Okara history and security slides 2017

34
Security and Ethical Security and Ethical Challenges Challenges Management Information Management Information Systems Systems 1 BSIT (5th) Specially We talk about : OKARA city (History) Computer Security Security challenges Cyber Crime And other Many information about society Taimoor , Sabira , Rana Bilal , Rizwan Chuhdry Special Lecturer

Transcript of Okara history and security slides 2017

Page 1: Okara history and security slides 2017

Security and Ethical Security and Ethical ChallengesChallenges

Management Information Management Information SystemsSystems

1BSIT (5th)

Specially We talk about :

OKARA city (History)Computer SecuritySecurity challengesCyber CrimeAnd other Many information about society

Taimoor , Sabira , Rana Bilal , Rizwan Chuhdry Special Lecturer

Page 2: Okara history and security slides 2017

OkaraOkara OKARAOKARA

Area 4181 km² Area 4181 km² Number of Number of 

Union councils 60 60

Four Tahsil in OKARAFour Tahsil in OKARA

Page 3: Okara history and security slides 2017

Meer Chaaqar Rind Meer Chaaqar Rind

OKARAOKARA

Touch Three RiverTouch Three River Milk of LakeMilk of Lake DEPALPURDEPALPUR 2500 years Before 2500 years Before

OrionOrion Population in 1998Population in 1998 S.YONANI injured S.YONANI injured

Okara KingOkara King Proud of Bloch familyProud of Bloch family

Page 4: Okara history and security slides 2017

OKARAOKARA Ahmed khan kharalAhmed khan kharal 18571857 Fight against Fight against

English ArmyEnglish Army

Page 5: Okara history and security slides 2017

Computer securityComputer security

Computer securityComputer security, also known as , also known as cyber security or IT cyber security or IT securitysecurity, is the , is the protection of protection of computercomputer systems  systems from the theft or damage to the from the theft or damage to the hardware, software or the hardware, software or the information on them, as well as from information on them, as well as from disruption or misdirection of the disruption or misdirection of the services they provide.services they provide.

Page 6: Okara history and security slides 2017

Our Mistake Our Mistake

Page 7: Okara history and security slides 2017
Page 8: Okara history and security slides 2017

Security challengesSecurity challengesComputer crimes that exist in the Computer crimes that exist in the

present society are:-present society are:- HackingHacking Cyber TheftCyber Theft Unauthorized use at workUnauthorized use at work Software PiracySoftware Piracy Piracy of intellectual propertyPiracy of intellectual property Computer viruses and wormsComputer viruses and worms

Management Information Systems 8

Page 9: Okara history and security slides 2017

HackingHackingHacking is the obsessive use of computers, or Hacking is the obsessive use of computers, or

the unauthorized access and use of the unauthorized access and use of networked computer systems. Hackers networked computer systems. Hackers usuallyusually

Steal or damage dataSteal or damage data Get unauthorized access to computer filesGet unauthorized access to computer files Monitor e-mails or web server accessMonitor e-mails or web server access May use remote services that allow one May use remote services that allow one

computer to execute programs on anothercomputer to execute programs on another Plant data that will cause system to welcome Plant data that will cause system to welcome

intrudersintrudersManagement Information Systems 9

Page 10: Okara history and security slides 2017

Cyber TheftCyber Theft

Cyber theft involves theft of money by Cyber theft involves theft of money by unauthorized network entry and unauthorized network entry and fraudulent alteration of computer fraudulent alteration of computer databases.databases.

Management Information Systems 10

Page 11: Okara history and security slides 2017

Unauthorized use at WorkUnauthorized use at Work

Unauthorized use of computer Unauthorized use of computer resources especially by employeesresources especially by employees

Playing video gamesPlaying video games Unauthorized use of internetUnauthorized use of internet Non-work related upload/downloadNon-work related upload/download Transmission of confidential dataTransmission of confidential data Moonlighting Moonlighting

Management Information Systems 11

Page 12: Okara history and security slides 2017

Software PiracySoftware Piracy

Unauthorized copying of data is called Unauthorized copying of data is called software piracy or software theftsoftware piracy or software theft

Software is protected by copyright law Software is protected by copyright law and user license agreement that and user license agreement that allows only limited copies to be madeallows only limited copies to be made

Management Information Systems 12

Page 13: Okara history and security slides 2017

Piracy of Intellectual PropertyPiracy of Intellectual Property

Materials other than software are also Materials other than software are also pirated by making multiple copiespirated by making multiple copies

Piracy of music, video, images, Piracy of music, video, images, articles, books etc.articles, books etc.

Dissemination of these material Dissemination of these material through internet websitesthrough internet websites

Management Information Systems 13

Page 14: Okara history and security slides 2017

Computer viruses and wormsComputer viruses and worms A virus is a program code that cannot work without A virus is a program code that cannot work without

being inserted into another programbeing inserted into another program A worm is a distinct program that can run unaidedA worm is a distinct program that can run unaidedThese programs copy annoying or destructive routines These programs copy annoying or destructive routines

into the networked computer systems of anyone who into the networked computer systems of anyone who accesses computers affected with the virus or who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected uses copies of magnetic disks taken from infected computerscomputers

They enter a computer through e-mail or file They enter a computer through e-mail or file attachments, or through illegal software. A virus attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted main memory and thus hard disk and any inserted external memory.external memory.

Management Information Systems 14

Page 15: Okara history and security slides 2017

Privacy IssuesPrivacy Issues

Privacy on the internetPrivacy on the internet Computer MatchingComputer Matching Privacy LawsPrivacy Laws Computer libel and censorship Computer libel and censorship

(threats are spamming and flaming)(threats are spamming and flaming)

Management Information Systems 15

Page 16: Okara history and security slides 2017

Other ChallengesOther Challenges Employment challenges because a lot of Employment challenges because a lot of

tasks have been automatedtasks have been automated Computer monitoring causes intrusion in Computer monitoring causes intrusion in

personal space for workerspersonal space for workers Challenges in working conditions are caused Challenges in working conditions are caused

by tasks which are monotonous in nature. by tasks which are monotonous in nature. But it also automates most of the work and But it also automates most of the work and gives way to more challenging jobsgives way to more challenging jobs

Challenges to individuality as they eliminate Challenges to individuality as they eliminate the human relationships between peoplethe human relationships between people

Management Information Systems 16

Page 17: Okara history and security slides 2017

Health issuesHealth issues The use of IT in the workplace raises a variety of

health issues. Heavy use of computers is reportedly causing health problems such as:

· Job stress · Damaged arm and neck muscles · Eye strain · Radiation exposure · Death by computer-caused accidents

Management Information Systems 17

Page 18: Okara history and security slides 2017

BenefitsBenefits

Medical diagnosisMedical diagnosis Crime controlCrime control Environmental monitoringEnvironmental monitoring Urban planningUrban planning Computer based trainingComputer based training Distance learningDistance learning

Management Information Systems 18

Page 19: Okara history and security slides 2017

Ethical responsibility of business Ethical responsibility of business professionalsprofessionals

Business ethics are concerned withBusiness ethics are concerned with EquityEquity RightsRights HonestyHonesty Exercise of corporate powerExercise of corporate power

Management Information Systems 19

Page 20: Okara history and security slides 2017

Categories of Ethical Business IssuesCategories of Ethical Business Issues

Management Information Systems 20

Page 21: Okara history and security slides 2017

CYBER CRIME IN PAKISTANCYBER CRIME IN PAKISTAN

Cybercrime, also called computer crime, is any Cybercrime, also called computer crime, is any illegal activity that involves a computer or illegal activity that involves a computer or network-connected device, such as a mobile network-connected device, such as a mobile phone. crimes in which the computing device is phone. crimes in which the computing device is the target, for example, to gain network access; the target, for example, to gain network access; crimes in which the computer is used as a crimes in which the computer is used as a weapon, for example, weapon, for example,

any criminal activity that uses a computer device any criminal activity that uses a computer device or Ineternet is called cyber crimeor Ineternet is called cyber crime

Management Information Systems 21

Page 22: Okara history and security slides 2017

TYPES OF CYBER CRIMETYPES OF CYBER CRIME

Hacking Hacking Phishing Phishing SpoofingSpoofing ScamScam virus ATTACKvirus ATTACK

Management Information Systems 22

Page 23: Okara history and security slides 2017

TYPESTYPES hacking in simple term means illegal instruction into a computer hacking in simple term means illegal instruction into a computer

systemsystem without the permission of computer .ownerwithout the permission of computer .owner phishingphishing LOGIN PAGE LOGIN PAGE NOT A ACTUAL Official PAGE NOT A ACTUAL Official PAGE build BANK WEBSITE build BANK WEBSITE NOT A OFFICAL BANK WEBSIE NOT A OFFICAL BANK WEBSIE

GET THE USER NAME AND PASSWORDGET THE USER NAME AND PASSWORDTHE ACCOUNT NUMBERTHE ACCOUNT NUMBER

Management Information Systems 23

Page 24: Okara history and security slides 2017

Management Information Systems 24

Page 25: Okara history and security slides 2017

GET USER INFORMATIONGET USER INFORMATIONGET THE ACCOUNT NUMBERGET THE ACCOUNT NUMBER AND ALL INFORMATION RELATED TO THE ACCONT AND ALL INFORMATION RELATED TO THE ACCONT for security purpose you can change your password for security purpose you can change your password

CRIMINAL SEND SMS CRIMINAL SEND SMS CRIMAL SEND EMAIL TO THE USERCRIMAL SEND EMAIL TO THE USER CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE use key logger software use key logger software

Management Information Systems 25

Page 26: Okara history and security slides 2017

SCAMINGSCAMING

1.1. A scam is a quick-profit scheme where a person cheats another A scam is a quick-profit scheme where a person cheats another individual or group out of money by presenting them with false individual or group out of money by presenting them with false information during a deal or offer.information during a deal or offer.

2.2. There are many different types of scams Scammers can approach There are many different types of scams Scammers can approach their victims via email, SMS, and sometimes even a phone to your their victims via email, SMS, and sometimes even a phone to your personal cell number.personal cell number.

3.3. . In this scheme, a person receives news via phone call or email that . In this scheme, a person receives news via phone call or email that they have won the lottery and can retrieve the cash prize after they have won the lottery and can retrieve the cash prize after submitting a small processing fee. After submitting the fee, the submitting a small processing fee. After submitting the fee, the attacker disappears with the money.attacker disappears with the money.

4.4. use websites use websites 5.5. social mediasocial media6.6. scammer can also use face book pages scammer can also use face book pages 7.7. face book groupsface book groups

Management Information Systems 26

Page 27: Okara history and security slides 2017

SCAMINGSCAMINGMOSTLY ECOMERCE WEBSITES ARE MOSTLY ECOMERCE WEBSITES ARE

INVOLED IN SACAMSINVOLED IN SACAMSBAD PRODUCTSBAD PRODUCTSHIGH PRICEHIGH PRICEYOU CAN CHECK THE WEBSITE FAQ'SYOU CAN CHECK THE WEBSITE FAQ'SCHECK THE ADMIN GROUP CHECK THE ADMIN GROUP

DESCRIPTION DESCRIPTION

Management Information Systems 27

Page 28: Okara history and security slides 2017
Page 29: Okara history and security slides 2017

LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANPAKISTAN

spreading False Information up to 3 Years spreading False Information up to 3 Years in Prison or up to Rs. 1 Million in Finein Prison or up to Rs. 1 Million in FineYou know that an information is wrong and You know that an information is wrong and you still post or share it on Facebook about you still post or share it on Facebook about a person that damages his/her reputationa person that damages his/her reputation

Making / Spreading Explicit Images or Making / Spreading Explicit Images or Videos of an Individual: up to 5 Years in Videos of an Individual: up to 5 Years in Prison or up to Rs. 5 Million in Fine or bothPrison or up to Rs. 5 Million in Fine or bothphotoshop any imagephotoshop any image

Management Information Systems 29

Page 30: Okara history and security slides 2017

LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN

Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or bothbothIf you try to get into a relation with someone online If you try to get into a relation with someone online through internet website, email, SMS, phone or any through internet website, email, SMS, phone or any communication tool despite there is disinterest from communication tool despite there is disinterest from the other party then you can be jailed for three the other party then you can be jailed for three years or imposed a fine which may extend to one years or imposed a fine which may extend to one million rupees or with both.million rupees or with both.You repeatedly call someoneYou repeatedly call someoneIf you call, chat with someone and other party has If you call, chat with someone and other party has no issues with that then its all cool, nothing to worry no issues with that then its all cool, nothing to worry about.about.

Management Information Systems 30

Page 31: Okara history and security slides 2017

LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN

Making Videos/Pics and Distributing without Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up to Rs. 1 Million Consent: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both,,in Fine or both,,You take a photograph or make a video of any You take a photograph or make a video of any person and displays or distributes it without his/her person and displays or distributes it without his/her consent in a manner that harms a person then you consent in a manner that harms a person then you can go behind bars for up to three years and may can go behind bars for up to three years and may have to bear a fine of up to Rs. 1 million or bothhave to bear a fine of up to Rs. 1 million or both

Spoofing: Up to 3 Years in Jail or Fine up to Rs. Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both500,00 or both

Management Information Systems 31

Page 32: Okara history and security slides 2017

LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN

virus Code: Up to 2 Years in Jail or up virus Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Bothto Rs. 1 Million in Fine or BothYou write a virusYou write a virusYou write a code that can be used to You write a code that can be used to destruct a hard drivedestruct a hard driveYou develop a mobile app to spy You develop a mobile app to spy someonesomeoneYo develop an app to spread virusYo develop an app to spread virus

Management Information Systems 32

Page 33: Okara history and security slides 2017

LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN

Unauthorized copying or transmission of Data: up to Unauthorized copying or transmission of Data: up to 6 Months Prison or up to Rs. 100,000 Fine or both6 Months Prison or up to Rs. 100,000 Fine or bothIf you copies data of someone else’s flash driveIf you copies data of someone else’s flash driveIf you gain access to someone’s phone and copy a If you gain access to someone’s phone and copy a mobile numbermobile number

Unauthorized use of identity information: Up to 3 Unauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine or bothYears in Prison or up to Rs. 5 Million fine or bothYou use someone’s email address You use someone’s email address

Management Information Systems 33

Page 34: Okara history and security slides 2017