Security of network and information systems

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
By Andy Scott, Michael Murray and Adam Kanopa
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 14 Crime and Justice in the New Millennium
Information Warfare Theory of Information Warfare
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Mrs. Jefferson Business Information Management I.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Information Warfare Playgrounds to Battlegrounds.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Security Debate Why cracking should be criminalized.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cyber Law And Ethics And Ethics.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
Caritas of Archdiocese of Prague Migration Centre Joint Staff Training Event Meeting in Prague 23 th – 27 th 2015.
Using the computer appropriately
GCSE ICT SECURITY THREATS.
Essen Europe Bochum Alicante Pristina Gibraltar.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
COMPUTER CRIME.
Societal Issues in Computing (COMP466)
>> PETTY THEFT<<
Forensic and Investigative Accounting
Faculty of Science IT Department By Raz Dara MA.
Authors: Damjan Fujs Miha ZEMLJIČ
Combating Drug Abuse in Montenegro
The Council for Civil Control of Police in Montenegro
CRIMINAL OFFENSE HOMICIDE
Expertise of handwriting (manuscripts), identification or indications
Violence at sporting events
Protection of the Environment and Ecological Crime
Influence of firearms possession and usage on public order and peace
NEIGHBOURHOOD WATCH: REVIEW AND DEVELOPMENT IN MONTENEGRO
Computer Security By: Muhammed Anwar.
Authors: Dejana Drljevic
Authors: Ksenija Moračanin, Marija Marković
Author: Maja Mijović, Marija Blažević
PIRACY.
Authors: Zerina Bosovic
Authors: Bokan Dragana
Digital Empowerment of Women in KP
Presentation transcript:

Security of network and information systems Author: MAGDALENA ŠLJIVIĆ III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

SECURITY OF NETWORK AND INFORMATION SYSTEMS The emergence of the internet as well as the global growing use of information and telecommunications technologies has contributed to the increase of illegal activities in this field III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

SECURITY OF NETWORK AND INFORMATION SYSTEMS The Criminal Code of Montenegro defines six criminal offenses regarding security of computer data, which are the following : Article 349 - Damaging Computer Data and Programs : (1) Anyone who without authorization deletes, alters, damages, conceals or otherwise makes useless computer data or program shall be punished by a fine or a prison term up to one year. Article 350 - Computer System Interference : (1) Anyone who enters, destroys, deletes, alters, damages, conceals or otherwise makes useless computer data or computer system with the intention to obstruct the operations of a computer system shall be punished by a fine or a prison term up to three years. Article 351 - Producing and Entering Computer Viruses (1) Anyone who makes a computer virus with the intention of entering it into a computer system of another person shall be punished by a fine or a prison term up to one year. III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

SECURITY OF NETWORK AND INFORMATION SYSTEMS Article 352 - Computer Fraud : (1) Anyone who enters, alters, erases, omits to enter correct data or otherwise conceals or misrepresents a piece of computer data or otherwise interferes with the functioning of a computer system and thereby influences the result of electronic processing, transfer of data and functioning of a computer system with the intention of obtaining illicit pecuniary gain for himself or for another person and thereby causes property damage to another person shall be punished by a prison term from six months to five years. Article 353 - Unauthorized Access to Computer System : (1) Anyone who, without authorization, makes access to the entire computer system or part thereof shall be punished by a fine or a prison term up to one year. Article 354 - Misuse of Devices and Programs : (1) Whoever produces, sells, procures for use, imports, distributes and otherwise places at disposal devices and computer programs or computer codes and similar data shall be punished by a prison term from three months to three years III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

SECURITY OF NETWORK AND INFORMATION SYSTEMS In accordance with the mission to enable detection of cyber threats and incidents and adequatly react and respond to the same, Montenegro formed Directorate for protection of computer and security incidents on the internet - CIRT III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

SECURITY OF NETWORK AND INFORMATION SYSTEMS year attack on websites scams on the internet abuse of profiles on soc. networks malver total 2012 3 2 - 5 2013 10 1 19 2014 6 20 31 2015 17 37 77 2016 18 36 50 124 2017 91 34 368 511 2018 (till dec.) 13 68 39 333 453 (statistic of incidents reported to CIRT) III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

CYBER ATTACK IN MONTENEGRO Attack of the computer system of Ministry of defence of the Montenegro by the Russian hacker group called APT28 (Fancy bear) III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019

STRATEGY FOR THE INFORMATION SOCIETY DEVELOPMENT 2020 III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2018

THANK YOU FOR YOUR ATTENTION ! III. International student conference „Safety in local communities-legal and criminological perspectives“’, Podgorica., April 2019