You are on page 1of 3

Cyber Law

1. Cyber Safety
Cyber safety is the safe and responsible use of Internet and keeping information safe and
secure. It's also being responsible with that information and being respectful to other people
online.
2. Computer Virus
A computer virus is an agent(some form of executable code) that can replicate and spread from
one computer to another. It can spread because its host has sent(willingly or unwillingly) it to
someone over a network or internet, or through a physical medium such as floppy disk, CD,
DVD or USB drive. Some viruses are harmful as they are programmed to harm your computer
by damaging or deleting files and programs.
3. Computer Worm
A computer worm is a computer program which self-replicates itself in order to spread to
other computers. It uses the network to send copies of itself to other nodes. Unlike a virus, it
doesn't need to attach itself to an existing program.
4. Trojan Horse
Trojan Horse is a malicious program that looks legitimate but it can take control of the
computer. It's designed to damage, disrupt, steal or do any harm to your data or computer but
it acts like a useful or normal application.

5. Spam
It's the abuse of messaging systems to send unsolicited message(s) to large number of
recipients for any purpose. Most common type of spamming is email spam. It can be used for
phishing, commercial use, advertising and more negative things like proselytizing.
6. Protection using Firewall
Security hardware & software that prevent unauthorized users from gaining access to a
computer or network is known as firewall. It provides protection against outside cyber
attackers and malicious software.

7. Use of Cookies
Cookies are messages that a web server transmits to a Web browser so that the web server
can keep track of the user's activity on a specific website. A small piece of information stored
on user's computer by the web browser while browsing a website. It's main purpose is to
identify users and possibly prepare customized web pages for them. It also used to remember
some information of user such as data entered into form fields, payment card numbers, items
added in a cart.
Cookies are stored on user's disk so even if server crashes they are still available.
There's a possible security threat to a user.
8. Cyber Law
Cyber laws cumulates a wide variety of political and legal issues related to the internet,
networks, hardware, software and other communications technology, including scam or
treachery, copyrighting issues, online insults/harassments, data protection, etc.
Cyber Law
9. IT Act
The Act provides a legal framework for electronic governance by giving recognition to
electronic records and digital signatures. It also defines cyber crimes and prescribes penalties
for them. The Act directed the formation of a Controller of Certifying Authorities to regulate
the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve
disputes rising from this new law. The Act also amended various sections of the Indian Penal
Code, 1860, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891, and the
Reserve Bank of India Act, 1934 to make them compliant with new technologies.

10. Cyber Crime


It refers to any crime that involves a computer and a network, the computer may have been
used in commission of crime, or it may be the target. It may threaten a person, company or a
nation's security, etc. Various classifications are as follows :
1. Tampering with computer source documents
Concealing(hiding), destroying(demolishes or reduces), altering(change in characteristics)
any computer source code used for a computer, computer program, computer system or
computer network, when the source code is required to be kept or maintained by law is
punishable.
2. Hacking
It's usually understood to be the unauthorized access of a computer system or network.
Someone with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing in
a computer resource.
3. Publishing obscene information or material(including pornographic)
Someone who publishes or transmits or causes to be published(in electronic form) any
material which is lascivious, or if its effect is such as to tend to deprave and corrupt persons
who are likely to read, see or hear the matter contained or embodied in it, is liable to
punishment.
4. Child Pornography
Child Pornography is a part of cyber pornography, but it is such a grave offence that it is
individually also recognized as a cyber crime.

5. Accessing protected system


Any unauthorized person who secures access or attempts to secure access to a protected
system is liable to be punished with punishment and may also be liable to fine.

6. Breach of confidentiality and privacy


Any person who secures access to any electronic record, book, register, correspondence,
information, document or other material without the consent of the person concerned or
discloses such material to any other person shall be liable to be punished under the
Information Technology Act.

You might also like