SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Professional Practices
SS-301
Ehtesham Raza,
Assistant Professor,
Govt. Murray College,
Sialkot.
Lecture 10:
Information Security and
Privacy
Topic: Information Security Practices
• Introduction
• The CIA: Information Security Principles
• Information Security Organizational
Structure
• Information Classification
Introduction
• Information security, sometimes shortened to
InfoSec, is the practice of
defending information from unauthorized access,
use, disclosure, disruption, modification,
inspection, recording or destruction. It is a general
term that can be used regardless of the form the
data may take (e.g. electronic, physical)
The CIA:
Information Security Principles
• The CIA principle
– Confidentiality
– Integrity
– Availability
Information Security Organizational Structure
Information Classification
• Information Classification
• Government classifications
• Private Sector classifications
– Criteria
Lecture 11:
Computer Misuse and
Criminal Law
Computer Misuse & Criminal
Law
Introduction:
The media and popular computing press
abound with tales of multi-million pound
computer frauds and of the dangers to
commercial companies, governmental data
banks, financial institutions and national
security from the activities of computer
hackers
Computing and criminal activity
• Modern business process is done through
utilizing computer software and hardware,
i.e. some form of computer system is used
in it.
• There has been a sharp rise in the number
of crimes involving computing; and the
Internet has undoubtedly created new
security risks
Categories of misuse
Under the study of the English criminal law, the Law
Commission highlighted a number of categories of misuse
of computers
• Computer fraud
• Unauthorized obtaining of information from a computer
– Computer hacking
– Eavesdropping on a computer
– Making unauthorized use of computers for personal benefit
• Unauthorized alteration or destruction of information
stored on a computer
• Denying access to an authorized user
• The unauthorized removal of information stored on a
computer
Computer Fraud
• The Law Commission defined computer fraud as conduct
which involves the manipulation of a computer or internet,
by whatever method, in order dishonestly to obtain money,
property, or some other advantage of value, or to cause
loss
• Computer fraud is further divided into three categories
– Input frauds
e.g. intentionally entering false data or amending data into the
computer
– Output frauds
Output fraud involves stealing or misusing system output
– Program frauds
Program fraud involves the dishonest alteration of a computer
program
Obtaining unauthorized access
to a computer
• The second form of misuse identified by
the Law Commission was unauthorized
obtaining of information from a computer.
It is sub-divided as:
• Computer hacking:
Accessing a computer without the authorization
of the owner. In this case the person accesses
the computer secretly for stealing information,
data or manipulation of data for diverse
purposes
Continued…
• Eavesdropping
Literal meaning listening or spying secretly
• Unauthorized use of a
computer for personal benefit
Using computer’s authorized information for
personal benefits. In this case, the person
misusing the computer is usually employee or
authorized user of the company
Lecture 12:
Social Networking & Ethics
Topic: Social Networking & Ethics
• Introduction
• The Good, the Bad and the Ugly
• How to Protect yourself
• How to protect your children
Introduction to Social Networking & Ethics
Def: When a computer network connects people
or organizations, it is a social network. Just as
a computer network is a set of machines
connected by a set of cables, a social network
is a set of people (or organizations or other
social entities) connected by a set of social
relationships, such as friendship, coworking or
information exchange
National Cyber Alert System
• Web 2.0
– Facebook & Myspace - Free-access social
networking websites
– Twitter – “micro” blog – 280 characters or less
– Blog – shared on-line journal
– Video Sharing Sites – YouTube, Flikr
– Podcast – audio broadcast that can be downloaded
The Good, the Bad and the Ugly
• Example
The case of a person asking for emergency money while
impersonating a Facebook user to her friends
http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-
facebook/ Also the British MI6 chief that was exposed by his
wife’s Facebook pictures:
http://www.dailymail.co.uk/news/article-1197562/MI6-chief-
blows-cover-wifes-Facebook-account-reveals-family-holidays-
showbiz-friends-links-David-Irving.html
How to Protect Your Self
• Keep private information private
• Do not post address, ssn, phone number,
financial info, your schedule, full birth date
• Be careful not to display information used to
answer security questions (e.g., favorite pet,
mother’s maiden name)
• Use caution when you click links
• Be careful about installing extras on your site
• Be wary of unknown friends (strangers)
• Google yourself
• Don’t blindly connect
• Trust your gut instinct
• Use and maintain anti-virus software
• Use strong passwords
• Don’t use the same password for a social networking
site and for your email
• Remember - social networking sites are a public
resource – like a billboard in cyberspace
• Evaluate sites privacy settings
• Lock down your profile information to people you
accepts as a friend. That way no one can read your
personal information unless they are an approved
friend
• Be skeptical
How to Protect Your Children
• “It’s 10 p.m., do you know where your
children are?”
– “And who they are talking to online?”
– Age limits on some social networking sites
– Facebook and MySpace open to people 13 and
older
– Twitter open to all
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
lorensr12
 

Was ist angesagt? (20)

computer contracts.pdf
computer contracts.pdfcomputer contracts.pdf
computer contracts.pdf
 
Ieee code of ethics
Ieee code of ethicsIeee code of ethics
Ieee code of ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
computing profession and core skills
computing profession and core skillscomputing profession and core skills
computing profession and core skills
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Internet security
Internet securityInternet security
Internet security
 
anatomy of a sw house
anatomy of a sw houseanatomy of a sw house
anatomy of a sw house
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 

Ähnlich wie computer misuse n criminal law

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 

Ähnlich wie computer misuse n criminal law (20)

MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Technology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxTechnology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptx
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Hacking
Hacking Hacking
Hacking
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
E commerce
E commerce E commerce
E commerce
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 

Mehr von Hamza Cheema

Mehr von Hamza Cheema (20)

seven habits
seven habitsseven habits
seven habits
 
leadership
leadershipleadership
leadership
 
time management
time managementtime management
time management
 
professional ethics
professional ethicsprofessional ethics
professional ethics
 
the profession
 the profession the profession
the profession
 
managing teams and their conflicts
managing teams and their conflictsmanaging teams and their conflicts
managing teams and their conflicts
 
swot-analysis
swot-analysisswot-analysis
swot-analysis
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
ethics and professionalism
ethics and professionalismethics and professionalism
ethics and professionalism
 
effective time-management-important-vs-urgent
effective time-management-important-vs-urgenteffective time-management-important-vs-urgent
effective time-management-important-vs-urgent
 
time management islamic way
time management islamic waytime management islamic way
time management islamic way
 
time management
time managementtime management
time management
 
professionalism
professionalismprofessionalism
professionalism
 
habbits of highly effective people
habbits of highly effective peoplehabbits of highly effective people
habbits of highly effective people
 
leardeship
leardeshipleardeship
leardeship
 
be the tranformer (overall characteristics)
 be the tranformer (overall characteristics) be the tranformer (overall characteristics)
be the tranformer (overall characteristics)
 
characteristics of a professional organization
characteristics of a professional organizationcharacteristics of a professional organization
characteristics of a professional organization
 
hackivism
hackivismhackivism
hackivism
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
structure of an organisation
 structure of an organisation structure of an organisation
structure of an organisation
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Kürzlich hochgeladen (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

computer misuse n criminal law

  • 1. Professional Practices SS-301 Ehtesham Raza, Assistant Professor, Govt. Murray College, Sialkot.
  • 3. Topic: Information Security Practices • Introduction • The CIA: Information Security Principles • Information Security Organizational Structure • Information Classification
  • 4. Introduction • Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical)
  • 5. The CIA: Information Security Principles • The CIA principle – Confidentiality – Integrity – Availability
  • 7. Information Classification • Information Classification • Government classifications • Private Sector classifications – Criteria
  • 8. Lecture 11: Computer Misuse and Criminal Law
  • 9. Computer Misuse & Criminal Law Introduction: The media and popular computing press abound with tales of multi-million pound computer frauds and of the dangers to commercial companies, governmental data banks, financial institutions and national security from the activities of computer hackers
  • 10. Computing and criminal activity • Modern business process is done through utilizing computer software and hardware, i.e. some form of computer system is used in it. • There has been a sharp rise in the number of crimes involving computing; and the Internet has undoubtedly created new security risks
  • 11. Categories of misuse Under the study of the English criminal law, the Law Commission highlighted a number of categories of misuse of computers • Computer fraud • Unauthorized obtaining of information from a computer – Computer hacking – Eavesdropping on a computer – Making unauthorized use of computers for personal benefit • Unauthorized alteration or destruction of information stored on a computer • Denying access to an authorized user • The unauthorized removal of information stored on a computer
  • 12. Computer Fraud • The Law Commission defined computer fraud as conduct which involves the manipulation of a computer or internet, by whatever method, in order dishonestly to obtain money, property, or some other advantage of value, or to cause loss • Computer fraud is further divided into three categories – Input frauds e.g. intentionally entering false data or amending data into the computer – Output frauds Output fraud involves stealing or misusing system output – Program frauds Program fraud involves the dishonest alteration of a computer program
  • 13. Obtaining unauthorized access to a computer • The second form of misuse identified by the Law Commission was unauthorized obtaining of information from a computer. It is sub-divided as: • Computer hacking: Accessing a computer without the authorization of the owner. In this case the person accesses the computer secretly for stealing information, data or manipulation of data for diverse purposes
  • 14. Continued… • Eavesdropping Literal meaning listening or spying secretly • Unauthorized use of a computer for personal benefit Using computer’s authorized information for personal benefits. In this case, the person misusing the computer is usually employee or authorized user of the company
  • 16. Topic: Social Networking & Ethics • Introduction • The Good, the Bad and the Ugly • How to Protect yourself • How to protect your children
  • 17. Introduction to Social Networking & Ethics Def: When a computer network connects people or organizations, it is a social network. Just as a computer network is a set of machines connected by a set of cables, a social network is a set of people (or organizations or other social entities) connected by a set of social relationships, such as friendship, coworking or information exchange
  • 18. National Cyber Alert System • Web 2.0 – Facebook & Myspace - Free-access social networking websites – Twitter – “micro” blog – 280 characters or less – Blog – shared on-line journal – Video Sharing Sites – YouTube, Flikr – Podcast – audio broadcast that can be downloaded
  • 19. The Good, the Bad and the Ugly • Example The case of a person asking for emergency money while impersonating a Facebook user to her friends http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on- facebook/ Also the British MI6 chief that was exposed by his wife’s Facebook pictures: http://www.dailymail.co.uk/news/article-1197562/MI6-chief- blows-cover-wifes-Facebook-account-reveals-family-holidays- showbiz-friends-links-David-Irving.html
  • 20. How to Protect Your Self • Keep private information private • Do not post address, ssn, phone number, financial info, your schedule, full birth date • Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name) • Use caution when you click links • Be careful about installing extras on your site
  • 21. • Be wary of unknown friends (strangers) • Google yourself • Don’t blindly connect • Trust your gut instinct • Use and maintain anti-virus software • Use strong passwords
  • 22. • Don’t use the same password for a social networking site and for your email • Remember - social networking sites are a public resource – like a billboard in cyberspace • Evaluate sites privacy settings • Lock down your profile information to people you accepts as a friend. That way no one can read your personal information unless they are an approved friend • Be skeptical
  • 23. How to Protect Your Children • “It’s 10 p.m., do you know where your children are?” – “And who they are talking to online?” – Age limits on some social networking sites – Facebook and MySpace open to people 13 and older – Twitter open to all