180 likes | 483 Views
Introduction to Cyber Laws. Unit 5. Types of Attacks. Social Engineering Attack. Cyber Stalking. Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization
E N D
Introduction to Cyber Laws Unit 5
Cyber Stalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization • Cyberstalkingis a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.
Cyber Stalking • Stalking by strangers • Of celebrities and public persons • By anonymous online mobs • Corporate cyberstalking
Cloud Computing and Cyber Crime • It is widely defined as a style of computing that uses Internet technology to offer scalable and elastic IT-enabled capabilities as a service to customers. • This ranges from routine tasks of communicating over the internet (e.g. Gmail), to sophisticated work such as Customer Relationship Management (CRM) that are operated and maintained in the “cloud” by providers.
Cloud Computing and Cyber Crime • When a client decides to employ the use of cloud computing, the data no longer belongs to the client alone. • The vendor, or the service provider, stores the user’s data on its own virtualized server and as such, vendors gain full access to the information available, confidential or not.
Cloud Computing and Cyber Crime • Further, the servers are moved outside the traditional security perimeter making it easy for the reach of cyber criminals. • This is a growing concern particularly when cloud computing stores sensitive data about customers.