SlideShare a Scribd company logo
1 of 10
RALLYING YOUTH
AGAINST CYBER
CRIME
ENVISIONED DISASTER : CYBER
CRIMES
AREA : DISASTER PREVENTION,
PREPAREDNESS


H. Nilès Perera
University of Moratuwa
Sri Lanka
CYBER SECURITY
 The World has become highly dependent on Computer Networks
 Many businesses and personal lives are entwined with the Cyber
  World
 A breach into a such a network would be catastrophic
WHY CYBER SECURITY?
  Interception and misuse of
  information can lead to a potential              The society is largely ignorant to
  disaster in what is considered the               the gravity of this threat
  “information age”




  Cyber Crimes are taking place as                 Billions of dollars are lost annually
  we speak                                         as a result of this




                          e.g. – Identity Theft, Credit Card
                          Fraud, Corporate Espionage
WHEN & HOW…???




A cyber security       Most computer            Awareness              A recent survey
  disaster can          networks are           regarding the          conducted in Sri
 break out any          inadequately           gravity of the          Lanka revealed
                                                                      that a majority of
     second               protected               issue is           employees would
                                                 minimum             willingly give away
                                                                           their login
                                                                          information

    This means the threat of a disaster exists from both within and outside of the
                                      network
OVERCOMING CYBER CRIMES
 A three pronged strategy focussing on Prevention &
  Preparedness is proposed



                       Tougher
                        Laws

                                   Server
                                  Lockdown

                      Create
                     Awareness
HOW WOULD IT WORK?
 The enormity of the catastrophe that can be caused by forging,
 replacing, hacking and other illegal interceptions of data using
 cyber crimes are not widely known by the public

 By shedding light to the issue and creating awareness among the
 public prevention and preparedness can be achieved



         Conduct              Promote              Lobby for
         Forums,              Cyber Safety         legal changes
         Discussions &        Drills and           using broad
         Workshops to         usage of             youth
         get the              proper               movements
         message              Firewalls,
         across               Anti-Virus and
                              other software
IS IT RELEVANT & EFFECTIVE?


                                                                         Youth
Effective change
can be instilled by   Knowledge &
a youth led           Awareness gives
awareness                               Youth is the          Awarenes
                      Power             Change Catalyst of       s
campaign
because…..                              the 21st century
                                        e.g. – using social
                                        media, blogs
                                                                            Success
HOW IS IT INNOVATIVE?
                             There are many
                        awareness programmes
                       initiated across the world
                      to promote Cyber Security.

              But a Youth lead programme will catalyse a
                big change in a world where the young
             generation has become the major user of the
            rapidly galloping technological advancements.

Many countries have already introduced laws (e.g. - Sri Lanka enacted
  the Computer Crimes Act No.24 in 2007) to mitigate this disaster,
 however very few of these were drafted after careful consideration of
the future after taking inputs from the youth of the respective nations.
EXPECTED RESULTS…

                                                            Greater
                                                        Awareness of
                                                              the
    Implement                                           seriousness of
   tougher laws              Creating a
                         proactive platform             Cyber Crimes
  and regulations                                         across the
                              to share
                          experiences and                    world
                           knowledge on
                           Cyber Security
                             breaches



                    Leading to a drastic reduction of
                     reported incidents & financial
                        costs of Cyber Security
                               breaches
WHY WILL IT WORK?



  • Youth have always been the            • Cyber Crime is a serious disaster
    forefront of change, the recent         that is waiting to happen, and the
    “Arab Spring” illustrates what          public is ignorant about it. Once
    youth can achieve if they are in it     the gravity of this disaster, which
    together                                can liquidate assets, alter records,
                                            delete or leak valuable information
                                            and affect anyone who deals with
                                            the cyber world in a split second
                                            hits the general public they are
                                            bound to react. This is a disaster
                                            of grand scale that everyone
                                            regardless of age, colour,
                                            nationality, religion or region is
                                            prone to face in the near future
                                            and will bring the world to a
                                            standstill.

More Related Content

What's hot

Shashank ie presentation
Shashank ie presentationShashank ie presentation
Shashank ie presentationshashankmnit
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priorityzohaibqadir
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 EnvironmentVinoth Sivasubramanan
 
Our Future Is Now - The Future of Computing
Our Future Is Now - The Future of ComputingOur Future Is Now - The Future of Computing
Our Future Is Now - The Future of ComputingDavid Orban
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Technology creates social isolation and neurios
Technology creates social isolation and neuriosTechnology creates social isolation and neurios
Technology creates social isolation and neuriosBryonMissalla
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Wall street journal 22 sept 10 - perspectives on risk it
Wall street journal 22 sept 10  - perspectives on risk itWall street journal 22 sept 10  - perspectives on risk it
Wall street journal 22 sept 10 - perspectives on risk itMessiernl
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךgkurtz
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...onvert
 

What's hot (20)

Shashank ie presentation
Shashank ie presentationShashank ie presentation
Shashank ie presentation
 
Youth of Turkey Online
Youth of Turkey OnlineYouth of Turkey Online
Youth of Turkey Online
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Our Future Is Now - The Future of Computing
Our Future Is Now - The Future of ComputingOur Future Is Now - The Future of Computing
Our Future Is Now - The Future of Computing
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Technology creates social isolation and neurios
Technology creates social isolation and neuriosTechnology creates social isolation and neurios
Technology creates social isolation and neurios
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Technology and troop morale slide
Technology and troop morale slideTechnology and troop morale slide
Technology and troop morale slide
 
Wall street journal 22 sept 10 - perspectives on risk it
Wall street journal 22 sept 10  - perspectives on risk itWall street journal 22 sept 10  - perspectives on risk it
Wall street journal 22 sept 10 - perspectives on risk it
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Smart City Overveiw
Smart City OverveiwSmart City Overveiw
Smart City Overveiw
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Case Study U Penn
Case Study U PennCase Study U Penn
Case Study U Penn
 
Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...Augmented reality- Why super powers lead to minor injuries and major memory l...
Augmented reality- Why super powers lead to minor injuries and major memory l...
 

Viewers also liked

ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardAPNIC
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri LankaAPNIC
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation Jackseen Jeyaluck
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri LankaSLINTEC
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceUpekha Vandebona
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsUpekha Vandebona
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTUREHansani Sampath
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Social security on employment in sri lanka
Social security on employment in sri lankaSocial security on employment in sri lanka
Social security on employment in sri lankaArjun Ariaratnam
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 

Viewers also liked (20)

ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Social security on employment in sri lanka
Social security on employment in sri lankaSocial security on employment in sri lanka
Social security on employment in sri lanka
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 

Similar to [Challenge:Future] Rallying Youth Against Cyber Crime

Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperTrobough
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Information Security
Information SecurityInformation Security
Information Securitytrunko
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteralwhilma teodoro
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of AuthenticityFuture Agenda
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speedjcichelli
 
PROTEC - Informing the Public
PROTEC - Informing the PublicPROTEC - Informing the Public
PROTEC - Informing the PublicElena Rapisardi
 

Similar to [Challenge:Future] Rallying Youth Against Cyber Crime (20)

Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Information Security
Information SecurityInformation Security
Information Security
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Cyber security report in m asteral
Cyber security report in m asteralCyber security report in m asteral
Cyber security report in m asteral
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of Authenticity
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 
Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
PROTEC - Informing the Public
PROTEC - Informing the PublicPROTEC - Informing the Public
PROTEC - Informing the Public
 

More from Challenge:Future

[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quittingChallenge:Future
 
[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide JobChallenge:Future
 
[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."Challenge:Future
 
[Challenge:Future] What is life?
[Challenge:Future] What is life?[Challenge:Future] What is life?
[Challenge:Future] What is life?Challenge:Future
 
[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of HappinessChallenge:Future
 
[Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it![Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it!Challenge:Future
 
[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourselfChallenge:Future
 
[Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience![Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience!Challenge:Future
 
[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a signChallenge:Future
 
[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your SoulChallenge:Future
 
[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015Challenge:Future
 
[Challenge:Future] box of choices
[Challenge:Future] box of choices[Challenge:Future] box of choices
[Challenge:Future] box of choicesChallenge:Future
 
[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo LudensChallenge:Future
 
[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders[Challenge:Future] Break the Borders
[Challenge:Future] Break the BordersChallenge:Future
 
[Challenge:Future] Passion
[Challenge:Future] Passion[Challenge:Future] Passion
[Challenge:Future] PassionChallenge:Future
 
[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELFChallenge:Future
 
[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong LearningChallenge:Future
 
[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the ChallangeChallenge:Future
 
[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVEChallenge:Future
 
[Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity [Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity Challenge:Future
 

More from Challenge:Future (20)

[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting
 
[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job
 
[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."
 
[Challenge:Future] What is life?
[Challenge:Future] What is life?[Challenge:Future] What is life?
[Challenge:Future] What is life?
 
[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness
 
[Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it![Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it!
 
[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself
 
[Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience![Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience!
 
[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign
 
[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul
 
[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015
 
[Challenge:Future] box of choices
[Challenge:Future] box of choices[Challenge:Future] box of choices
[Challenge:Future] box of choices
 
[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens
 
[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders
 
[Challenge:Future] Passion
[Challenge:Future] Passion[Challenge:Future] Passion
[Challenge:Future] Passion
 
[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF
 
[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning
 
[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange
 
[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE
 
[Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity [Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity
 

[Challenge:Future] Rallying Youth Against Cyber Crime

  • 1. RALLYING YOUTH AGAINST CYBER CRIME ENVISIONED DISASTER : CYBER CRIMES AREA : DISASTER PREVENTION, PREPAREDNESS H. Nilès Perera University of Moratuwa Sri Lanka
  • 2. CYBER SECURITY  The World has become highly dependent on Computer Networks  Many businesses and personal lives are entwined with the Cyber World  A breach into a such a network would be catastrophic
  • 3. WHY CYBER SECURITY? Interception and misuse of information can lead to a potential The society is largely ignorant to disaster in what is considered the the gravity of this threat “information age” Cyber Crimes are taking place as Billions of dollars are lost annually we speak as a result of this e.g. – Identity Theft, Credit Card Fraud, Corporate Espionage
  • 4. WHEN & HOW…??? A cyber security Most computer Awareness A recent survey disaster can networks are regarding the conducted in Sri break out any inadequately gravity of the Lanka revealed that a majority of second protected issue is employees would minimum willingly give away their login information This means the threat of a disaster exists from both within and outside of the network
  • 5. OVERCOMING CYBER CRIMES  A three pronged strategy focussing on Prevention & Preparedness is proposed Tougher Laws Server Lockdown Create Awareness
  • 6. HOW WOULD IT WORK? The enormity of the catastrophe that can be caused by forging, replacing, hacking and other illegal interceptions of data using cyber crimes are not widely known by the public By shedding light to the issue and creating awareness among the public prevention and preparedness can be achieved Conduct Promote Lobby for Forums, Cyber Safety legal changes Discussions & Drills and using broad Workshops to usage of youth get the proper movements message Firewalls, across Anti-Virus and other software
  • 7. IS IT RELEVANT & EFFECTIVE? Youth Effective change can be instilled by Knowledge & a youth led Awareness gives awareness Youth is the Awarenes Power Change Catalyst of s campaign because….. the 21st century e.g. – using social media, blogs Success
  • 8. HOW IS IT INNOVATIVE? There are many awareness programmes initiated across the world to promote Cyber Security. But a Youth lead programme will catalyse a big change in a world where the young generation has become the major user of the rapidly galloping technological advancements. Many countries have already introduced laws (e.g. - Sri Lanka enacted the Computer Crimes Act No.24 in 2007) to mitigate this disaster, however very few of these were drafted after careful consideration of the future after taking inputs from the youth of the respective nations.
  • 9. EXPECTED RESULTS… Greater Awareness of the Implement seriousness of tougher laws Creating a proactive platform Cyber Crimes and regulations across the to share experiences and world knowledge on Cyber Security breaches Leading to a drastic reduction of reported incidents & financial costs of Cyber Security breaches
  • 10. WHY WILL IT WORK? • Youth have always been the • Cyber Crime is a serious disaster forefront of change, the recent that is waiting to happen, and the “Arab Spring” illustrates what public is ignorant about it. Once youth can achieve if they are in it the gravity of this disaster, which together can liquidate assets, alter records, delete or leak valuable information and affect anyone who deals with the cyber world in a split second hits the general public they are bound to react. This is a disaster of grand scale that everyone regardless of age, colour, nationality, religion or region is prone to face in the near future and will bring the world to a standstill.