Cyber Security Legal Issues

Cyber Security Legal Issues: Hello Friends !!! I am Lokesh from Today we will discuss ‘Cyber Security Legal Issues‘, and more. We will discuss only basic information. This is a very important topic for us and we have to know about Cyber Security Legal Issues.

Cyber Security Legal Issues

What is Cyber Crime ?

If you are a teenager, you are likely active online, and you are also in touch with your friends via text messages, social networking sites like Facebook, or Instant messengers. You often keep friends informed about what is happening in your life and keep sharing music, photos, and videos.

You should understand that there are risks to your personal information, the computer, and the associated technology environment you are so dependent upon. Also, everybody needs to be aware and conscious of what is legal and not legal.

Cybercrime may be defined as: “Any illegal activity carried out through computers or the Internet is termed as Cyber Crime”.

Cyber Crime can harm the reputation of someone or cause mental disturbance to him/her directly or indirectly, using computer and telecommunication systems such as the Internet (Chat rooms, emails, social networking sites) and mobile phones (SMS/MMS).


  • Someone creating a fake profile of yours on any social networking site and posting information/ pictures which are personal or harmful is considered a cybercrime.
  • Someone selling or installing a pirated copy of software like Windows Operating System, Microsoft Office, etc.

Also Read – Cyber Threats and Protection

Types of Cyber Crimes:

Following are the types of cybercrimes:


Cyberbullying is the continuous harassment of an individual via the Internet or mobile networks.

It Includes incidents where adolescents use technology, usually computers or cell phones, to harass, threaten, humiliate or otherwise hassle their peers.


  • A youth sending hurtful text is others or spreading rumors using a cell phone or computer.
  • People create web pages, videos, profiles on social networking sites to make fun of others.
  • With cell phones, taking personal pictures where privacy is expected and posted or distributed online.

How to Prevent and Respond to Cyberbullying

  • Do not share or disclose your personal information (email address, phone numbers, photos, passwords, etc..) on the Internet.
  • Do not open or respond to messages from someone you don’t know.
  • Do not send messages when angry. Treat your friends, parents, and teachers with respect.
  • In case you have any issues with any of your friends, talk to him/her face to face rather than sending him/her a mail or posting it on some social networking site.
  • Remember that cyberbullying is an offense and you can be arrested for this. In case you are being targeted by cyberbullies, report this at once to your parents and the nearby police station.
  • Report the matter to your parents/teacher immediately
  • Report the matter to the cybercrime cell of your area. Cybercrime cell will locate the area/computer from where the information was posted and take legal action against the offender.

Identity Theft

Identity theft is stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, typically to access resources or obtain credit and other benefits in that person’s name or to hurt that person intentionally.

School kids are increasingly resorting to identity theft by creating fake profiles of their friends on social networking sites and gaining from it or causing harm to them.


  • Hari created a fake profile of Priya on a social networking site and posted objectionable pictures of her. Priya was the target of many groups because of the content that was in her profile. Ultimately Priya registered a police case and Hari was arrested.

How to Prevent and Respond to Identity Theft

  • Do not share or disclose your personal information (email address, phone number photos, passwords, etc.) on the Internet.
  • If you doing some transactions online make sure you are using your home computer (that is patched properly). Computers in Internet cafes and other places night have key logger software that will capture all your inputs and thus your personal information.
  • Do not attempt to click on any links or open any attachments from “untrusted” sources. This might lead to malicious content getting downloaded into your computer that will then send all your personal information to the hacker’s computer.


In a computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network to get an access to it.

The hacker can use different sets of tools/programs to achieve his end objective of hacking a system. Hacking can include:

  1. Cracking passwords using tools to gain entry into someone’s personal account.
  2. Using social engineering methods to obtain personal information.
  3. Creating/sending viruses/worms on the network, installing software in computers to get access to personal information of people who would log in to those computers, etc.

Creating fake e-commerce websites to access credit/debit card details. They can also gain entry to servers that have websites containing Information on credit cards of clients or customers.

Fact File: Some professional hackers do hacking for a living for corporates and some hackers hack into systems for reasons such as profit, protest, or challenge.

How you can be a Victim of Hacking in Daily Life

You need to be very careful in day-to-day Internet operations. In public place computers of cybercafés your information can be easily stolen:

  1. When you give your pen drive in a cyber café for printouts, there can be programs already installed on the system so that all the contents of your pen drive will be automatically copied onto the computer without your knowledge and consent. So always be sure that you take a formatted pen drive with just the minimum required data to such places.
  2. There could be keyloggers programs installed which record all the keystrokes did on the computer. When you log in to your e-mail account, Facebook account, or enter your debit card information, all that information can be recorded on the computer without your knowledge.
  3. Even if you are surfing the Internet in a cybercafé or a public place, somebody in the network could be watching the site you are visiting password you are entering, and all other online activities.

Even while chatting on a social networking site, never click on any link or install software sent by some unknown person as it could be a Trojan which once installed on your computer can make your computer vulnerable to the hacker. The hacker can view and control your computer remotely.

How to Prevent and Respond to Hacking

  1. Make sure your computer has a firewall installed and configured an anti-virus software and is updated regularly.
  2. Don’t keep your broadband Internet switched on at all times. This can give the hacker ample time to hack into your computer. Make sure you switch it off when you are not using the Internet
  3. Make sure you choose a difficult password/key for your wireless modem if you are using one.
  4. Do not share your personal computer or laptop with any untrusted people. If you have to, monitor all his/her movements.

Google 2-step Security

Google has come out with two-level security in its Gmail mail service where when you log in each time you will be sent a verification code on your mobile number. Your email account will open only when you will enter that verification code while login.

If you use email a lot in public places, create a Gmail account, apply the two-level security and carry your mobile with you. You will be saved from hacking, as if your username and password are recorded, still the hacker will require the verification code, which will be sent to your mobile number only.

General Rules to stay on the Right Side of the Law

  • Download files legally do not download pirates’ music software.
  • Use web content honestly- Don’t claim or infringe other’s copyright. And Plagiarism in homework or assignments.
  • Use social sites appropriately.
  • Avoid contact with strangers whom you have met only online.

I hope you have liked this article and you have learned a lot about Cyber Security and Legal Issue. If you have any questions you can comment. Thank You!!!

Also Read – Internet Telephony |IP| Domain Name (DNS) | VoIP

Leave a Comment