Looking for a Tutor Near You?

Post Learning Requirement » x
Ask a Question
x

Choose Country Code

x

Direction

x

Ask a Question

x

Hire a Tutor

Presentation On Cyber Crime And Cyber Law

Published in: Law
142 Views

Use of a computer as an instrument to perform an illegal act, committing fraud, trafficking in child pornography, Intellectual property, stealing identities, violating privacy, etc

Sohail A / Kuala Lumpur

8 years of teaching experience

Qualification: BA, LLB, MA, LLM, PhD

Teaches: Communicative English, English, Hindi, Spoken English, Contract Law, Law, Literature

Contact this Tutor
  1. CYBER CRIME AND CYBER LAW LECTURE WEEK 1 03-04-2022 (online)
  2. CYBER CRIME USE OF A COMPUTER AS AN INSTRU TO PERFORM AN ILLEGAL ACT NT COMMITTING TRAFFICKING IN CH
  3. Intellectual property stealing identities violating privacy
  4. COMPUTER CRIMES are easily possible and hard to counter due to Anonymity of Hackers Weak Computer systems Lack of Awareness of user.
  5. TYPES HACKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY PORNOGRAPHY
  6. TYPES CREDIT CARD FRAUD PHISHING CYBER STALKING THREATENING SALAMI ATTACK
  7. HACKING A hacker is a person who is proficient with computers and/or programming to an expert level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker.
  8. CRACKING A cracker is a hacker who uses his proficiency for personal gains outside of the law, EX: stealing data, changing bank accounts. It's then safe to say that all crackers are hackers, but not all hackers are crackers.
  9. PHISHING The act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information: for example, that an account will close, a balance is due, or information is missing from an account etc
  10. VIRUS DISSEMINATION A computer virus is a program that can 'infect' other legitimate programs by modifying them to include a possibly 'evolved' copy of itself, Viruses can spread themselves, without the knowledge or permission of the users, to potentially large numbers of programs on many machines. A computer virus passes from computer to computer like a biological virus passes from person to person.
  11. CYBER TERRORISM Criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.
  12. AL-QAEDA OR ANY PRESSURE GROUP EXAMPLE laptop found in Afghanistan contained Hits on web sites that contained Sabotage Handbook Handbook Internet tools, planning a hit, anti-surveillance methods, cracking tools Actively researched publicly available information concerning critical infrastructures posted on web sites
  13. CYBER LAW Cyber law is a constantly evolving process, As the Internet grows, numerous legal issues arise. These issues vary from Domain Names, to Intellectual Property Rights, Electronic Commerce, Privacy, Encryption to Spamming and so on .
  14. CYBER LAW IN PAKISTAN These laws deal with crime of Internet Computer & Networks Pakistan Telecommunication (Re-Organization) Act, 1996, (Act XVII of 1996) Electronic Transaction Ordinance 2002
  15. CYBER LAW IN PAKISTAN Prevention of Electronic Crimes Act 2016 Payments and Electronic Fraud Act 2007
  16. CYBER LAW IN PAKISTAN Federal Investigation Act, 1974 Telegraph Act 1885 Wireless Telegraphy Act 1933
  17. FEDERAL INVESTIGATION ACT, 1974 This Act was enacted for constitution of a Federal Investigation Agency for the investigation of certain offences committed in connection with matters concerning the Federal Government and for investigation of the offences specified in Schedule including an attempt or conspiracy to commit, and abetment of any such offence.
  18. TELEGRAPH ACT, 1883 (REPEALED 1885) Governs the use of wired and wireless telegraphy, telephones, teletype, radio communications and digital data communications. It gives the government exclusive jurisdiction and privileges for establishing, maintaining, operating, licensing and oversight of all forms of wired and wireless communications within territory.
  19. WIRELESS TELEGRAPHY ACT 1933 Prohibition of possession of wireless telegraphy apparatus without license (As provided by Section 4, no person shall possess wireless telegraphy apparatus except under and in accordance with a license issued under this Act) Power of Federal Government to exempt persons from provisions Of the Act. (The Federal Government may by rules made under this Act exempt any person or any class of persons from the provisions of this Act either generally or subject to prescribed conditions, or in respect of specified wireless telegraphy apparatus.)
  20. PAYMENTS AND ELECTRONIC FRAUD ACT 2007 To provide regulatory framework for EMIS desirous of offering innovative payment services to the general public. Prescribe minimum service standards and requirements for EMIS to ensure delivery of payment services in a safe, sound and cost effective manner. Outline the permissible activities that can be carried out by an EMI and its agents' network. Provide a baseline for protection of EMI's customers.
  21. PREVENTION OF ELECTRONIC CRIMES ACT 2016 Enacted to address the prevention of cyber crimes and unauthorized acts with respect to the information system in Pakistan. It is applicable to every citizen of Pakistan wherever he may be and also to every other person for the time being in Pakistan. It also apply to any act committed outside Pakistan by any person if the act constitutes an offence under this Act and affects a person, property, information system or data located in Pakistan.
  22. CONCLUSION (REVISION) Cyber Crime: Activity in which computers or networks are a tool, a target, or a place of criminal activity. • Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as Committing fraud, Stealing identities, Violating privacy Cyber Law: Cyber law is a constantly evolving process, As the Internet grows, numerous legal issues arise. These issues vary from Domain Names, to Intellectual Property Rights, Electronic Commerce, Privacy, Encryption to Spamming and so on .