SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Security,
Copyright and
The Law
Syed Zaid Irshad
Outline
– Computer Crime
– Computer Viruses
– Cyber Crimes and Their Punishments in Pakistan
Computer Crime
– Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech
crime.
– Computer crime is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses or steals a company's
or individual's private information.
– In some cases, this person or group of individuals may be malicious and destroy
or otherwise corrupt the computer or data files.
Computer Crime
– Copyright violation
– Stealing or using another person's copyrighted material without permission.
– Cracking
– Breaking or deciphering codes that are being used to protect data.
– Cyber terrorism
– Hacking, threats, and blackmailing towards a business or person.
– Cyberbully or Cyberstalking
– Harassing or stalking others online.
Computer Crime
– Cybersquatting
– Setting up a domain of another person or company with the sole intentions of selling
it to them later at a premium price.
– Creating Malware
– Writing, creating, or distributing malware (e.g., viruses and spyware.)
– Denial of Service attack
– Overloading a system with so many requests it cannot serve normal requests.
– Espionage
– Spying on a person or business.
Computer Crime
– Fraud
– Manipulating data
– Harvesting
– Collect account or another account related information on other people.
– Identity theft
– Pretending to be someone you are not.
– Illegal sales
– Buying or selling illicit goods online including drugs, guns, and psychotropic
substances.
Computer Crime
– Intellectual property theft
– Stealing practical or conceptual information developed by another person or company.
– IPR violation
– An intellectual property rights violation is any infringement of another's copyright, patent,
or trademark.
– Phishing
– Deceiving individuals to gain private or personal information about that person.
– Salami slicing
– Stealing tiny amounts of money from each transaction.
Computer Crime
– Scam
– Tricking people into believing something that is not true.
– Slander
– Posting libel or slander against another person or company.
– Software piracy
– Copying, distributing or using software that is Copyrighted that you did not purchase.
– Spamming
– Distributed unsolicited e-mail to dozens or hundreds of different addresses.
Computer Crime
– Spoofing
– Deceiving a system into thinking you are someone you are not.
– Typo squatting
– Setting up a domain that is a misspelling of another domain.
– Unauthorized access
– Gaining access to systems you have no permission to access.
– Wiretapping
– Connecting a device to a phone line to listen to conversations.
Computer Virus
– A computer virus is a malicious program that self-replicates by copying itself to
another program.
– A computer virus operates in two ways:
– The first kind, as soon as it lands on a new computer, begins to replicate.
– The second type plays dead until the triggered kick starts the malicious code.
– Viruses can be spread through email and text message attachments, Internet
file downloads, and social media scam links.
– Your mobile devices and smartphones can become infected with mobile viruses
through shady App downloads.
Computer Virus
– RESIDENT VIRUS: Resident viruses set up shop in your RAM and meddle with
your system operations. They’re so sneaky that they can even attach
themselves to your anti-virus software files.
– MULTIPARTITE VIRUS: This virus infects the entire system. Multipartite viruses
spread by performing unauthorized actions on your operating system, folders,
and programs.
– DIRECT ACTION: This virus targets a specific file type, most commonly
executable files (.exe), by replicating and infecting files. Due to its targeted
nature, this virus type is one of the easier ones to detect and remove.
Computer Virus
– BROWSER HIJACKER: Easily detected, this virus type infects your browser and
redirects you to malicious websites.
– OVERWRITE VIRUS: Like the name implies, overwrite viruses overwrite file
content to infect entire folders, files, and programs.
– WEB SCRIPTING VIRUS: This sneaky virus disguises itself in the coding of links,
ads, images, videos, and site code. It can infect systems when users download
malicious files or visit malicious websites.
– FILE INFECTOR: By targeting executable files (.exe), file infector viruses slow
down programs and damage system files when a user runs them.
Computer Virus
– NETWORK VIRUS: Network viruses travel through network connections and
replicate themselves through shared resources.
– BOOT SECTOR VIRUS: One of the easier viruses to avoid, this virus hides out in a
file on a USB drive or email attachment. When activated, it can infect the
system’s master boot record to damage the system.
Computer Virus
– 8 Most Famous Computer Viruses of All Time:
– CryptoLocker
– CryptoLocker spread through email attachments and encrypted the user’s files so that they couldn’t
access them.
– ILOVEYOU
– While ILOVEYOU sounds like a cheerful bon mot you might find printed on the inside of a Valentine’s
Day card, it’s actually far, far more sinister than that. ILOVEYOU is one of the most well-known and
destructive viruses of all time. ($15 billion.)
– MyDoom
– MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based worm ever.
MyDoom was an odd one, as it hit tech companies like SCO, Microsoft, and Google with a Distributed
Denial of Service attack. ($38 billion)
Computer Virus
– Storm Worm
– Storm Worm was a particularly vicious virus that made the rounds in 2006 with a subject
line of ‘230 dead as storm batters Europe’. Intrigued, people would open the email and
click on a link to the news story and that’s when the problems started.
– Sasser & Netsky
– Sasser spread through infected computers by scanning random IP addresses and
instructing them to download the virus. Netsky was the more familiar email-based worm.
($31 billion)
– Anna Kournikova
– Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject was “Here
you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs. ($166,000)
Computer Virus
– Slammer
– Slammer is the kind of virus that makes it into films, as only a few minutes after
infecting its first victim, it was doubling itself every few seconds. (Around $1 billion)
– Stuxnet
– Stuxnet is easily the scariest virus on the list as it was built by government engineers
in the US with the intention of obstructing nukes from being built in Iran. (Unknown)
Cyber Crimes and Their
Punishments in Pakistan
– Spreading False Information about an Individual: up to 3 Years in Prison or up to
Rs. 1 Million in Fine or both
– Making / Spreading Explicit Images or Videos of an Individual: up to 5 Years in
Prison or up to Rs. 5 Million in Fine or both
– Making / Spreading Explicit Images or Videos of Minor: up to 7 Years in Prison or
up to Rs. 5 Million in Fine or both
– Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
– Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up
to Rs. 1 Million in Fine or both
Cyber Crimes and Their
Punishments in Pakistan
– Hacking Email / phone for Stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in
Fine or both
– Cyber Stalking with a Minor: Up to 5 Years in Jail and up to Rs. 10 Million in Fine
– Hate speech: Up to 7 Years in Prison or fine or both
– Spamming: Three Months of Prison or Fine up to Rs. 5 Million or Both
– Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both
– Malicious Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both
– Unauthorized Access to Information System or Data: up to 3 Months Prison or
up to Rs. 50,000 Fine or both

Más contenido relacionado

La actualidad más candente

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
computer crime
computer crimecomputer crime
computer crime00jitesh00
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp updateyahooteacher
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentationMaazUddin7
 
Name parul
Name parulName parul
Name parulParul231
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 

La actualidad más candente (19)

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
computer crime
computer crimecomputer crime
computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Name parul
Name parulName parul
Name parul
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 

Similar a Security, Copyright and the Law

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 

Similar a Security, Copyright and the Law (20)

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Más de Syed Zaid Irshad

Más de Syed Zaid Irshad (20)

Operating System.pdf
Operating System.pdfOperating System.pdf
Operating System.pdf
 
DBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_SolutionDBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_Solution
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 
Reduce course notes class xii
Reduce course notes class xiiReduce course notes class xii
Reduce course notes class xii
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 
C Language
C LanguageC Language
C Language
 
Flowchart
FlowchartFlowchart
Flowchart
 
Algorithm Pseudo
Algorithm PseudoAlgorithm Pseudo
Algorithm Pseudo
 
Computer Programming
Computer ProgrammingComputer Programming
Computer Programming
 
ICS 2nd Year Book Introduction
ICS 2nd Year Book IntroductionICS 2nd Year Book Introduction
ICS 2nd Year Book Introduction
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
Data Communication
Data CommunicationData Communication
Data Communication
 
Information Networks
Information NetworksInformation Networks
Information Networks
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
 
Introduction to ICS 1st Year Book
Introduction to ICS 1st Year BookIntroduction to ICS 1st Year Book
Introduction to ICS 1st Year Book
 
Using the set operators
Using the set operatorsUsing the set operators
Using the set operators
 
Using subqueries to solve queries
Using subqueries to solve queriesUsing subqueries to solve queries
Using subqueries to solve queries
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Security, Copyright and the Law

  • 2. Outline – Computer Crime – Computer Viruses – Cyber Crimes and Their Punishments in Pakistan
  • 3. Computer Crime – Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech crime. – Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. – In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
  • 4. Computer Crime – Copyright violation – Stealing or using another person's copyrighted material without permission. – Cracking – Breaking or deciphering codes that are being used to protect data. – Cyber terrorism – Hacking, threats, and blackmailing towards a business or person. – Cyberbully or Cyberstalking – Harassing or stalking others online.
  • 5. Computer Crime – Cybersquatting – Setting up a domain of another person or company with the sole intentions of selling it to them later at a premium price. – Creating Malware – Writing, creating, or distributing malware (e.g., viruses and spyware.) – Denial of Service attack – Overloading a system with so many requests it cannot serve normal requests. – Espionage – Spying on a person or business.
  • 6. Computer Crime – Fraud – Manipulating data – Harvesting – Collect account or another account related information on other people. – Identity theft – Pretending to be someone you are not. – Illegal sales – Buying or selling illicit goods online including drugs, guns, and psychotropic substances.
  • 7. Computer Crime – Intellectual property theft – Stealing practical or conceptual information developed by another person or company. – IPR violation – An intellectual property rights violation is any infringement of another's copyright, patent, or trademark. – Phishing – Deceiving individuals to gain private or personal information about that person. – Salami slicing – Stealing tiny amounts of money from each transaction.
  • 8. Computer Crime – Scam – Tricking people into believing something that is not true. – Slander – Posting libel or slander against another person or company. – Software piracy – Copying, distributing or using software that is Copyrighted that you did not purchase. – Spamming – Distributed unsolicited e-mail to dozens or hundreds of different addresses.
  • 9. Computer Crime – Spoofing – Deceiving a system into thinking you are someone you are not. – Typo squatting – Setting up a domain that is a misspelling of another domain. – Unauthorized access – Gaining access to systems you have no permission to access. – Wiretapping – Connecting a device to a phone line to listen to conversations.
  • 10. Computer Virus – A computer virus is a malicious program that self-replicates by copying itself to another program. – A computer virus operates in two ways: – The first kind, as soon as it lands on a new computer, begins to replicate. – The second type plays dead until the triggered kick starts the malicious code. – Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. – Your mobile devices and smartphones can become infected with mobile viruses through shady App downloads.
  • 11. Computer Virus – RESIDENT VIRUS: Resident viruses set up shop in your RAM and meddle with your system operations. They’re so sneaky that they can even attach themselves to your anti-virus software files. – MULTIPARTITE VIRUS: This virus infects the entire system. Multipartite viruses spread by performing unauthorized actions on your operating system, folders, and programs. – DIRECT ACTION: This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of the easier ones to detect and remove.
  • 12. Computer Virus – BROWSER HIJACKER: Easily detected, this virus type infects your browser and redirects you to malicious websites. – OVERWRITE VIRUS: Like the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs. – WEB SCRIPTING VIRUS: This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites. – FILE INFECTOR: By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.
  • 13. Computer Virus – NETWORK VIRUS: Network viruses travel through network connections and replicate themselves through shared resources. – BOOT SECTOR VIRUS: One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system.
  • 14. Computer Virus – 8 Most Famous Computer Viruses of All Time: – CryptoLocker – CryptoLocker spread through email attachments and encrypted the user’s files so that they couldn’t access them. – ILOVEYOU – While ILOVEYOU sounds like a cheerful bon mot you might find printed on the inside of a Valentine’s Day card, it’s actually far, far more sinister than that. ILOVEYOU is one of the most well-known and destructive viruses of all time. ($15 billion.) – MyDoom – MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based worm ever. MyDoom was an odd one, as it hit tech companies like SCO, Microsoft, and Google with a Distributed Denial of Service attack. ($38 billion)
  • 15. Computer Virus – Storm Worm – Storm Worm was a particularly vicious virus that made the rounds in 2006 with a subject line of ‘230 dead as storm batters Europe’. Intrigued, people would open the email and click on a link to the news story and that’s when the problems started. – Sasser & Netsky – Sasser spread through infected computers by scanning random IP addresses and instructing them to download the virus. Netsky was the more familiar email-based worm. ($31 billion) – Anna Kournikova – Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject was “Here you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs. ($166,000)
  • 16. Computer Virus – Slammer – Slammer is the kind of virus that makes it into films, as only a few minutes after infecting its first victim, it was doubling itself every few seconds. (Around $1 billion) – Stuxnet – Stuxnet is easily the scariest virus on the list as it was built by government engineers in the US with the intention of obstructing nukes from being built in Iran. (Unknown)
  • 17. Cyber Crimes and Their Punishments in Pakistan – Spreading False Information about an Individual: up to 3 Years in Prison or up to Rs. 1 Million in Fine or both – Making / Spreading Explicit Images or Videos of an Individual: up to 5 Years in Prison or up to Rs. 5 Million in Fine or both – Making / Spreading Explicit Images or Videos of Minor: up to 7 Years in Prison or up to Rs. 5 Million in Fine or both – Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both – Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
  • 18. Cyber Crimes and Their Punishments in Pakistan – Hacking Email / phone for Stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both – Cyber Stalking with a Minor: Up to 5 Years in Jail and up to Rs. 10 Million in Fine – Hate speech: Up to 7 Years in Prison or fine or both – Spamming: Three Months of Prison or Fine up to Rs. 5 Million or Both – Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both – Malicious Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both – Unauthorized Access to Information System or Data: up to 3 Months Prison or up to Rs. 50,000 Fine or both