Saturday, 25 March 2023

CYBER LAW

 

CYBER LAW

Introduction to Cyber law : Cyberlaw is the area of law that deals with the Internet's relationship to  technological and electronic elements, including computers, software, hardware and information systems (IS).

Ethics and Morals       

Ethics : Also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong.

Morals : The standards of behaviour; principles of right and wrong behaviour. Thus morals are dictated by society, culture or religion while ethics are chosen by the person himself which governs his life. This chapter introduces the do's and dont's of cyber world.

Cyber Crime -Computer Crime is alternatively referred to as cybercrime, e-crime, (electronic crime) or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker who illegally browses or steals a company's or individual's private information.

Examples of cyber crime

1) Software Piracy : Software piracy is nothing but copyright violation of

 software created originally by an individual or an institution. It includes stealing of codes/ programs and other information illegally and creating the imitated copy by unauthorized means and utilizing this data either  for own benefit  or for profit  making. Example : When you download a copy of a licensed software. For example downloading games from a file sharing website without paying for it, it is a software piracy.

         2) Unauthorized access : Gaining access without the users' permission is known as unauthorized access. Authorization means granting access rights to resources, which is related to information security computer security and to access control in particular sector.

Examples of unauthorized access are :    

 Hacking financial / bank account related information.       

 Stealing organizational / intellectual information.   

 Illegal monitoring of information owned by other users.   

 Illegal use/break of login and password of other users.

3) Copyright violation : A copyright is a legal right that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work.

4) Cracking : Activity such as decipher codes or passwords and breaking  security systems for illegal reasons is called cracking.

5) Cyberbully or Cyberstalking : Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone

6) Phishing : This a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise. Phishing is typically carried out by email spoofing.

7) Plagarism  : Plagarism is presenting someone else's work or idea as your own without their consent. The widespread use of computers and the advent of the internent has made it easier to palagiarize the work of others.

8) Hacking : Hacking refers to unauthorised intrusion into a computer or a network. Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language.

 

 

 

Security Procedures

Encryption : It is a method of converting the original message into random text, which should be complex to understand and difficult for a hacker to decode. The idea is to ensure security and safety of data and its transmission.

 SSL (Secure Socket Layer) : It is the most consistent security model. Through the SSL, transmission of data is encrypted, client-server information is authenticated and also message integrity for TCP/IP connections secured.

Firewall : Firewall refers to network  security (Hardware and Software)  system which blocks certain type of information, forming a barrier between a trusted and untrusted network. It attempts to block the spread of computer attacks.

 

No comments:

Post a Comment