SlideShare a Scribd company logo
GROUP MEMBERS
 M AWAIS NASEER
 RANA ATIF SATTAR
 HASNAIN AHMED
 AIMEN MALIK
 RISK ASSESMENT
 8 STEPS FOR RISK ASSESMENT
 ESTABLISHING A SECURITY POLICY
 PREVENTION
 DETECTION
 RESPONSE
A risk assessment is the process of assessing security –
related risks to an organization’s computer
and networks from both internal and external threats
 The goals of risk assessment is to identify which investments of time and
resources will best protect the organization from its most likely and serious
threats.
1. Identify the set of IT assets about which the organization is most
concerned.
2. Identify the loss events or the risk or threats that could occur ,
such as a distributed denial-of –services attack or insider fraud
3. Asses the frequency of events or the likelihood of each potential
threat; some threats, such as insider fraud ,are more likely to occur
to others
4. Determine the each impact of each threat occurring .
5. Determine the each threat can be mitigated so that it becomes much
less likely to occur or, if it does occur ,has less of an impact on the
organization.
6. Assess the feasibility of implementing the mitigation option.
7. Perform a cost benefit analysis to ensure that your efforts will be cost
effective .
8. Make the decision on whether or not to implement a particular counter-
measure.
 To obtain useful and more accurate analysis results,
a complete inventory list and security requirements
for a system shall be made available as inputs to the
identification and analysis activities.
 Due to the high demand of expert knowledge and
experiences in analysing the collected information
and justifying security measures, a security risk
assessment should be performed by qualified
security expert(s).
DEFINATION:
A security policy defines an organization security requirements ,as well as the controls and
sections needed to meet those requirements.
• A good security policy delineats responseibilities and the
Behaviour of the members of the organization
• NIST 800 series of documentation
which provides a useful defination ,policies,
standards, and guidelines related to computer security .
• Automated system policies can often be put into
practice using the configuration in a software
programme
• The use of e-mail attachments is a critical security issue
that should be addressed in a organization’s
security policy.
• Another growing area of concern is the use of wire less
devices to access corporate e-mail ,store confidential
data, and run critical applications ,such as inventory
management and sales force automation
 AVirtual private network:
A virtual private network works by using the internet
to relay communication ; it maintains privacy through
security procedures and tunneling protocols ,which
encrypt data at the sending end and decrypt data at
the receiving end
EDUCATING EMPLOYEES ,CONTRACTORS AND
PART TIME WORKERS
• Guarding their passwords to protect against
unathorized access to accounts
• Prohobiting others from using their systems
• Applying strict access controles to protect data
from disclouser and distruction
• Reporting all unusual activities to the organization’s it security
group
FOLLOWING ARE THE METHOD WHICH ARE USED FOR SECURITY PURPOSE
1) FIREWALL
2) INTRUSION PREVENTION SYSTEMS (IPS s)
3) ANTIVIRUS
o NORTONE ANTIWIRUS
o PERSONAL FOREWALL FROM McAfee
Firewall standard guard between an organization
internal network and the internet and its limit
network access based on the organization access
policy.
Installing a firewall can lead to an other serious
security issue_copmlancency .
work to prevent an attack by blocking virus mal-form
packets ,and other threats
from getting into the protected network.
a firewall and a network IPS are complementry
ANTI VIRUS SOFTWARESHOULD BE INSTALL ON
EACH USERS ,PERSONAL USER TO SCAN A
COMPUTER .
ANTIVIRUS SOFTWARE CAN SCAN FOR A SPECIFIC
SEQUENCE OF BYTES KNOWN AS A VIRUS
SIGNATURE
Even when preventive measure are implemented ,no organization is
completely secure from a determined attack
 INTRUSION DETECTION SYSTEM
It is a software and/or
hardware that monitors systems and network resources and activities
, and notifies network security personnel when it identify possible
intrusion from out side the organization or misuse from with in the
organization
1) Incident Notification
2) Protection Of Evidence And Activity Logs
3) Incident containment
4) Eradication
5) Incident follow-up
The key element of any response plan is to define who to
notify who not to notify.
Most security experts recommends against giving out
specific information about a compromise in public forms
,such as a news paper report, conferences ,professional
meetings and online discussion groups.
And organization should document all detail of security
incident as it works to resolve the incident .
Documentation capture value able evidence for a future
prosecution and provide data to help during the incident
eradication and follow up phases .
It is especially important to capture all system events
,specific action ( what, when ,who)and all external
conversation in a log book.
Often it is necessary to act quickly to contain an attack
to keep a bad situation from becoming even worse.
How such decision are made ,how fast they are made
,who makes them are all element of an effective
response plan.
Before the IT security groups begin the eradication
effort ,it must collect and log all possible criminal
evidence from the system and then verify that all
necessary backups are current ,complete ,and free of
any virus
A reviwe should be conducted after an incident to
determined exactly what happen and to evaluate how
the organization responded.
However it is important to look deeper then
immediate fix to discover why the incident occur.
ANY QUESTION
chapter 3 ethics: computer and internet crime

More Related Content

What's hot

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Raheela Patel
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
Mary Rayme
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
aliuet
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
KaustubhPathak11
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
arel shane
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
Shanawaz Ahamed
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
100688767-barrett
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
Benjamin Morley
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Himanshu Saini
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Nagaveni kavya
 

What's hot (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to chapter 3 ethics: computer and internet crime

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
NeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
Risk Management
Risk ManagementRisk Management
Risk Management
ijtsrd
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
Marc St-Pierre
 
Presentation1 A.pptx
Presentation1 A.pptxPresentation1 A.pptx
Presentation1 A.pptx
RabinBidari
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Network Security
Network SecurityNetwork Security
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
EyesOpen Association
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
phanleson
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 

Similar to chapter 3 ethics: computer and internet crime (20)

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Presentation1 A.pptx
Presentation1 A.pptxPresentation1 A.pptx
Presentation1 A.pptx
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

chapter 3 ethics: computer and internet crime

  • 1.
  • 2. GROUP MEMBERS  M AWAIS NASEER  RANA ATIF SATTAR  HASNAIN AHMED  AIMEN MALIK
  • 3.
  • 4.  RISK ASSESMENT  8 STEPS FOR RISK ASSESMENT  ESTABLISHING A SECURITY POLICY  PREVENTION  DETECTION  RESPONSE
  • 5. A risk assessment is the process of assessing security – related risks to an organization’s computer and networks from both internal and external threats  The goals of risk assessment is to identify which investments of time and resources will best protect the organization from its most likely and serious threats.
  • 6. 1. Identify the set of IT assets about which the organization is most concerned. 2. Identify the loss events or the risk or threats that could occur , such as a distributed denial-of –services attack or insider fraud 3. Asses the frequency of events or the likelihood of each potential threat; some threats, such as insider fraud ,are more likely to occur to others 4. Determine the each impact of each threat occurring . 5. Determine the each threat can be mitigated so that it becomes much less likely to occur or, if it does occur ,has less of an impact on the organization. 6. Assess the feasibility of implementing the mitigation option. 7. Perform a cost benefit analysis to ensure that your efforts will be cost effective . 8. Make the decision on whether or not to implement a particular counter- measure.
  • 7.
  • 8.  To obtain useful and more accurate analysis results, a complete inventory list and security requirements for a system shall be made available as inputs to the identification and analysis activities.  Due to the high demand of expert knowledge and experiences in analysing the collected information and justifying security measures, a security risk assessment should be performed by qualified security expert(s).
  • 9. DEFINATION: A security policy defines an organization security requirements ,as well as the controls and sections needed to meet those requirements. • A good security policy delineats responseibilities and the Behaviour of the members of the organization • NIST 800 series of documentation which provides a useful defination ,policies, standards, and guidelines related to computer security .
  • 10. • Automated system policies can often be put into practice using the configuration in a software programme • The use of e-mail attachments is a critical security issue that should be addressed in a organization’s security policy. • Another growing area of concern is the use of wire less devices to access corporate e-mail ,store confidential data, and run critical applications ,such as inventory management and sales force automation
  • 11.  AVirtual private network: A virtual private network works by using the internet to relay communication ; it maintains privacy through security procedures and tunneling protocols ,which encrypt data at the sending end and decrypt data at the receiving end
  • 12. EDUCATING EMPLOYEES ,CONTRACTORS AND PART TIME WORKERS • Guarding their passwords to protect against unathorized access to accounts • Prohobiting others from using their systems • Applying strict access controles to protect data from disclouser and distruction • Reporting all unusual activities to the organization’s it security group
  • 13. FOLLOWING ARE THE METHOD WHICH ARE USED FOR SECURITY PURPOSE 1) FIREWALL 2) INTRUSION PREVENTION SYSTEMS (IPS s) 3) ANTIVIRUS o NORTONE ANTIWIRUS o PERSONAL FOREWALL FROM McAfee
  • 14. Firewall standard guard between an organization internal network and the internet and its limit network access based on the organization access policy. Installing a firewall can lead to an other serious security issue_copmlancency .
  • 15.
  • 16. work to prevent an attack by blocking virus mal-form packets ,and other threats from getting into the protected network. a firewall and a network IPS are complementry
  • 17. ANTI VIRUS SOFTWARESHOULD BE INSTALL ON EACH USERS ,PERSONAL USER TO SCAN A COMPUTER . ANTIVIRUS SOFTWARE CAN SCAN FOR A SPECIFIC SEQUENCE OF BYTES KNOWN AS A VIRUS SIGNATURE
  • 18. Even when preventive measure are implemented ,no organization is completely secure from a determined attack  INTRUSION DETECTION SYSTEM It is a software and/or hardware that monitors systems and network resources and activities , and notifies network security personnel when it identify possible intrusion from out side the organization or misuse from with in the organization
  • 19. 1) Incident Notification 2) Protection Of Evidence And Activity Logs 3) Incident containment 4) Eradication 5) Incident follow-up
  • 20. The key element of any response plan is to define who to notify who not to notify. Most security experts recommends against giving out specific information about a compromise in public forms ,such as a news paper report, conferences ,professional meetings and online discussion groups.
  • 21. And organization should document all detail of security incident as it works to resolve the incident . Documentation capture value able evidence for a future prosecution and provide data to help during the incident eradication and follow up phases . It is especially important to capture all system events ,specific action ( what, when ,who)and all external conversation in a log book.
  • 22. Often it is necessary to act quickly to contain an attack to keep a bad situation from becoming even worse. How such decision are made ,how fast they are made ,who makes them are all element of an effective response plan.
  • 23. Before the IT security groups begin the eradication effort ,it must collect and log all possible criminal evidence from the system and then verify that all necessary backups are current ,complete ,and free of any virus
  • 24. A reviwe should be conducted after an incident to determined exactly what happen and to evaluate how the organization responded. However it is important to look deeper then immediate fix to discover why the incident occur.