You are on page 1of 3

Cyber law

UNIT-1 EVOLUTION OF LAW IN CYBER SPACE


SYNOPSIS
 Introduction
 Meaning and definition of cyber space
 History of cyber space
 Origins of internet and WWW
 Threat in cyber space
 Cyberspace law in India
 Conclusion
INTRODUCTION
 Two decades ago, the term cyberspace seemed right out of a science fiction
movie.
 In the second decade of the twenty-first century, cyberspace is probably the
place where most of us spend a major part of our lives.
 It has become an inseparable element of our existence.
MEANING AND DEFINITION OF CYBER SPACE
 Cyberspace is the dynamic and virtual space that such networks of machine-
clones create.
 In other words, cyberspace is the web of consumer electronics, computers,
and communications network which interconnect the world.
 Cyberspace allows users to share information, interact, swap ideas, play
games, engage in discussions or social forums, conduct business and create
intuitive media, among many other activities.
 The term cyberspace was initially introduced by William Gibson in his 1984
book, Neuromancer.
HISTROY OF CYBER SPACE
 In 1984, Wiliam Gibson published his science fiction book – Necromancer,
which describes an online world of computers and elements of the society
who use these computers. The word cyberspace first appeared in this book.
 The book caught the imagination of many writers and in 1986, major
English language dictionaries introduced the word ‘cyberspace’. According
to the New Oxford Dictionary of English, ‘CyberSpace’ is the notional
environment in which people communicate over computer networks.

1
ORIGINS OF INTERNET AND WWW
 The internet is a globally connected network system that transmit data via
various types of media.
 The first workable prototype of the Internet came in the late 1960s with the
creation of ARPANET, or the Advanced Research Projects Agency
Network.
 Originally funded by the U.S. Department of Defense, ARPANET used
packet switching to allow multiple computers to communicate on a single
network.
 English scientist Tim Berners-Lee invented the World Wide Web in 1989.
 He wrote the first web browser in 1990 while employed at The European
Organization for Nuclear Research (CERN) near Geneva, Switzerland.
 The terms internet and World Wide Web are often used interchangeably, but
they are not exactly the same thing;
 the internet refers to the global communication system, including hardware
and infrastructure, while the web is one of the services communicated over
the internet.
THREAT IN CYBERSPACE
 A cyber or cybersecurity threat is a malicious act that seeks to damage data,
steal data, or disrupt digital life in general.
 Cyber threats also refer to the possibility of a successful cyber attack that
aims to gain unauthorized access, damage, disrupt, or steal an information
technology asset, computer network, intellectual property, or any other form
of sensitive data.
 Common cyber threats include:
1. Malware: Malware (malicious software) is software that has been
specifically designed to perform malicious tasks on a device or network,
such as corrupting data or taking control of a system.
2. Spyware: Spyware is a form of malware that hides on a device providing
real-time information sharing to its host, enabling them to steal data like
bank details and passwords.
3. Phishing Attacks :Phishing attacks are when a cybercriminal attempts to
lure individuals into providing sensitive data such as personally
identifiable information (PII), banking and credit card details, and
passwords.
4. Distributed Denial of Service (DDoS) Attacks :Distributed denial of
service attacks aim to disrupt a computer network by flooding the
network with superfluous requests from a botnet to overload the system
and prevent legitimate requests from being fulfilled.
2
CYBER SPACE LAW IN INIDA
 In India, cyber laws are contained in the Information Technology Act, 2000
(“IT Act”) which came into force on October 17, 2000.
 The main purpose of the Act is to provide legal recognition to electronic
commerce and to facilitate filing of electronic records with the Government.
 In terms of cybersecurity, there are five main types of laws that must be
followed.
 Cyber laws are becoming increasingly important in countries such as India
which have extremely extensive internet use.
 There are strict laws that govern the use of cyberspace and supervise the use
of information, software, electronic commerce, and financial transactions in
the digital environment.
 India’s cyber laws have helped to enable electronic commerce and electronic
governance to flourish in India by safeguarding maximum connectivity and
minimizing security concerns.
 This has also made digital media accessible in a wider range of applications
and enhanced its scope and effectiveness.
CONCLUSION

You might also like