-
Module 1 3
Introduction
-
Lecture1.130 min
-
Lecture1.205 min
-
Lecture1.305 min
-
-
Module 2 18
Fundamental Elements of Cybersecurity
-
Lecture2.105 min
-
Lecture2.205 min
-
Lecture2.305 min
-
Lecture2.405 min
-
Lecture2.505 min
-
Lecture2.605 min
-
Lecture2.705 min
-
Lecture2.805 min
-
Lecture2.905 min
-
Lecture2.1005 min
-
Lecture2.1105 min
-
Lecture2.1205 min
-
Lecture2.1305 min
-
Lecture2.1405 min
-
Lecture2.1505 min
-
Lecture2.1605 min
-
Lecture2.1705 min
-
Lecture2.1805 min
-
-
Module 3 13
Introduction to Cyber Threats
-
Lecture3.105 min
-
Lecture3.205 min
-
Lecture3.305 min
-
Lecture3.405 min
-
Lecture3.505 min
-
Lecture3.605 min
-
Lecture3.705 min
-
Lecture3.805 min
-
Lecture3.905 min
-
Lecture3.1005 min
-
Lecture3.1105 min
-
Lecture3.1205 min
-
Lecture3.1305 min
-
-
Module 4 12
Security Risk Analysis and Management
-
Lecture4.105 min
-
Lecture4.205 min
-
Lecture4.305 min
-
Lecture4.405 min
-
Lecture4.505 min
-
Lecture4.605 min
-
Lecture4.705 min
-
Lecture4.805 min
-
Lecture4.905 min
-
Lecture4.1005 min
-
Lecture4.1105 min
-
Lecture4.1205 min
-
-
Module 5 3
Cybersecurity Laws
-
Lecture5.105 min
-
Lecture5.205 min
-
Lecture5.305 min
-
-
Module 6 1
Conclusion
-
Lecture6.105 min
-
-
Exam 1
-
Quiz7.130 questionsFinal
-
Activities Declared Criminal in Cybersecurity laws
Taking into account the adversities of cybercrimes, different activities are declared analogous to criminal offenses under cybersecurity laws. Following are the activities that are declared criminal under cybersecurity laws:
- Internet and e-mail fraud.
- Identity fraud involving stealing and misusing someone’s personal information without his/her consent.
- Unauthorized access and transmission of confidential corporate data.
- Ransomware attacks.
- Cyber spying, where sensitive state-level information is intercepted.
- Crypto-jacking, where hacking is done via cryptocurrency mining.
- Copyrights infringement.
- Illegal gambling.
- Device misuse.
- Selling of prohibited items online or via the dark web.
These are the general activities that are considered criminal under cybersecurity laws. However, given the gravity of loss or extent of cybercrime, other activities might also amount to prosecution under criminal activities as part of cybersecurity laws.