Download presentation
Presentation is loading. Please wait.
Published byNathaniel Christopher Moody Modified over 8 years ago
1
Course: Introduction to New Media Course Instructor: Muhmmad Farrukh
2
CYBER CRIME Any activity commissioned via computer, digital devices and networks used in the cyber realm, and is facilitated through the internet medium. It can include the distant theft of information belonging to an individual, government or corporate sector through criminal tress- passing into unauthorized remote systems around the world. It includes from stealing millions of rupees from online bank to harassing and stalking cyber users. Compiled by Muhammad Farrukh2
3
Intellectual Property Theft Intellectual property (IP) refers to creations of the mind, such as inventions literary and artistic works; Designs and symbols, Brand Names and images. Intellectual property (IP) theft is defined as theft of material that is copyrighted, the theft of trade secrets, and trademark violations. Compiled by Muhammad Farrukh3
4
Intellectual Property Theft The two forms of IP most frequently involved in cyber crime are copyrighted material and trade secrets. Piracy is a term used to describe IP theft—piracy of software, piracy of music, etc. Theft of IP affects the entire U.S. economy. Billions of dollars are lost every year to IP pirates. For example, thieves sell pirated computer software for games or programs to millions of Internet users. The company that actually produced the real product loses these sales and royalties rightfully due to Intellectual Property Theft. Compiled by Muhammad Farrukh4
5
Intellectual Property Theft Intellectual property pirates use the computer to steal vast amounts of copyrighted material and cause severe damage to the victimized companies. IP pirates never have to make sales in person or travel, their costs are minimal, and profits are huge. Internet pirates target the online shoppers who look for discounted, but legitimate, products. They do so by emails and Internet advertisements that seem to be the real thing. Not just individuals, but companies, educational institutions, and even government agencies have been tricked by IP pirates into buying stolen goods. Compiled by Muhammad Farrukh5
6
What is Copyright A copyright is the legal right of an author, publisher, composer, or other person who creates a work to exclusively print, publish, distribute, or perform the work in public. Compiled by Muhammad Farrukh6
7
7
8
8
9
9
10
What do we mean by Trade Secrets Theft of trade secrets means the theft of ideas, plans, methods, technologies, or any sensitive information from all types of industries. These secrets are owned by the company and give it a competitive edge. Theft of trade secrets damages the competitive edge and therefore the economic base of a business. Compiled by Muhammad Farrukh10
11
Do You Know! Pirated digital copies of copyrighted work transmitted over the Internet are known as "warez." software that has been illegally copied and made available. "if anyone is making money from selling warez, they could be prosecuted Warez groups are responsible for illegally copying and distributing hundreds of millions of dollars of copyrighted material. Compiled by Muhammad Farrukh11
12
Cyber Stalking Stalking. Criminal activity consisting of the repeated following and harassing of another person it is the use of the Internet and email to "stalk" another individual. Compiled by Muhammad Farrukh12
13
Compiled by Muhammad Farrukh13
14
Compiled by Muhammad Farrukh14
15
Cyber Security Achieving cyber-security depends upon the security practices of each and every networked country, business and citizen. To guard against the sophisticated skills of cyber- criminals, a global culture of cybersecurity needs to be developed. This will require not only good policing and legislation but also acute threat awareness and development of tough ICT-based counter measures. Compiled by Muhammad Farrukh15
16
Cyber Law Cyber law has been a vibrant field in which numerous developments took place in the year 2001 on the global level. Cyber law tends to addresses a more definitive, regulated and orderly cyberspace and towards evolving the regulated code of conduct for online activities in the context of electronic mediums around it. Compiled by Muhammad Farrukh16
17
Cyber Crime In Pakistan Compiled by Muhammad Farrukh17
18
FEDERAL INVESTIGATION AGENCY NATIONAL RESPONSE CENTRE FOR CYBER CRIME National Response Centre for Cyber Crime (NR3C) - FIA is a law enforcement agency dedicated to fight cyber crime. Inception of this Hi-Tech crime fighting unit transpired in 2007 to identify and curb the phenomenon of technological abuse in society It is the only unit of its kind in the country and in addition to the directly received complaints also assists other law enforcement agencies in their own cases. Compiled by Muhammad Farrukh18
19
Compiled by Muhammad Farrukh19
20
NATIONAL RESPONSE CENTRE FOR CYBER CRIME Compiled by Muhammad Farrukh20
21
MAJOR ONLINE ACTIVITIES In Pakistan, internet users range from 10% to 16% of the overall population Social networking Online banking Internet surfing Audio & video communication Entertainment Online shopping Map directions / GPS Online education Online auction Information sharing Medical assistance Online games Compiled by Muhammad Farrukh21
22
CYBER CRIME CATEGORIES Hacking Identity theft Cyber Stalking Financial fraud Digital Piracy Computer viruses and worms /Malicious Software Intellectual property rights Money Laundering Denial of Service attack Electronic Terrorism, Vandalism and Extortion. Compiled by Muhammad Farrukh22
23
Telecommunications Development Bureau Telecommunications Development Bureau has been mandated to: Enhance security and build confidence in the use of public networks for eservices/applications. Provide assistance to Member States in developing laws and model legislation for eservices/applications, prevention of cyber crime, security, ethical issues and data privacy. Identify security requirements and propose solutions for the development of secure IP infrastructure for e-services/applications on various types of networks using relevant technologies. Develop tools to facilitate the exchange of best practices on IT security, legal issues related to the areas of activity of this Programme. Compiled by Muhammad Farrukh23
24
US Initiatives US Government Initiatives to Combat Cyber crime: Department of Homeland Security's National Infrastructure Coordinating Center: (report incidents relating to national security and infrastructure issues). U.S. Computer Emergency Readiness Team (U.S. CERT) (online reporting for technicians) Internet Fraud Complaint Centre (IFCC) (online reporting for Internet related crime). National Association of Attorney General's Computer Crime Point of Contact List (all state related cyber questions). Digital Millennium Copyright Act - the epidemic law that outlaws not only software piracy but also the activities that help it. Uniform Computer Information Transactions Act Compiled by Muhammad Farrukh24
25
Cyber Police (China Case Study) Cyber police in China have been at work in three areas: Firstly, the police folks patrol areas where crimes frequently occur to warn cyber criminals. Secondly, users can find, by clicking on icons of police folk, information on rules and regulations of cyber space management and typical online criminal cases. In a few months, the police icons have received an accumulated 100,000 clicks, provided more than 600 legal consultations and received more than 1,600 reports on online crimes, 235 of which have been proved effective. - The virtual reality cops are also responsible for receiving online crime reports from users and providing legal consultations concerning cyber crimes. Compiled by Muhammad Farrukh25
26
International Treaties Following are the stronger International Fora for Cyber Crime: Two treaties, negotiated under the auspices of the World Intellectual Property Organization (WIPO) The Copyright Treaty of 1996 and The Phonograms and Performers Treaty of 1996 Both attempts mean to interpret traditional rules of copyright in the new internet environment. These are implemented in the US, the European Union (EU), Canada and other countries. The Council of Europe Convention on Cyber Crime in 2001 was the first international initiative on computer crime. It has been signed by 37 States and entered into force in July 2004. Compiled by Muhammad Farrukh26
27
Cyber Law: A Reality Check International IP law is practically non-existent. The world itself becomes a big courtroom when cyber crimes across geographic boundaries take place. Because of the global nature of the internet, the clarity as to which court would have the exclusive jurisdiction to try the case is missing. Thirdly litigation and the legal systems in different countries are different and can be extremely expensive And there is considerable doubt relating to the efficacy of decisions given by the courts of one jurisdiction on a global level and the sanctions are questionable. Compiled by Muhammad Farrukh27
28
CYBER CRIME PREVENTION TIPS SECURE YOUR SMART PHONES Always secure your smartphone with a strong password Ensure that your device locks itself automatically Install security software Only download apps from approved sources Check your apps permissions Dont miss operating system updates Be wary of any links you receive via email or text message Turn off automatic Wi-Fi connection When browsing or shopping on your phone (or computer), always look for "https" in the url instead of "http" Compiled by Muhammad Farrukh28
29
CYBER CRIME PREVENTION TIPS SECURE YOUR ONLINE BANKING Never use same PIN CODE for multiple bank accounts Never use unprotected PCs at cybercafes for internet banking Never keep your pin code and cards together Never leave the PC unattended when using internet banking in a publicplace Register for Mobile SMS, Email Transaction Alerts Never reply to emails asking for your password or pin code Visit banks website by typing the URL in the address bar Log off and close your browser when you are done using internet banking When using ATM always conceal keypad before entering pin code Before using ATM, make sure that there is no extra device installed in the surroundings Compiled by Muhammad Farrukh29
30
CYBER CRIME PREVENTION TIPS SECURE YOUR FACEBOOK Use extra security features to access account (security code, Login alert etc) Use login notification alert Allow specific individuals to view your contents (Videos, Photos and Friends etc.) Control who can contact you Block your profile from search engines Compiled by Muhammad Farrukh30
31
CYBER CRIME PREVENTION TIPS SECURE YOUR WI-FI Change Default Administrator Passwords and Usernames of the Wi-Fi Router Use complex password and change Password after regular intervals Position the Router or Access Point Safely Turn off the Network / Wi-Fi routers if it is not in use SECURE YOUR BROWSING What you put online will always remain there Never trust any free online content Don't provide personal information online to get something free Don’t click on links inside e-mails or messages Compiled by Muhammad Farrukh31
32
References: Youtube.com http://law.jrank.org/pages/11992/Cyber-Crime- Intellectual-property-theft.html About.com (by cyberstalking expert Alexis A. Moore, founder of the national advocacy group Survivors in Action) http://www.nr3c.gov.pk/about_us.html Wikipedia.org Compiled by Muhammad Farrukh32
33
Class Debate Compiled by Muhammad Farrukh33
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.