaging or destroying data rather than stealing or misusing them is
called cyber vandalism. Transmitting virus: These are programs that
attach themselves to a file and then circulate .
Terrorist attacks on the Internet is by distributed denial of service
attacks, hate websites and hate emails, attacks on sensitive computer
networks, etc. Technology savvy terrorists are using 512-bit encryption,
which is impossible to decrypt.
Theft of software through the illegal copying of genuine programs or
the counterfeiting and distribution of products intended to pass for the
original.
Internet security is a branch of computer
security specifically related to the Internet.

It's objective is to establish rules and


measure to use against attacks over the
Internet.
Use antivirus softwares
insert firewalls
uninstall unnecessary software
maintain backup
check security settings
Stay anonymous - choose a genderless screen name
Never give your full name or address to strangers
Learn Etiquette' - follow it and expect it
from others
Don't respond to harassing or negative
messages (flames)
Get out of uncomfortable or hostile
situations quickly
Save offending messages
Learn more about Internet privacy
What is Cyber law?
Cyber Law is the law governing
cyber space.
Cyber law or Internet law is a term that
encapsulates the legal issues related to
use of the Internet. It is less a distinct
field of law than intellectual
property or contract law, as it is a domain
covering many areas of law and
regulation. Some leading topics
include internet access and
usage, privacy, freedom of expression,
and jurisdiction.
Areas covered by Cyber Law

Electronic or Data Protection


Cyber Crimes Digital Signatures and Privacy
Cyber law in India
Information Technology Act, 2000
The Information Technology Act, 2000 (also
known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified
on 17 October 2000. It is the primary law
in India dealing
with cybercrime and electronic commerce. It
is based on the United Nations Model Law on
Electronic Commerce 1996 (UNCITRAL Model)
recommended by the General Assembly of
United Nations by a resolution dated 30 January
1997.
The Information Technology Act, 2000 (IT
Act), came into force on 17 October 2000.
The primary purpose of the Act is to
provide legal recognition to electronic
commerce and to facilitate filing of
electronic records with the Government.
Information Technology Act 2000
consisted of 94 sections segregated into
13 chapters.
Objectives of IT act 2000
To provide legal recognition for
transactions
To facilitate electronic filing of documents
with the Government agencies.
To amend the Indian Penal Code, The Indian
Evidence Act, 1872, The Banker's Book
Evidence Act, 1891 and the Reserve Bank of
India Act, 1934.
Aims to provide the legal framework to all
electronic records.
NEED FOR CYBER LAW
Internet has dramatically changed the way
we think, the way we govern, the way we do
commerce and the way we perceive
ourselves.
Information technology is encompassing all
walks of life all over the world.
Cyber space creates moral, civil and
criminal wrongs. It has now given a new
way to express criminal tendencies.
Cyberspace is open to participation by all
IT has brought Transition from paper to
paperless world
The laws of real world cannot be
interpreted in the light of emerging
cyberspace to include all aspects relating
to different activities in cyberspace
Internet requires an enabling and
supportive legal infrastructure in tune with
the times
Thank you

Das könnte Ihnen auch gefallen