SlideShare una empresa de Scribd logo
1 de 24
Professional Practices
SS-301
Ehtesham Raza,
Assistant Professor,
Govt. Murray College,
Sialkot.
Lecture 10:
Information Security and
Privacy
Topic: Information Security Practices
• Introduction
• The CIA: Information Security Principles
• Information Security Organizational
Structure
• Information Classification
Introduction
• Information security, sometimes shortened to
InfoSec, is the practice of
defending information from unauthorized access,
use, disclosure, disruption, modification,
inspection, recording or destruction. It is a general
term that can be used regardless of the form the
data may take (e.g. electronic, physical)
The CIA:
Information Security Principles
• The CIA principle
– Confidentiality
– Integrity
– Availability
Information Security Organizational Structure
Information Classification
• Information Classification
• Government classifications
• Private Sector classifications
– Criteria
Lecture 11:
Computer Misuse and
Criminal Law
Computer Misuse & Criminal
Law
Introduction:
The media and popular computing press
abound with tales of multi-million pound
computer frauds and of the dangers to
commercial companies, governmental data
banks, financial institutions and national
security from the activities of computer
hackers
Computing and criminal activity
• Modern business process is done through
utilizing computer software and hardware,
i.e. some form of computer system is used
in it.
• There has been a sharp rise in the number
of crimes involving computing; and the
Internet has undoubtedly created new
security risks
Categories of misuse
Under the study of the English criminal law, the Law
Commission highlighted a number of categories of misuse
of computers
• Computer fraud
• Unauthorized obtaining of information from a computer
– Computer hacking
– Eavesdropping on a computer
– Making unauthorized use of computers for personal benefit
• Unauthorized alteration or destruction of information
stored on a computer
• Denying access to an authorized user
• The unauthorized removal of information stored on a
computer
Computer Fraud
• The Law Commission defined computer fraud as conduct
which involves the manipulation of a computer or internet,
by whatever method, in order dishonestly to obtain money,
property, or some other advantage of value, or to cause
loss
• Computer fraud is further divided into three categories
– Input frauds
e.g. intentionally entering false data or amending data into the
computer
– Output frauds
Output fraud involves stealing or misusing system output
– Program frauds
Program fraud involves the dishonest alteration of a computer
program
Obtaining unauthorized access
to a computer
• The second form of misuse identified by
the Law Commission was unauthorized
obtaining of information from a computer.
It is sub-divided as:
• Computer hacking:
Accessing a computer without the authorization
of the owner. In this case the person accesses
the computer secretly for stealing information,
data or manipulation of data for diverse
purposes
Continued…
• Eavesdropping
Literal meaning listening or spying secretly
• Unauthorized use of a
computer for personal benefit
Using computer’s authorized information for
personal benefits. In this case, the person
misusing the computer is usually employee or
authorized user of the company
Lecture 12:
Social Networking & Ethics
Topic: Social Networking & Ethics
• Introduction
• The Good, the Bad and the Ugly
• How to Protect yourself
• How to protect your children
Introduction to Social Networking & Ethics
Def: When a computer network connects people
or organizations, it is a social network. Just as
a computer network is a set of machines
connected by a set of cables, a social network
is a set of people (or organizations or other
social entities) connected by a set of social
relationships, such as friendship, coworking or
information exchange
National Cyber Alert System
• Web 2.0
– Facebook & Myspace - Free-access social
networking websites
– Twitter – “micro” blog – 280 characters or less
– Blog – shared on-line journal
– Video Sharing Sites – YouTube, Flikr
– Podcast – audio broadcast that can be downloaded
The Good, the Bad and the Ugly
• Example
The case of a person asking for emergency money while
impersonating a Facebook user to her friends
http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-
facebook/ Also the British MI6 chief that was exposed by his
wife’s Facebook pictures:
http://www.dailymail.co.uk/news/article-1197562/MI6-chief-
blows-cover-wifes-Facebook-account-reveals-family-holidays-
showbiz-friends-links-David-Irving.html
How to Protect Your Self
• Keep private information private
• Do not post address, ssn, phone number,
financial info, your schedule, full birth date
• Be careful not to display information used to
answer security questions (e.g., favorite pet,
mother’s maiden name)
• Use caution when you click links
• Be careful about installing extras on your site
• Be wary of unknown friends (strangers)
• Google yourself
• Don’t blindly connect
• Trust your gut instinct
• Use and maintain anti-virus software
• Use strong passwords
• Don’t use the same password for a social networking
site and for your email
• Remember - social networking sites are a public
resource – like a billboard in cyberspace
• Evaluate sites privacy settings
• Lock down your profile information to people you
accepts as a friend. That way no one can read your
personal information unless they are an approved
friend
• Be skeptical
How to Protect Your Children
• “It’s 10 p.m., do you know where your
children are?”
– “And who they are talking to online?”
– Age limits on some social networking sites
– Facebook and MySpace open to people 13 and
older
– Twitter open to all
Thank you!

Más contenido relacionado

La actualidad más candente

Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skillsHamza Cheema
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course OutlineSaqib Raza
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethicsWaqar Ahmad
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 

La actualidad más candente (20)

Software liability
Software liabilitySoftware liability
Software liability
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Computer security
Computer securityComputer security
Computer security
 
system Security
system Security system Security
system Security
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethics
 
Intruders
IntrudersIntruders
Intruders
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Cia security model
Cia security modelCia security model
Cia security model
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
The need for security
The need for securityThe need for security
The need for security
 

Similar a computer misuse n criminal law

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Technology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxTechnology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxjohnmarklagarto1
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 

Similar a computer misuse n criminal law (20)

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Technology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxTechnology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptx
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Hacking
Hacking Hacking
Hacking
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
E commerce
E commerce E commerce
E commerce
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 

Más de Hamza Cheema

professional ethics
professional ethicsprofessional ethics
professional ethicsHamza Cheema
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflictsHamza Cheema
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computingHamza Cheema
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalismHamza Cheema
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgentHamza Cheema
 
time management islamic way
time management islamic waytime management islamic way
time management islamic wayHamza Cheema
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective peopleHamza Cheema
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)Hamza Cheema
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organizationHamza Cheema
 
finance and accounting
finance and accountingfinance and accounting
finance and accountingHamza Cheema
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw houseHamza Cheema
 

Más de Hamza Cheema (20)

seven habits
seven habitsseven habits
seven habits
 
leadership
leadershipleadership
leadership
 
time management
time managementtime management
time management
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
the profession
 the profession the profession
the profession
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflicts
 
swot-analysis
swot-analysisswot-analysis
swot-analysis
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalism
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgent
 
time management islamic way
time management islamic waytime management islamic way
time management islamic way
 
time management
time managementtime management
time management
 
professionalism
professionalismprofessionalism
professionalism
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective people
 
leardeship
leardeshipleardeship
leardeship
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organization
 
hackivism
hackivismhackivism
hackivism
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

computer misuse n criminal law

  • 1. Professional Practices SS-301 Ehtesham Raza, Assistant Professor, Govt. Murray College, Sialkot.
  • 3. Topic: Information Security Practices • Introduction • The CIA: Information Security Principles • Information Security Organizational Structure • Information Classification
  • 4. Introduction • Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical)
  • 5. The CIA: Information Security Principles • The CIA principle – Confidentiality – Integrity – Availability
  • 7. Information Classification • Information Classification • Government classifications • Private Sector classifications – Criteria
  • 8. Lecture 11: Computer Misuse and Criminal Law
  • 9. Computer Misuse & Criminal Law Introduction: The media and popular computing press abound with tales of multi-million pound computer frauds and of the dangers to commercial companies, governmental data banks, financial institutions and national security from the activities of computer hackers
  • 10. Computing and criminal activity • Modern business process is done through utilizing computer software and hardware, i.e. some form of computer system is used in it. • There has been a sharp rise in the number of crimes involving computing; and the Internet has undoubtedly created new security risks
  • 11. Categories of misuse Under the study of the English criminal law, the Law Commission highlighted a number of categories of misuse of computers • Computer fraud • Unauthorized obtaining of information from a computer – Computer hacking – Eavesdropping on a computer – Making unauthorized use of computers for personal benefit • Unauthorized alteration or destruction of information stored on a computer • Denying access to an authorized user • The unauthorized removal of information stored on a computer
  • 12. Computer Fraud • The Law Commission defined computer fraud as conduct which involves the manipulation of a computer or internet, by whatever method, in order dishonestly to obtain money, property, or some other advantage of value, or to cause loss • Computer fraud is further divided into three categories – Input frauds e.g. intentionally entering false data or amending data into the computer – Output frauds Output fraud involves stealing or misusing system output – Program frauds Program fraud involves the dishonest alteration of a computer program
  • 13. Obtaining unauthorized access to a computer • The second form of misuse identified by the Law Commission was unauthorized obtaining of information from a computer. It is sub-divided as: • Computer hacking: Accessing a computer without the authorization of the owner. In this case the person accesses the computer secretly for stealing information, data or manipulation of data for diverse purposes
  • 14. Continued… • Eavesdropping Literal meaning listening or spying secretly • Unauthorized use of a computer for personal benefit Using computer’s authorized information for personal benefits. In this case, the person misusing the computer is usually employee or authorized user of the company
  • 16. Topic: Social Networking & Ethics • Introduction • The Good, the Bad and the Ugly • How to Protect yourself • How to protect your children
  • 17. Introduction to Social Networking & Ethics Def: When a computer network connects people or organizations, it is a social network. Just as a computer network is a set of machines connected by a set of cables, a social network is a set of people (or organizations or other social entities) connected by a set of social relationships, such as friendship, coworking or information exchange
  • 18. National Cyber Alert System • Web 2.0 – Facebook & Myspace - Free-access social networking websites – Twitter – “micro” blog – 280 characters or less – Blog – shared on-line journal – Video Sharing Sites – YouTube, Flikr – Podcast – audio broadcast that can be downloaded
  • 19. The Good, the Bad and the Ugly • Example The case of a person asking for emergency money while impersonating a Facebook user to her friends http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on- facebook/ Also the British MI6 chief that was exposed by his wife’s Facebook pictures: http://www.dailymail.co.uk/news/article-1197562/MI6-chief- blows-cover-wifes-Facebook-account-reveals-family-holidays- showbiz-friends-links-David-Irving.html
  • 20. How to Protect Your Self • Keep private information private • Do not post address, ssn, phone number, financial info, your schedule, full birth date • Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name) • Use caution when you click links • Be careful about installing extras on your site
  • 21. • Be wary of unknown friends (strangers) • Google yourself • Don’t blindly connect • Trust your gut instinct • Use and maintain anti-virus software • Use strong passwords
  • 22. • Don’t use the same password for a social networking site and for your email • Remember - social networking sites are a public resource – like a billboard in cyberspace • Evaluate sites privacy settings • Lock down your profile information to people you accepts as a friend. That way no one can read your personal information unless they are an approved friend • Be skeptical
  • 23. How to Protect Your Children • “It’s 10 p.m., do you know where your children are?” – “And who they are talking to online?” – Age limits on some social networking sites – Facebook and MySpace open to people 13 and older – Twitter open to all