Cyber Law And Cyber Ethics Class 10 Computer Science Chapter-4
Cyber Law And Cyber Ethics |
Introduction
The law that legalizes electronic transactions and boosts up the E-services is known as Cyber Law. Its main purpose is to control cyber crime and maintain secure online transactions. The cyber law of Nepal is also known as Electronic Transaction and Digital Signature Act (ETDSA). It was issued on 30th Bhadra 2061 B.S. (15 September 2004). It was revised in 2063 B.S. Cyber Law deals with the issues related to digital signature, intellectual property, cyber crime.
Importance of Cyber Law
To regulate and systemized the cyber society
To control and stock various cyber related crimes
To make legal punishment against cyber criminals
To legalize the Electronic transactions
Cyber crime
Any illegal activity that is done with the help of computers and the internet is known as cyber crime. It is also known as computer crime and is one of the fastest-growing crimes around the globe.
Types of cybercrime
Hacking: Hacking refers to an unauthorized access or control over someone's computer or network by breaking security intentionally for an illegal purpose. The one who does hacking is a hacker.
Cracking: Cracking is also a popular type of cyber crime. It is an act of breaking into a computer security system.
Identity theft: It is a type of cybercrime where a person claims to be someone else in order to do financial fraud. When it is done through the internet, it is called online identity theft.
.
Pornography: It is an act of creating and distributing sexually exploited photos and videos over the internet. It is done with the purpose of creating sexual stimulation in people.
Fishing: It is a cyber attack to steal money or data by showing greed for money and asking for bank details or other information from the people.
Software piracy: It refers to the illegal copying and distributing of computer software without ownership or legal rights.
Cyber stalking: It is a criminal act where an individual uses the internet to harass or threaten someone.
Forgery: It is a cybercrime of making fake documents, modification of existing documents, or unauthorized signing of a signature without authorization.
Cyber Ethics
The set of moral principles that regulate the use of computers is known as cyber ethics.
The Commandments of Cyber ethics are listed below:
We should not use a computer to harm other people
We should not interfere with other people's computer work
We should not snoop around in other people's files
We should not use a computer to steal
We should not use a computer to bear false witness
We should not use or copy software for which you have not paid
We should not use other people's computer resources without authorization
We should not appropriate other people's intellectual output
We should think about the social consequences of the program you write
We should use a computer in ways that show consideration and respect
Comments
Post a Comment