Nitin Cber Ppt

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

SOCIETY, LAW

& ETHICS

•MADE BY:-
•NITIN KUMAR
•CLASS:- XI 'A'
•ROLL NO. :- 18
 INTODUCTION OF CYBER SECURITY

 IMPORTANCE OF CYBER LAWS

 KEYCYBER LAWS IN INDIA

 ETHICALLY ISSUE IN CYBERSPACE

 CYBER ETHICS

 CYBERSECURITY MEASURES

INDEX
 IMAPCT OF CYBER CRIME ON
SOCIETY
 CASE STUDIES

 ROLE OF INDIVIDUAL OF CYBER


ETHICS
 FUTURE OF CYBER LAW AND
ETHICS
 PRIVATE BROWSING AND
ANANOMYOUS BROWSING
 WHAT YOU SHOULD DO ON SOCIAL
NETWORKING SITES
Introduction
to Cyber
Society
THE TERM CYBER SOCIETY REFERS
TO THE INTERCONNECTED GLOBAL
NETWORK OF INDIVIDUALS,
BUSINESSES, AND GOVERNMENTS
O P E R AT I N G I N T H E D I G I TA L W O R L D .
TECHNOLOGY HAS REVOLUTIONIZED
C O M M U N I C AT I O N , E D U C AT I O N ,
H E A LT H C A R E , A N D E N T E R T A I N M E N T.
EXAMPLES INCLUDE SOCIAL MEDIA
P L AT F O R M S L I K E FA C E B O O K , E -
COMMERCE SITES LIKE AMAZON, AND
VIRTUAL CLASSROOMS. WHILE THIS
CONNECTIVITY OFFERS IMMENSE
BENEFITS, IT ALSO INTRODUCES
VULNERABILITIES LIKE CYBERCRIMES
A N D D ATA M I S U S E , M A K I N G
AWARENESS CRUCIAL .
Importance of
Cyber Laws
CYBER LAWS ARE THE LEGAL
F R A M E W O R K S T H AT G O V E R N
AC T I V I T I E S I N T H E D I G I TA L W O R L D .
THESE LAWS PROTECT USERS FROM
C Y B E R T H R E AT S S U C H A S H A C K I N G ,
P H I S H I N G , A N D I D E N T I T Y T H E F T. F O R
EXAMPLE, WITHOUT CYBER LAWS,
ONLINE TRANSACTIONS COULD BE
E A S I LY E X P L O I T E D , C A U S I N G
F I N A N C I A L A N D R E P U TAT I O N A L
D A M A G E . R E G U L AT I O N S E N S U R E A
S A F E O N L I N E E N V I R O N M E N T,
ENCOURAGING TRUST AND THE
E T H I C A L U S E O F D I G I TA L R E S O U R C E S .
HIGHLIGHT THE GROWING NEED FOR
S T R I C T E R L AW S A S C Y B E R T H R E AT S
B E C O M E M O R E S O P H I S T I C AT E D .
Key Cyber
Laws in India
I N D I A’ S I N F O R M AT I O N T E C H N O L O G Y
( I T ) A C T, 2 0 0 0 I S T H E C O R N E R S T O N E
OF ITS CYBER LAW FRAMEWORK. IT
PROVIDES LEGAL RECOGNITION TO
E L E C T R O N I C C O M M E R C E , P E N A LT I E S
F O R C Y B E R C R I M E S , A N D D ATA
P R I VAC Y G U I D E L IN E S . A M E N D M E N T S
ADDRESS EMERGING ISSUES LIKE
I D E N T I T Y T H E F T A N D D ATA B R E A C H E S .
PROVISIONS INCLUDE IMPRISONMENT
AND HEFTY FINES FOR OFFENDERS,
D E M O N S T R AT I N G I N D I A’ S
C O M M I T M E N T T O TAC K L I N G C Y B E R
T H R E AT S . T H I S S L I D E U N D E R S C O R E S
T H E R E L E VA N C E O F T H E S E L AWS I N
F O S T E R I N G T R U S T I N T H E D I G I TA L
ECOSYSTEM.
Ethical Issues
in Cyberspace

E T H I C A L I S S U E S I N C Y B E R S PA C E
R E V O LV E A R O U N D T H E R E S P O N S I B L E
U S E O F T E C H N O L O G Y. P R I V A C Y I S A
M A J O R C O N C E R N , A S P E R S O N A L D ATA
IS OFTEN COLLECTED WITHOUT
C O N S E N T. P L A G I A R I S M A N D
C O P Y R I G H T V I O L AT I O N S H I G H L I G H T
INTELLECTUAL PROPERTY
C H A L L E N G E S . D I G I TA L A D D I C T I O N
A F F E C T S M E N T A L H E A LT H , E S P E C I A L LY
I N Y O U T H , A S P E O P L E I N C R E A S I N G LY
DEPEND ON TECHNOLOGY FOR
E N T E RTA I N M E N T A N D S O C I A L
INTERACTION. ADDRESSING THESE
E T H I C A L D I L E M M A S I S V I TA L F O R A
B A L A N C E D A N D FA I R D I G I T A L W O R L D .
Cyber
Ethics
CYBER ETHICS ARE THE PRINCIPLES
G U I D I N G R E S PO N S I B L E B E H AV I O R I N
T H E D I G I T A L E N V I R O N M E N T. E T H I C A L
PRACTICES INCLUDE RESPECTING
O T H E R S ’ P R I V A C Y, A V O I D I N G
HARMFUL ACTIVITIES LIKE
C Y B E R B U L LY I N G , A N D E N S U R I N G
T R A N S PA R E N C Y I N O N L I N E A C T I O N S .
F O R I N S TA N C E , S H A R I N G
C O P Y R I G H T E D M AT E R I A L W I T H O U T
PERMISSION BREACHES ETHICAL
S TA N D A R D S . BY P R O M O T I N G A
C U LT U R E O F I N T E G R I T Y O N L I N E ,
CYBER ETHICS BUILD TRUST AND A
S E N S E O F S E C U R I T Y I N T H E D I G I TA L
ECOSYSTEM.
Cybersecurity
Measures
C Y B E R S E C U R I T Y I N V O LV E S
PROTECTING SYSTEMS, NETWORKS,
A N D D ATA F R O M U N A U T H O R I Z E D
A C C E S S O R AT TA C K S . S I M P L E
MEASURES LIKE USING STRONG
PA S S W O R D S , E N A B L I N G T W O - FA C T O R
A U T H E N T I C AT I O N , A N D AV O I D I N G
SUSPICIOUS LINKS ENHANCE ONLINE
S A F E T Y. R E G U L A R U P D A T E S T O
SOFTWARE AND ANTIVIRUS PROGRAMS
A L S O P R O T E C T A G A I N S T E V O LV I N G
T H R E AT S . C Y B E R S E C U R I T Y I S N ’ T J U S T
A TECHNICAL REQUIREMENT BUT A
SHARED RESPONSIBILITY AMONG
USERS, BUSINESSES, AND
GOVERNMENTS TO ENSURE A SAFE
D I G I TA L S PA C E .
Impact of
Cyber
Crimes
on
Society C Y B E R C R I M E S C A U S E S I G N I F I C A N T H A R M A T M U LT I P L E
L E V E L S . F I N A N C I A L LY, B U S I N E S S E S L O S E B I L L I O N S
A N N U A L LY T O F R A U D A N D D A T A B R E A C H E S . S O C I A L LY,
M I S I N F O R M AT I O N S P R E A D S D I S T R U S T A N D C H A O S ,
W H I L E C Y B E R B U L LY I N G H A R M S M E N T A L W E L L - B E I N G .
P S Y C H O L O G I C A L LY, V I C T I M S E X P E R I E N C E F E A R ,
A N X I E T Y, A N D L O S S O F P R I V A C Y. T H E S E
CONSEQUENCES UNDERSCORE THE NEED FOR
STRINGENT LAWS, PUBLIC AWARENESS, AND ROBUST
CYBERSECURITY PRACTICES TO MINIMIZE DAMAGE.
Case
Studies
 WANNACRY RANSOMWARE (2017): A
GLOBAL ATTACK THAT ENCRYPTED
FILES ON AFFECTED SYSTEMS,
DEMANDING RANSOM PAYMENTS. IT
CAUSED BILLIONS IN DAMAGES.
 CAMBRIDGE ANALYTICA SCANDAL
(2018): A MISUSE OF FACEBOOK
DATA TO INFLUENCE ELECTIONS,
HIGHLIGHTING THE LACK OF DATA
PRIVACY REGULATIONS.
 THESE EXAMPLES REVEAL THE SCALE
OF CYBER THREATS AND THE
IMPORTANCE OF STRONG LEGAL AND
ETHICAL MEASURES TO PREVENT
SIMILAR INCIDENTS.
Role of
Individual
in
Promoting
Cyber E V E RY U S E R P L AY S A C R U C I A L R O L E I N F O S T E R I N G A
S A F E D I G I T A L W O R L D . T H I S I N V O LV E S S T AY I N G
INFORMED ABOUT CYBER RISKS AND USING

Ethics
T E C H N O L O G Y R E S P O N S I B L Y. F O R E X A M P L E ,
E D U C AT I N G P E E R S A B O U T T H E D A N G E R S O F
PHISHING OR REPORTING UNETHICAL ONLINE
ACTIVITIES HELPS BUILD AWARENESS. ENCOURAGING
ETHICAL PRACTICES LIKE RESPECTING COPYRIGHTS
A N D AVO I D I N G H A R M F U L B E H AV I O R S U C H A S
C Y B E R B U L L Y I N G E N S U R E S A H E A LT H I E R D I G I T A L
S O C I E T Y.
Future
of Cyber
Laws
and
THE RAPID DEVELOPMENT OF TECHNOLOGIES
LIKE ARTIFICIAL INTELLIGENCE (AI), INTERNET
O F T H I N G S ( I O T ) , A N D B I G D ATA P R E S E N T S
N E W C H A L L E N G E S . C Y B E R L A W S M U S T E V O LV E

Ethics
TO ADDRESS THESE CHANGES, FOCUSING ON
A R E A S L I K E E T H I C A L A I D E V E L O P M E N T, D A T A
PROTECTION, AND CROSS-BORDER
C O O P E R AT I O N . T H E F U T U R E R E Q U I R E S
I N T E R N AT I O N A L C O L L A B O R AT I O N T O
S TA N D A R D I Z E R E G U L AT I O N S A N D P R E V E N T
G L O B A L C Y B E R T H R E AT S , E N S U R I N G A S E C U R E
A N D E T H I C A L D I G I TA L E C O S Y S T E M .
Private Browsing
And Anonymous
Browsing
ANONYMOUS BROWSERS ALLOW USERS TO VIEW WEBSITES WITHOUT
R E V E A L I N G P E R S O N A L I N F O R M AT I O N O F U S E R . • I T C A N B E S U E D A S A
T O O L F O R G O V E R N M E N T S , J O U R N A L I S T S A N D E V E RY S E C U R I T Y C O N S C I O U S
S U R F E R S . • A P O P U L A R S O LU T I O N T O T H I S I S - P R I VAT E B R O W S I N G . •
I N C O G N I T O B R O W S I N G O P E N U P A V E R S I O N O F T H E B R O W S E R T H AT W I L L
N O T T R A C K Y O U R A C T I V I T Y. I T I S P A R T I C U L A R LY U S E F U L I F Y O U A R E
E N T E R I N G S E N S I T I V E D ATA L I K E B A N K D E TA I L S I N T O Y O U R B R O W S E R . •
PROXY WORKS AS A MIDDLEMAN BETWEEN YOUR COMPUTER AND THE
WEBSITE YOU WANT TO ACCESS. NOW THE TRACKING WEBSITE WILL GET
T H E I P A D D R E S S O F P R O X Y S I T E . • V I R T U A L P R I VAT E N E T W O R K ( V P N ) T H I S
I S A M E T H O D T O A D D S E C U R I T Y A N D P R I VA C Y T O P R I VAT E A N D P U B L I C
N E T W O R K S , L I K E W I F I H O T S P O T S A N D I N T E R N E T. I T I S O R I G I N A L LY M E A N T
F O R B U S I N E SS E M P LOY E E S W O R K I N G O F F S I T E T O G A I N AC C E SS T O S H A R E D
DRIVES OR NETWORKS.
What you
should do on
SOCIAL
NETWORKING
SITES Usage YOU SHOULD CONDUCT YOURSELF IN A
R E S P O N S I B L E W AY S O T H AT Y O U C A N E N J O Y

rules U S I N G I T. • B E A U T H E N T I C . • U S E A
DISCLAIMER. • DON’T PICK FIGHTS ONLINE. •
D O N ’ T U S E FA K E N A M E S O R P S E U D O N Y M S . •
P R O T E C T Y O U R I D E N T I T Y. • A L W A Y S T A K E
PUBLICITY TEST WHEN POST SOMETHING. •
RESPECT YOUR AUDIENCE. • RESPECT
OTHER'S SENTIMENTS. • MONITOR COMMENTS.
Thank You

You might also like