Okara history and security slides 2017
-
Upload
taimoor-khaqan -
Category
Education
-
view
24 -
download
0
Transcript of Okara history and security slides 2017
Security and Ethical Security and Ethical ChallengesChallenges
Management Information Management Information SystemsSystems
1BSIT (5th)
Specially We talk about :
OKARA city (History)Computer SecuritySecurity challengesCyber CrimeAnd other Many information about society
Taimoor , Sabira , Rana Bilal , Rizwan Chuhdry Special Lecturer
OkaraOkara OKARAOKARA
Area 4181 km² Area 4181 km² Number of Number of
Union councils 60 60
Four Tahsil in OKARAFour Tahsil in OKARA
Meer Chaaqar Rind Meer Chaaqar Rind
OKARAOKARA
Touch Three RiverTouch Three River Milk of LakeMilk of Lake DEPALPURDEPALPUR 2500 years Before 2500 years Before
OrionOrion Population in 1998Population in 1998 S.YONANI injured S.YONANI injured
Okara KingOkara King Proud of Bloch familyProud of Bloch family
OKARAOKARA Ahmed khan kharalAhmed khan kharal 18571857 Fight against Fight against
English ArmyEnglish Army
Computer securityComputer security
Computer securityComputer security, also known as , also known as cyber security or IT cyber security or IT securitysecurity, is the , is the protection of protection of computercomputer systems systems from the theft or damage to the from the theft or damage to the hardware, software or the hardware, software or the information on them, as well as from information on them, as well as from disruption or misdirection of the disruption or misdirection of the services they provide.services they provide.
Our Mistake Our Mistake
Security challengesSecurity challengesComputer crimes that exist in the Computer crimes that exist in the
present society are:-present society are:- HackingHacking Cyber TheftCyber Theft Unauthorized use at workUnauthorized use at work Software PiracySoftware Piracy Piracy of intellectual propertyPiracy of intellectual property Computer viruses and wormsComputer viruses and worms
Management Information Systems 8
HackingHackingHacking is the obsessive use of computers, or Hacking is the obsessive use of computers, or
the unauthorized access and use of the unauthorized access and use of networked computer systems. Hackers networked computer systems. Hackers usuallyusually
Steal or damage dataSteal or damage data Get unauthorized access to computer filesGet unauthorized access to computer files Monitor e-mails or web server accessMonitor e-mails or web server access May use remote services that allow one May use remote services that allow one
computer to execute programs on anothercomputer to execute programs on another Plant data that will cause system to welcome Plant data that will cause system to welcome
intrudersintrudersManagement Information Systems 9
Cyber TheftCyber Theft
Cyber theft involves theft of money by Cyber theft involves theft of money by unauthorized network entry and unauthorized network entry and fraudulent alteration of computer fraudulent alteration of computer databases.databases.
Management Information Systems 10
Unauthorized use at WorkUnauthorized use at Work
Unauthorized use of computer Unauthorized use of computer resources especially by employeesresources especially by employees
Playing video gamesPlaying video games Unauthorized use of internetUnauthorized use of internet Non-work related upload/downloadNon-work related upload/download Transmission of confidential dataTransmission of confidential data Moonlighting Moonlighting
Management Information Systems 11
Software PiracySoftware Piracy
Unauthorized copying of data is called Unauthorized copying of data is called software piracy or software theftsoftware piracy or software theft
Software is protected by copyright law Software is protected by copyright law and user license agreement that and user license agreement that allows only limited copies to be madeallows only limited copies to be made
Management Information Systems 12
Piracy of Intellectual PropertyPiracy of Intellectual Property
Materials other than software are also Materials other than software are also pirated by making multiple copiespirated by making multiple copies
Piracy of music, video, images, Piracy of music, video, images, articles, books etc.articles, books etc.
Dissemination of these material Dissemination of these material through internet websitesthrough internet websites
Management Information Systems 13
Computer viruses and wormsComputer viruses and worms A virus is a program code that cannot work without A virus is a program code that cannot work without
being inserted into another programbeing inserted into another program A worm is a distinct program that can run unaidedA worm is a distinct program that can run unaidedThese programs copy annoying or destructive routines These programs copy annoying or destructive routines
into the networked computer systems of anyone who into the networked computer systems of anyone who accesses computers affected with the virus or who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected uses copies of magnetic disks taken from infected computerscomputers
They enter a computer through e-mail or file They enter a computer through e-mail or file attachments, or through illegal software. A virus attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted main memory and thus hard disk and any inserted external memory.external memory.
Management Information Systems 14
Privacy IssuesPrivacy Issues
Privacy on the internetPrivacy on the internet Computer MatchingComputer Matching Privacy LawsPrivacy Laws Computer libel and censorship Computer libel and censorship
(threats are spamming and flaming)(threats are spamming and flaming)
Management Information Systems 15
Other ChallengesOther Challenges Employment challenges because a lot of Employment challenges because a lot of
tasks have been automatedtasks have been automated Computer monitoring causes intrusion in Computer monitoring causes intrusion in
personal space for workerspersonal space for workers Challenges in working conditions are caused Challenges in working conditions are caused
by tasks which are monotonous in nature. by tasks which are monotonous in nature. But it also automates most of the work and But it also automates most of the work and gives way to more challenging jobsgives way to more challenging jobs
Challenges to individuality as they eliminate Challenges to individuality as they eliminate the human relationships between peoplethe human relationships between people
Management Information Systems 16
Health issuesHealth issues The use of IT in the workplace raises a variety of
health issues. Heavy use of computers is reportedly causing health problems such as:
· Job stress · Damaged arm and neck muscles · Eye strain · Radiation exposure · Death by computer-caused accidents
Management Information Systems 17
BenefitsBenefits
Medical diagnosisMedical diagnosis Crime controlCrime control Environmental monitoringEnvironmental monitoring Urban planningUrban planning Computer based trainingComputer based training Distance learningDistance learning
Management Information Systems 18
Ethical responsibility of business Ethical responsibility of business professionalsprofessionals
Business ethics are concerned withBusiness ethics are concerned with EquityEquity RightsRights HonestyHonesty Exercise of corporate powerExercise of corporate power
Management Information Systems 19
Categories of Ethical Business IssuesCategories of Ethical Business Issues
Management Information Systems 20
CYBER CRIME IN PAKISTANCYBER CRIME IN PAKISTAN
Cybercrime, also called computer crime, is any Cybercrime, also called computer crime, is any illegal activity that involves a computer or illegal activity that involves a computer or network-connected device, such as a mobile network-connected device, such as a mobile phone. crimes in which the computing device is phone. crimes in which the computing device is the target, for example, to gain network access; the target, for example, to gain network access; crimes in which the computer is used as a crimes in which the computer is used as a weapon, for example, weapon, for example,
any criminal activity that uses a computer device any criminal activity that uses a computer device or Ineternet is called cyber crimeor Ineternet is called cyber crime
Management Information Systems 21
TYPES OF CYBER CRIMETYPES OF CYBER CRIME
Hacking Hacking Phishing Phishing SpoofingSpoofing ScamScam virus ATTACKvirus ATTACK
Management Information Systems 22
TYPESTYPES hacking in simple term means illegal instruction into a computer hacking in simple term means illegal instruction into a computer
systemsystem without the permission of computer .ownerwithout the permission of computer .owner phishingphishing LOGIN PAGE LOGIN PAGE NOT A ACTUAL Official PAGE NOT A ACTUAL Official PAGE build BANK WEBSITE build BANK WEBSITE NOT A OFFICAL BANK WEBSIE NOT A OFFICAL BANK WEBSIE
GET THE USER NAME AND PASSWORDGET THE USER NAME AND PASSWORDTHE ACCOUNT NUMBERTHE ACCOUNT NUMBER
Management Information Systems 23
Management Information Systems 24
GET USER INFORMATIONGET USER INFORMATIONGET THE ACCOUNT NUMBERGET THE ACCOUNT NUMBER AND ALL INFORMATION RELATED TO THE ACCONT AND ALL INFORMATION RELATED TO THE ACCONT for security purpose you can change your password for security purpose you can change your password
CRIMINAL SEND SMS CRIMINAL SEND SMS CRIMAL SEND EMAIL TO THE USERCRIMAL SEND EMAIL TO THE USER CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE use key logger software use key logger software
Management Information Systems 25
SCAMINGSCAMING
1.1. A scam is a quick-profit scheme where a person cheats another A scam is a quick-profit scheme where a person cheats another individual or group out of money by presenting them with false individual or group out of money by presenting them with false information during a deal or offer.information during a deal or offer.
2.2. There are many different types of scams Scammers can approach There are many different types of scams Scammers can approach their victims via email, SMS, and sometimes even a phone to your their victims via email, SMS, and sometimes even a phone to your personal cell number.personal cell number.
3.3. . In this scheme, a person receives news via phone call or email that . In this scheme, a person receives news via phone call or email that they have won the lottery and can retrieve the cash prize after they have won the lottery and can retrieve the cash prize after submitting a small processing fee. After submitting the fee, the submitting a small processing fee. After submitting the fee, the attacker disappears with the money.attacker disappears with the money.
4.4. use websites use websites 5.5. social mediasocial media6.6. scammer can also use face book pages scammer can also use face book pages 7.7. face book groupsface book groups
Management Information Systems 26
SCAMINGSCAMINGMOSTLY ECOMERCE WEBSITES ARE MOSTLY ECOMERCE WEBSITES ARE
INVOLED IN SACAMSINVOLED IN SACAMSBAD PRODUCTSBAD PRODUCTSHIGH PRICEHIGH PRICEYOU CAN CHECK THE WEBSITE FAQ'SYOU CAN CHECK THE WEBSITE FAQ'SCHECK THE ADMIN GROUP CHECK THE ADMIN GROUP
DESCRIPTION DESCRIPTION
Management Information Systems 27
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANPAKISTAN
spreading False Information up to 3 Years spreading False Information up to 3 Years in Prison or up to Rs. 1 Million in Finein Prison or up to Rs. 1 Million in FineYou know that an information is wrong and You know that an information is wrong and you still post or share it on Facebook about you still post or share it on Facebook about a person that damages his/her reputationa person that damages his/her reputation
Making / Spreading Explicit Images or Making / Spreading Explicit Images or Videos of an Individual: up to 5 Years in Videos of an Individual: up to 5 Years in Prison or up to Rs. 5 Million in Fine or bothPrison or up to Rs. 5 Million in Fine or bothphotoshop any imagephotoshop any image
Management Information Systems 29
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or bothbothIf you try to get into a relation with someone online If you try to get into a relation with someone online through internet website, email, SMS, phone or any through internet website, email, SMS, phone or any communication tool despite there is disinterest from communication tool despite there is disinterest from the other party then you can be jailed for three the other party then you can be jailed for three years or imposed a fine which may extend to one years or imposed a fine which may extend to one million rupees or with both.million rupees or with both.You repeatedly call someoneYou repeatedly call someoneIf you call, chat with someone and other party has If you call, chat with someone and other party has no issues with that then its all cool, nothing to worry no issues with that then its all cool, nothing to worry about.about.
Management Information Systems 30
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Making Videos/Pics and Distributing without Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up to Rs. 1 Million Consent: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both,,in Fine or both,,You take a photograph or make a video of any You take a photograph or make a video of any person and displays or distributes it without his/her person and displays or distributes it without his/her consent in a manner that harms a person then you consent in a manner that harms a person then you can go behind bars for up to three years and may can go behind bars for up to three years and may have to bear a fine of up to Rs. 1 million or bothhave to bear a fine of up to Rs. 1 million or both
Spoofing: Up to 3 Years in Jail or Fine up to Rs. Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both500,00 or both
Management Information Systems 31
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
virus Code: Up to 2 Years in Jail or up virus Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Bothto Rs. 1 Million in Fine or BothYou write a virusYou write a virusYou write a code that can be used to You write a code that can be used to destruct a hard drivedestruct a hard driveYou develop a mobile app to spy You develop a mobile app to spy someonesomeoneYo develop an app to spread virusYo develop an app to spread virus
Management Information Systems 32
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Unauthorized copying or transmission of Data: up to Unauthorized copying or transmission of Data: up to 6 Months Prison or up to Rs. 100,000 Fine or both6 Months Prison or up to Rs. 100,000 Fine or bothIf you copies data of someone else’s flash driveIf you copies data of someone else’s flash driveIf you gain access to someone’s phone and copy a If you gain access to someone’s phone and copy a mobile numbermobile number
Unauthorized use of identity information: Up to 3 Unauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine or bothYears in Prison or up to Rs. 5 Million fine or bothYou use someone’s email address You use someone’s email address
Management Information Systems 33