Cyber law, Cyber ethics and cyber crime
Answers
Cyber Law-
Cyber law, also known as cyber crime law, is legislation focused on the acceptable behavioral use of technology including computer hardware and software, the internet, and networks. Cyber law helps protect users from harm by enabling the investigation and prosecution of online criminal activity.
Cyber ethics-Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
Cyber Crime-Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. A cybercriminal may use a device to access a user's personal information, confidential business information, government information, or disable a device.
Cyber law and Ethics
Meaning of Cyber Law
Cyber law is also known as Cyber Law or Internet Law. Cyber law India is the area of law that deals with the Internet’s relationship to technological and electronic elements, including computers, software, hardware and information systems (IS).
Internet law or Cyber law India is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction
Impact of Cyber crime on cyber law and ethics in 21st century
Cyber crime, hacking, ‘cyber-ethics’ etc. is an addition to the crimes in today’s era. Hence we need to evolve a ‘cyber-jurisprudence’ based on which we can evaluate and criticize ‘cyber-ethics’. The right to freedom of belief thought and expression which considered as basic principals envisaged in our constitution. The freedom of press also a guaranteed right provided by our constitution.
Cyber Law and Ethics includes few basic prominent measures to curb cyber crimes and are as follows:
Synchronized Passwords
These passwords are schemes used to change the password at user’s and host token. The password on synchronized card changes every 30-60 seconds which only makes it valid for one time log-on session. Other useful methods introduced are signature, voice, fingerprint identification or retinal and bio-metric recognition etc. to impute passwords and pass phrases.
Firewalls
It creates wall between the system and possible intruders to protect the classified documents from leaked or accessed. It would only let the data to flow in computer which thus recognized and verified by one’s system. Thus it only permits access to the system to ones already registered with the computer.
Digital Signature
Digital Signature created by using means of cryptography by applying algorithms. This has its prominent use in the business of banking where customer’s signature thus identified by using this method.
follow me
mark me as brainiest