SlideShare a Scribd company logo
RALLYING YOUTH
AGAINST CYBER
CRIME
ENVISIONED DISASTER : CYBER
CRIMES
AREA : DISASTER
PREVENTION, PREPAREDNESS


H. Nilès Perera
University of Moratuwa
Sri Lanka
CYBER SECURITY
 The World has become highly dependent on Computer Networks
 Many businesses and personal lives are entwined with the Cyber
  World
 A breach into a such a network would be catastrophic
WHY CYBER SECURITY?




Interception     The society is    Cyber Crimes   Billions of        e.g. – Identity
and misuse of    largely           are taking     dollars are lost   Theft, Credit
information      ignorant to the   place as we    annually as a      Card
can lead to a    gravity of this   speak          result of this     Fraud, Corpora
potential        threat                                              te Espionage
disaster in
what is
considered the
“information
age”
WHEN & HOW…???




A cyber security       Most computer            Awareness              A recent survey
  disaster can          networks are           regarding the          conducted in Sri
 break out any          inadequately           gravity of the          Lanka revealed
                                                                      that a majority of
     second               protected               issue is           employees would
                                                 minimum             willingly give away
                                                                           their login
                                                                          information

    This means the threat of a disaster exists from both within and outside of the
                                      network
OVERCOMING CYBER CRIMES
 A three pronged strategy focussing on Prevention &
  Preparedness is proposed



                       Tougher
                        Laws

                                   Server
                                  Lockdown

                      Create
                     Awareness
HOW WOULD IT WORK?
 The enormity of the catastrophe that can be caused by forging,
 replacing, hacking and other illegal interceptions of data using
 cyber crimes are not widely known by the public

 By shedding light to the issue and creating awareness among the
 public prevention and preparedness can be achieved



         Conduct               Promote Cyber           Lobby for legal
         Forums, Discussions   Safety Drills and       changes using broad
         & Workshops to get    usage of proper         youth movements
         the message across    Firewalls, Anti-Virus
                               and other software
IS IT RELEVANT & EFFECTIVE?


                                                                         Youth
Effective change
can be instilled by   Knowledge &
a youth led           Awareness gives
awareness                               Youth is the          Awarenes
                      Power             Change Catalyst of       s
campaign
because…..                              the 21st century
                                        e.g. – using social
                                        media, blogs
                                                                            Success
HOW IS IT INNOVATIVE?
                               There are many
                          awareness programmes
                         initiated across the world
                        to promote Cyber Security.

                But a Youth lead programme will catalyse a
                  big change in a world where the young
               generation has become the major user of the
              rapidly galloping technological advancements.

Many countries have already introduced laws (e.g. - Sri Lanka enacted the
Computer Crimes Act No.24 in 2007) to mitigate this disaster, however very
  few of these were drafted after careful consideration of the future after
           taking inputs from the youth of the respective nations.
EXPECTED RESULTS…

                                                            Greater
                                                        Awareness of
                                                              the
    Implement                                           seriousness of
   tougher laws              Creating a
                         proactive platform             Cyber Crimes
  and regulations                                         across the
                              to share
                          experiences and                    world
                           knowledge on
                           Cyber Security
                             breaches



                    Leading to a drastic reduction of
                     reported incidents & financial
                        costs of Cyber Security
                               breaches
WHY WILL IT WORK?



  • Youth have always been the            • Cyber Crime is a serious disaster
    forefront of change, the recent         that is waiting to happen, and the
    “Arab Spring” illustrates what          public is ignorant about it. Once
    youth can achieve if they are in it     the gravity of this disaster, which
    together                                can liquidate assets, alter
                                            records, delete or leak valuable
                                            information and affect anyone who
                                            deals with the cyber world in a
                                            split second hits the general public
                                            they are bound to react. This is a
                                            disaster of grand scale that
                                            everyone regardless of
                                            age, colour, nationality, religion or
                                            region is prone to face in the near
                                            future and will bring the world to a
                                            standstill.

More Related Content

What's hot

Smart Citizen Cyber Resilience in Asia and Pacific
Smart Citizen Cyber Resilience in Asia and PacificSmart Citizen Cyber Resilience in Asia and Pacific
Smart Citizen Cyber Resilience in Asia and Pacific
Mamello Thinyane
 
Smart City Overveiw
Smart City OverveiwSmart City Overveiw
Smart City Overveiw
Bradley Gilmour
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
João Rufino de Sales
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
zohaibqadir
 
panEU_certificate 7
panEU_certificate 7panEU_certificate 7
panEU_certificate 7
Loris Laera
 
Ck Peachy Keachy 1
Ck Peachy Keachy 1Ck Peachy Keachy 1
Ck Peachy Keachy 1
Christina Lindeberg
 
Bridging sustainably the last mile connectivity in India and Myanmar
Bridging sustainably the last mile connectivity in India and MyanmarBridging sustainably the last mile connectivity in India and Myanmar
Bridging sustainably the last mile connectivity in India and Myanmar
Global Risk Forum GRFDavos
 
Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012
DCVTT
 
Please disrupt me
Please disrupt mePlease disrupt me
Please disrupt me
Derek Moore
 
XEN App
XEN AppXEN App
XEN App
subtitle
 
Information+System+Development+Limit+To+Information
Information+System+Development+Limit+To+InformationInformation+System+Development+Limit+To+Information
Information+System+Development+Limit+To+Information
Jo Balucanag - Bitonio
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
blogzilla
 
Recent Trends in Communication Technology for Distance Education
Recent Trends in Communication Technology for Distance EducationRecent Trends in Communication Technology for Distance Education
Recent Trends in Communication Technology for Distance Education
Sanjaya Mishra
 
CT IRP Grid Security 9 20 11rev1
CT IRP Grid Security 9 20 11rev1CT IRP Grid Security 9 20 11rev1
CT IRP Grid Security 9 20 11rev1
jgordes
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
CIONET
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
mark-smith
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
Vinoth Sivasubramanan
 
Low cost technology for Community Resource Centres
Low cost technology for Community Resource CentresLow cost technology for Community Resource Centres
Low cost technology for Community Resource Centres
Ryan Jones
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
Sherry Jones
 

What's hot (20)

Smart Citizen Cyber Resilience in Asia and Pacific
Smart Citizen Cyber Resilience in Asia and PacificSmart Citizen Cyber Resilience in Asia and Pacific
Smart Citizen Cyber Resilience in Asia and Pacific
 
Smart City Overveiw
Smart City OverveiwSmart City Overveiw
Smart City Overveiw
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
 
panEU_certificate 7
panEU_certificate 7panEU_certificate 7
panEU_certificate 7
 
Ck Peachy Keachy 1
Ck Peachy Keachy 1Ck Peachy Keachy 1
Ck Peachy Keachy 1
 
Bridging sustainably the last mile connectivity in India and Myanmar
Bridging sustainably the last mile connectivity in India and MyanmarBridging sustainably the last mile connectivity in India and Myanmar
Bridging sustainably the last mile connectivity in India and Myanmar
 
Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012
 
Please disrupt me
Please disrupt mePlease disrupt me
Please disrupt me
 
XEN App
XEN AppXEN App
XEN App
 
Information+System+Development+Limit+To+Information
Information+System+Development+Limit+To+InformationInformation+System+Development+Limit+To+Information
Information+System+Development+Limit+To+Information
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Recent Trends in Communication Technology for Distance Education
Recent Trends in Communication Technology for Distance EducationRecent Trends in Communication Technology for Distance Education
Recent Trends in Communication Technology for Distance Education
 
CT IRP Grid Security 9 20 11rev1
CT IRP Grid Security 9 20 11rev1CT IRP Grid Security 9 20 11rev1
CT IRP Grid Security 9 20 11rev1
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Low cost technology for Community Resource Centres
Low cost technology for Community Resource CentresLow cost technology for Community Resource Centres
Low cost technology for Community Resource Centres
 
The 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problemThe 99.999 percent cybersecurity problem
The 99.999 percent cybersecurity problem
 

Similar to [Challenge:Future] Rallying Youth Against Cyber Crime

Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
Trobough
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
Mousselmal Tarik
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
Booz Allen Hamilton
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
TechBiz Forense Digital
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
Sarah Jarvis
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of Authenticity
Future Agenda
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
Debabrata Samanta
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
 
National Security Review
National Security ReviewNational Security Review
National Security Review
Simoun Ung
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
 
PROTEC - Informing the Public
PROTEC - Informing the PublicPROTEC - Informing the Public
PROTEC - Informing the Public
Elena Rapisardi
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
jcichelli
 
Information Security
Information SecurityInformation Security
Information Security
trunko
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
ecarrow
 
Bo e v1.0
Bo e v1.0Bo e v1.0

Similar to [Challenge:Future] Rallying Youth Against Cyber Crime (20)

Narus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position PaperNarus Cyber 3.0 Position Paper
Narus Cyber 3.0 Position Paper
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of Authenticity
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
National Security Review
National Security ReviewNational Security Review
National Security Review
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
PROTEC - Informing the Public
PROTEC - Informing the PublicPROTEC - Informing the Public
PROTEC - Informing the Public
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 
Information Security
Information SecurityInformation Security
Information Security
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 

More from Challenge:Future

[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting
Challenge:Future
 
[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job
Challenge:Future
 
[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."
Challenge:Future
 
[Challenge:Future] What is life?
[Challenge:Future] What is life?[Challenge:Future] What is life?
[Challenge:Future] What is life?
Challenge:Future
 
[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness
Challenge:Future
 
[Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it![Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it!
Challenge:Future
 
[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself
Challenge:Future
 
[Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience![Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience!
Challenge:Future
 
[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign
Challenge:Future
 
[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul
Challenge:Future
 
[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015
Challenge:Future
 
[Challenge:Future] box of choices
[Challenge:Future] box of choices[Challenge:Future] box of choices
[Challenge:Future] box of choices
Challenge:Future
 
[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens
Challenge:Future
 
[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders
Challenge:Future
 
[Challenge:Future] Passion
[Challenge:Future] Passion[Challenge:Future] Passion
[Challenge:Future] Passion
Challenge:Future
 
[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF
Challenge:Future
 
[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning
Challenge:Future
 
[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange
Challenge:Future
 
[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE
Challenge:Future
 
[Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity [Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity
Challenge:Future
 

More from Challenge:Future (20)

[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting[Challenge:Future] Think twice before quitting
[Challenge:Future] Think twice before quitting
 
[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job[Challenge:Future] Raft Guide Job
[Challenge:Future] Raft Guide Job
 
[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."[Challenge:Future] " The Secret of Happiness."
[Challenge:Future] " The Secret of Happiness."
 
[Challenge:Future] What is life?
[Challenge:Future] What is life?[Challenge:Future] What is life?
[Challenge:Future] What is life?
 
[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness[Challenge:Future] The Power of Happiness
[Challenge:Future] The Power of Happiness
 
[Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it![Challenge:Future] Do not delay it!
[Challenge:Future] Do not delay it!
 
[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself[Challenge:Future] Always rely only on yourself
[Challenge:Future] Always rely only on yourself
 
[Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience![Challenge:Future] Hard work, Dedication & Patience!
[Challenge:Future] Hard work, Dedication & Patience!
 
[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign[Challenge:Future] I give you this medal as a sign
[Challenge:Future] I give you this medal as a sign
 
[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul[Challenge:Future] Guard Your Soul
[Challenge:Future] Guard Your Soul
 
[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015[Challenge:Future] My Career Tip for 2015
[Challenge:Future] My Career Tip for 2015
 
[Challenge:Future] box of choices
[Challenge:Future] box of choices[Challenge:Future] box of choices
[Challenge:Future] box of choices
 
[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens[Challenge:Future] The magic world of Homo Ludens
[Challenge:Future] The magic world of Homo Ludens
 
[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders[Challenge:Future] Break the Borders
[Challenge:Future] Break the Borders
 
[Challenge:Future] Passion
[Challenge:Future] Passion[Challenge:Future] Passion
[Challenge:Future] Passion
 
[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF[Challenge:Future] BE YOURSELF
[Challenge:Future] BE YOURSELF
 
[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning[Challenge:Future] Lifelong Learning
[Challenge:Future] Lifelong Learning
 
[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange[Challenge:Future] Smile And Accept the Challange
[Challenge:Future] Smile And Accept the Challange
 
[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE[Challenge:Future] HELP YOURSELF AND LIVE
[Challenge:Future] HELP YOURSELF AND LIVE
 
[Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity [Challenge:Future] Faith in humanity
[Challenge:Future] Faith in humanity
 

[Challenge:Future] Rallying Youth Against Cyber Crime

  • 1. RALLYING YOUTH AGAINST CYBER CRIME ENVISIONED DISASTER : CYBER CRIMES AREA : DISASTER PREVENTION, PREPAREDNESS H. Nilès Perera University of Moratuwa Sri Lanka
  • 2. CYBER SECURITY  The World has become highly dependent on Computer Networks  Many businesses and personal lives are entwined with the Cyber World  A breach into a such a network would be catastrophic
  • 3. WHY CYBER SECURITY? Interception The society is Cyber Crimes Billions of e.g. – Identity and misuse of largely are taking dollars are lost Theft, Credit information ignorant to the place as we annually as a Card can lead to a gravity of this speak result of this Fraud, Corpora potential threat te Espionage disaster in what is considered the “information age”
  • 4. WHEN & HOW…??? A cyber security Most computer Awareness A recent survey disaster can networks are regarding the conducted in Sri break out any inadequately gravity of the Lanka revealed that a majority of second protected issue is employees would minimum willingly give away their login information This means the threat of a disaster exists from both within and outside of the network
  • 5. OVERCOMING CYBER CRIMES  A three pronged strategy focussing on Prevention & Preparedness is proposed Tougher Laws Server Lockdown Create Awareness
  • 6. HOW WOULD IT WORK? The enormity of the catastrophe that can be caused by forging, replacing, hacking and other illegal interceptions of data using cyber crimes are not widely known by the public By shedding light to the issue and creating awareness among the public prevention and preparedness can be achieved Conduct Promote Cyber Lobby for legal Forums, Discussions Safety Drills and changes using broad & Workshops to get usage of proper youth movements the message across Firewalls, Anti-Virus and other software
  • 7. IS IT RELEVANT & EFFECTIVE? Youth Effective change can be instilled by Knowledge & a youth led Awareness gives awareness Youth is the Awarenes Power Change Catalyst of s campaign because….. the 21st century e.g. – using social media, blogs Success
  • 8. HOW IS IT INNOVATIVE? There are many awareness programmes initiated across the world to promote Cyber Security. But a Youth lead programme will catalyse a big change in a world where the young generation has become the major user of the rapidly galloping technological advancements. Many countries have already introduced laws (e.g. - Sri Lanka enacted the Computer Crimes Act No.24 in 2007) to mitigate this disaster, however very few of these were drafted after careful consideration of the future after taking inputs from the youth of the respective nations.
  • 9. EXPECTED RESULTS… Greater Awareness of the Implement seriousness of tougher laws Creating a proactive platform Cyber Crimes and regulations across the to share experiences and world knowledge on Cyber Security breaches Leading to a drastic reduction of reported incidents & financial costs of Cyber Security breaches
  • 10. WHY WILL IT WORK? • Youth have always been the • Cyber Crime is a serious disaster forefront of change, the recent that is waiting to happen, and the “Arab Spring” illustrates what public is ignorant about it. Once youth can achieve if they are in it the gravity of this disaster, which together can liquidate assets, alter records, delete or leak valuable information and affect anyone who deals with the cyber world in a split second hits the general public they are bound to react. This is a disaster of grand scale that everyone regardless of age, colour, nationality, religion or region is prone to face in the near future and will bring the world to a standstill.