1 / 9

Introduction to Cyber Laws

Introduction to Cyber Laws. Unit 5. Types of Attacks. Social Engineering Attack. Cyber Stalking. Cyberstalking  is the use of the  Internet  or other electronic means to  stalk  or  harass  an individual, group, or organization

mpoovey
Download Presentation

Introduction to Cyber Laws

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Cyber Laws Unit 5

  2. Types of Attacks

  3. Social Engineering Attack

  4. Cyber Stalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization • Cyberstalkingis a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.

  5. Cyber Stalking • Stalking by strangers • Of celebrities and public persons • By anonymous online mobs • Corporate cyberstalking

  6. Cloud Computing and Cyber Crime • It is widely defined as a style of computing that uses Internet technology to offer scalable and elastic IT-enabled capabilities as a service to customers. • This ranges from routine tasks of communicating over the internet (e.g. Gmail), to sophisticated work such as Customer Relationship Management (CRM) that are operated and maintained in the “cloud” by providers.

  7. Cloud Computing and Cyber Crime • When a client decides to employ the use of cloud computing, the data no longer belongs to the client alone. • The vendor, or the service provider, stores the user’s data on its own virtualized server and as such, vendors gain full access to the information available, confidential or not.

  8. Cloud Computing and Cyber Crime • Further, the servers are moved outside the traditional security perimeter making it easy for the reach of cyber criminals. • This is a growing concern particularly when cloud computing stores sensitive data about customers.

More Related