CYBER LAW
Introduction to Cyber law :
Cyberlaw is the area of law that deals
with the Internet's relationship to technological and electronic elements,
including computers, software, hardware and information systems (IS).
Ethics and Morals
Ethics : Also called moral philosophy is the discipline
concerned with what is morally good and bad, right or wrong.
Morals : The standards of behaviour; principles of right and
wrong behaviour. Thus morals are dictated by society, culture or religion while
ethics are chosen by the person himself which governs his life. This chapter
introduces the do's and dont's of cyber world.
Cyber Crime -Computer Crime is alternatively referred to as
cybercrime, e-crime, (electronic crime) or hi-tech crime. Computer crime is an
act performed by a knowledgeable computer user, sometimes referred to as a
hacker who illegally browses or steals a company's or individual's private
information.
Examples of cyber crime
1)
Software Piracy : Software piracy is nothing but copyright violation of
software created originally by an individual
or an institution. It includes stealing of codes/ programs and other
information illegally and creating the imitated copy by unauthorized means and
utilizing this data either for own
benefit or for profit making. Example : When you download a copy of
a licensed software. For example downloading games from a file sharing website
without paying for it, it is a software piracy.
2) Unauthorized access : Gaining access without the users' permission is known
as unauthorized access. Authorization means granting access rights to
resources, which is related to information security computer security and to
access control in particular sector.
Examples of unauthorized
access are :
Hacking financial / bank account related
information.
Stealing organizational / intellectual
information.
Illegal monitoring of information owned by
other users.
Illegal use/break of login and password of
other users.
3)
Copyright violation : A copyright is a legal right that gives the creator
of a literary, artistic, musical, or other creative work the sole right to
publish and sell that work.
4)
Cracking : Activity such as decipher codes or passwords and
breaking security systems for illegal
reasons is called cracking.
5)
Cyberbully or Cyberstalking :
Cyberstalking is a criminal practice where an individual uses the Internet to
systematically harass or threaten someone
6)
Phishing : This a technique of
extracting confidential information such as credit card numbers and username
password combos by pretending as a legal enterprise. Phishing is typically carried
out by email spoofing.
7)
Plagarism : Plagarism is
presenting someone else's work or idea as your own without their consent. The
widespread use of computers and the advent of the internent has made it easier
to palagiarize the work of others.
8)
Hacking : Hacking refers to unauthorised intrusion into a
computer or a network. Hacker is a person intensely interested in the deep and
hidden or concealed working of any computer operating system and programming
language.
Security
Procedures
Encryption
: It is a method of
converting the original message into random text, which should be complex to
understand and difficult for a hacker to decode. The idea is to ensure security
and safety of data and its transmission.
SSL (Secure Socket Layer) : It is the most consistent security model. Through the
SSL, transmission of data is encrypted, client-server information is
authenticated and also message integrity for TCP/IP connections secured.
Firewall
: Firewall refers to network security (Hardware and Software) system which blocks certain type of
information, forming a barrier between a trusted and untrusted network. It
attempts to block the spread of computer attacks.