SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Security,
Copyright and
The Law
Syed Zaid Irshad
Outline
– Computer Crime
– Computer Viruses
– Cyber Crimes and Their Punishments in Pakistan
Computer Crime
– Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech
crime.
– Computer crime is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses or steals a company's
or individual's private information.
– In some cases, this person or group of individuals may be malicious and destroy
or otherwise corrupt the computer or data files.
Computer Crime
– Copyright violation
– Stealing or using another person's copyrighted material without permission.
– Cracking
– Breaking or deciphering codes that are being used to protect data.
– Cyber terrorism
– Hacking, threats, and blackmailing towards a business or person.
– Cyberbully or Cyberstalking
– Harassing or stalking others online.
Computer Crime
– Cybersquatting
– Setting up a domain of another person or company with the sole intentions of selling
it to them later at a premium price.
– Creating Malware
– Writing, creating, or distributing malware (e.g., viruses and spyware.)
– Denial of Service attack
– Overloading a system with so many requests it cannot serve normal requests.
– Espionage
– Spying on a person or business.
Computer Crime
– Fraud
– Manipulating data
– Harvesting
– Collect account or another account related information on other people.
– Identity theft
– Pretending to be someone you are not.
– Illegal sales
– Buying or selling illicit goods online including drugs, guns, and psychotropic
substances.
Computer Crime
– Intellectual property theft
– Stealing practical or conceptual information developed by another person or company.
– IPR violation
– An intellectual property rights violation is any infringement of another's copyright, patent,
or trademark.
– Phishing
– Deceiving individuals to gain private or personal information about that person.
– Salami slicing
– Stealing tiny amounts of money from each transaction.
Computer Crime
– Scam
– Tricking people into believing something that is not true.
– Slander
– Posting libel or slander against another person or company.
– Software piracy
– Copying, distributing or using software that is Copyrighted that you did not purchase.
– Spamming
– Distributed unsolicited e-mail to dozens or hundreds of different addresses.
Computer Crime
– Spoofing
– Deceiving a system into thinking you are someone you are not.
– Typo squatting
– Setting up a domain that is a misspelling of another domain.
– Unauthorized access
– Gaining access to systems you have no permission to access.
– Wiretapping
– Connecting a device to a phone line to listen to conversations.
Computer Virus
– A computer virus is a malicious program that self-replicates by copying itself to
another program.
– A computer virus operates in two ways:
– The first kind, as soon as it lands on a new computer, begins to replicate.
– The second type plays dead until the triggered kick starts the malicious code.
– Viruses can be spread through email and text message attachments, Internet
file downloads, and social media scam links.
– Your mobile devices and smartphones can become infected with mobile viruses
through shady App downloads.
Computer Virus
– RESIDENT VIRUS: Resident viruses set up shop in your RAM and meddle with
your system operations. They’re so sneaky that they can even attach
themselves to your anti-virus software files.
– MULTIPARTITE VIRUS: This virus infects the entire system. Multipartite viruses
spread by performing unauthorized actions on your operating system, folders,
and programs.
– DIRECT ACTION: This virus targets a specific file type, most commonly
executable files (.exe), by replicating and infecting files. Due to its targeted
nature, this virus type is one of the easier ones to detect and remove.
Computer Virus
– BROWSER HIJACKER: Easily detected, this virus type infects your browser and
redirects you to malicious websites.
– OVERWRITE VIRUS: Like the name implies, overwrite viruses overwrite file
content to infect entire folders, files, and programs.
– WEB SCRIPTING VIRUS: This sneaky virus disguises itself in the coding of links,
ads, images, videos, and site code. It can infect systems when users download
malicious files or visit malicious websites.
– FILE INFECTOR: By targeting executable files (.exe), file infector viruses slow
down programs and damage system files when a user runs them.
Computer Virus
– NETWORK VIRUS: Network viruses travel through network connections and
replicate themselves through shared resources.
– BOOT SECTOR VIRUS: One of the easier viruses to avoid, this virus hides out in a
file on a USB drive or email attachment. When activated, it can infect the
system’s master boot record to damage the system.
Computer Virus
– 8 Most Famous Computer Viruses of All Time:
– CryptoLocker
– CryptoLocker spread through email attachments and encrypted the user’s files so that they couldn’t
access them.
– ILOVEYOU
– While ILOVEYOU sounds like a cheerful bon mot you might find printed on the inside of a Valentine’s
Day card, it’s actually far, far more sinister than that. ILOVEYOU is one of the most well-known and
destructive viruses of all time. ($15 billion.)
– MyDoom
– MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based worm ever.
MyDoom was an odd one, as it hit tech companies like SCO, Microsoft, and Google with a Distributed
Denial of Service attack. ($38 billion)
Computer Virus
– Storm Worm
– Storm Worm was a particularly vicious virus that made the rounds in 2006 with a subject
line of ‘230 dead as storm batters Europe’. Intrigued, people would open the email and
click on a link to the news story and that’s when the problems started.
– Sasser & Netsky
– Sasser spread through infected computers by scanning random IP addresses and
instructing them to download the virus. Netsky was the more familiar email-based worm.
($31 billion)
– Anna Kournikova
– Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject was “Here
you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs. ($166,000)
Computer Virus
– Slammer
– Slammer is the kind of virus that makes it into films, as only a few minutes after
infecting its first victim, it was doubling itself every few seconds. (Around $1 billion)
– Stuxnet
– Stuxnet is easily the scariest virus on the list as it was built by government engineers
in the US with the intention of obstructing nukes from being built in Iran. (Unknown)
Cyber Crimes and Their
Punishments in Pakistan
– Spreading False Information about an Individual: up to 3 Years in Prison or up to
Rs. 1 Million in Fine or both
– Making / Spreading Explicit Images or Videos of an Individual: up to 5 Years in
Prison or up to Rs. 5 Million in Fine or both
– Making / Spreading Explicit Images or Videos of Minor: up to 7 Years in Prison or
up to Rs. 5 Million in Fine or both
– Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
– Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up
to Rs. 1 Million in Fine or both
Cyber Crimes and Their
Punishments in Pakistan
– Hacking Email / phone for Stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in
Fine or both
– Cyber Stalking with a Minor: Up to 5 Years in Jail and up to Rs. 10 Million in Fine
– Hate speech: Up to 7 Years in Prison or fine or both
– Spamming: Three Months of Prison or Fine up to Rs. 5 Million or Both
– Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both
– Malicious Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both
– Unauthorized Access to Information System or Data: up to 3 Months Prison or
up to Rs. 50,000 Fine or both

Mais conteúdo relacionado

Mais procurados

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
computer crime
computer crimecomputer crime
computer crime00jitesh00
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp updateyahooteacher
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentationMaazUddin7
 
Name parul
Name parulName parul
Name parulParul231
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 

Mais procurados (19)

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
computer crime
computer crimecomputer crime
computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Name parul
Name parulName parul
Name parul
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 

Semelhante a Security, Copyright and the Law

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 

Semelhante a Security, Copyright and the Law (20)

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Mais de Syed Zaid Irshad

Mais de Syed Zaid Irshad (20)

Operating System.pdf
Operating System.pdfOperating System.pdf
Operating System.pdf
 
DBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_SolutionDBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_Solution
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 
Reduce course notes class xii
Reduce course notes class xiiReduce course notes class xii
Reduce course notes class xii
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 
C Language
C LanguageC Language
C Language
 
Flowchart
FlowchartFlowchart
Flowchart
 
Algorithm Pseudo
Algorithm PseudoAlgorithm Pseudo
Algorithm Pseudo
 
Computer Programming
Computer ProgrammingComputer Programming
Computer Programming
 
ICS 2nd Year Book Introduction
ICS 2nd Year Book IntroductionICS 2nd Year Book Introduction
ICS 2nd Year Book Introduction
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
Data Communication
Data CommunicationData Communication
Data Communication
 
Information Networks
Information NetworksInformation Networks
Information Networks
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
 
Introduction to ICS 1st Year Book
Introduction to ICS 1st Year BookIntroduction to ICS 1st Year Book
Introduction to ICS 1st Year Book
 
Using the set operators
Using the set operatorsUsing the set operators
Using the set operators
 
Using subqueries to solve queries
Using subqueries to solve queriesUsing subqueries to solve queries
Using subqueries to solve queries
 

Último

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

Security, Copyright and the Law

  • 2. Outline – Computer Crime – Computer Viruses – Cyber Crimes and Their Punishments in Pakistan
  • 3. Computer Crime – Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech crime. – Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. – In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
  • 4. Computer Crime – Copyright violation – Stealing or using another person's copyrighted material without permission. – Cracking – Breaking or deciphering codes that are being used to protect data. – Cyber terrorism – Hacking, threats, and blackmailing towards a business or person. – Cyberbully or Cyberstalking – Harassing or stalking others online.
  • 5. Computer Crime – Cybersquatting – Setting up a domain of another person or company with the sole intentions of selling it to them later at a premium price. – Creating Malware – Writing, creating, or distributing malware (e.g., viruses and spyware.) – Denial of Service attack – Overloading a system with so many requests it cannot serve normal requests. – Espionage – Spying on a person or business.
  • 6. Computer Crime – Fraud – Manipulating data – Harvesting – Collect account or another account related information on other people. – Identity theft – Pretending to be someone you are not. – Illegal sales – Buying or selling illicit goods online including drugs, guns, and psychotropic substances.
  • 7. Computer Crime – Intellectual property theft – Stealing practical or conceptual information developed by another person or company. – IPR violation – An intellectual property rights violation is any infringement of another's copyright, patent, or trademark. – Phishing – Deceiving individuals to gain private or personal information about that person. – Salami slicing – Stealing tiny amounts of money from each transaction.
  • 8. Computer Crime – Scam – Tricking people into believing something that is not true. – Slander – Posting libel or slander against another person or company. – Software piracy – Copying, distributing or using software that is Copyrighted that you did not purchase. – Spamming – Distributed unsolicited e-mail to dozens or hundreds of different addresses.
  • 9. Computer Crime – Spoofing – Deceiving a system into thinking you are someone you are not. – Typo squatting – Setting up a domain that is a misspelling of another domain. – Unauthorized access – Gaining access to systems you have no permission to access. – Wiretapping – Connecting a device to a phone line to listen to conversations.
  • 10. Computer Virus – A computer virus is a malicious program that self-replicates by copying itself to another program. – A computer virus operates in two ways: – The first kind, as soon as it lands on a new computer, begins to replicate. – The second type plays dead until the triggered kick starts the malicious code. – Viruses can be spread through email and text message attachments, Internet file downloads, and social media scam links. – Your mobile devices and smartphones can become infected with mobile viruses through shady App downloads.
  • 11. Computer Virus – RESIDENT VIRUS: Resident viruses set up shop in your RAM and meddle with your system operations. They’re so sneaky that they can even attach themselves to your anti-virus software files. – MULTIPARTITE VIRUS: This virus infects the entire system. Multipartite viruses spread by performing unauthorized actions on your operating system, folders, and programs. – DIRECT ACTION: This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of the easier ones to detect and remove.
  • 12. Computer Virus – BROWSER HIJACKER: Easily detected, this virus type infects your browser and redirects you to malicious websites. – OVERWRITE VIRUS: Like the name implies, overwrite viruses overwrite file content to infect entire folders, files, and programs. – WEB SCRIPTING VIRUS: This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites. – FILE INFECTOR: By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.
  • 13. Computer Virus – NETWORK VIRUS: Network viruses travel through network connections and replicate themselves through shared resources. – BOOT SECTOR VIRUS: One of the easier viruses to avoid, this virus hides out in a file on a USB drive or email attachment. When activated, it can infect the system’s master boot record to damage the system.
  • 14. Computer Virus – 8 Most Famous Computer Viruses of All Time: – CryptoLocker – CryptoLocker spread through email attachments and encrypted the user’s files so that they couldn’t access them. – ILOVEYOU – While ILOVEYOU sounds like a cheerful bon mot you might find printed on the inside of a Valentine’s Day card, it’s actually far, far more sinister than that. ILOVEYOU is one of the most well-known and destructive viruses of all time. ($15 billion.) – MyDoom – MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based worm ever. MyDoom was an odd one, as it hit tech companies like SCO, Microsoft, and Google with a Distributed Denial of Service attack. ($38 billion)
  • 15. Computer Virus – Storm Worm – Storm Worm was a particularly vicious virus that made the rounds in 2006 with a subject line of ‘230 dead as storm batters Europe’. Intrigued, people would open the email and click on a link to the news story and that’s when the problems started. – Sasser & Netsky – Sasser spread through infected computers by scanning random IP addresses and instructing them to download the virus. Netsky was the more familiar email-based worm. ($31 billion) – Anna Kournikova – Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject was “Here you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs. ($166,000)
  • 16. Computer Virus – Slammer – Slammer is the kind of virus that makes it into films, as only a few minutes after infecting its first victim, it was doubling itself every few seconds. (Around $1 billion) – Stuxnet – Stuxnet is easily the scariest virus on the list as it was built by government engineers in the US with the intention of obstructing nukes from being built in Iran. (Unknown)
  • 17. Cyber Crimes and Their Punishments in Pakistan – Spreading False Information about an Individual: up to 3 Years in Prison or up to Rs. 1 Million in Fine or both – Making / Spreading Explicit Images or Videos of an Individual: up to 5 Years in Prison or up to Rs. 5 Million in Fine or both – Making / Spreading Explicit Images or Videos of Minor: up to 7 Years in Prison or up to Rs. 5 Million in Fine or both – Cyber stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both – Making Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
  • 18. Cyber Crimes and Their Punishments in Pakistan – Hacking Email / phone for Stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both – Cyber Stalking with a Minor: Up to 5 Years in Jail and up to Rs. 10 Million in Fine – Hate speech: Up to 7 Years in Prison or fine or both – Spamming: Three Months of Prison or Fine up to Rs. 5 Million or Both – Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or both – Malicious Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both – Unauthorized Access to Information System or Data: up to 3 Months Prison or up to Rs. 50,000 Fine or both