SlideShare a Scribd company logo
1 of 34
Security and EthicalSecurity and Ethical
ChallengesChallenges
Management Information SystemsManagement Information Systems
1BSIT (5th)
Specially We talk about :
OKARA city (History)
Computer Security
Security challenges
Cyber Crime
And other Many information about society
Taimoor , Sabira , Rana Bilal , Rizwan Chuhdry
Special Lecturer
OkaraOkara
OKARAOKARA
īļ Area 4181 km²Area 4181 km²
īļ Number of Number of 
Union councilsUnion councils 6060
īļ Four Tahsil in OKARAFour Tahsil in OKARA
Meer Chaaqar RindMeer Chaaqar Rind OKARAOKARA
īļ Touch Three RiverTouch Three River
īļ Milk of LakeMilk of Lake
īļ DEPALPURDEPALPUR
īļ 2500 years Before Orion2500 years Before Orion
īļ Population in 1998Population in 1998
īļ S.YONANI injuredS.YONANI injured
īą Okara KingOkara King
īą Proud of Bloch familyProud of Bloch family
OKARAOKARA
īŽ Ahmed khan kharalAhmed khan kharal
īŽ 18571857
īŽ Fight against EnglishFight against English
ArmyArmy
Computer securityComputer security
Computer securityComputer security , also known as cyber, also known as cyber
security or IT security or IT securitysecurity, is the protection of, is the protection of
computercomputer systems from the theft or systems from the theft or
damage to the hardware, software or thedamage to the hardware, software or the
information on them, as well as frominformation on them, as well as from
disruption or misdirection of the servicesdisruption or misdirection of the services
they provide.they provide.
Our MistakeOur Mistake
Security challengesSecurity challenges
Computer crimes that exist in the presentComputer crimes that exist in the present
society are:-society are:-
īŽ HackingHacking
īŽ Cyber TheftCyber Theft
īŽ Unauthorized use at workUnauthorized use at work
īŽ Software PiracySoftware Piracy
īŽ Piracy of intellectual propertyPiracy of intellectual property
īŽ Computer viruses and wormsComputer viruses and worms
Management Information Systems 8
HackingHacking
Hacking is the obsessive use of computers, or theHacking is the obsessive use of computers, or the
unauthorized access and use of networkedunauthorized access and use of networked
computer systems. Hackers usuallycomputer systems. Hackers usually
īŽ Steal or damage dataSteal or damage data
īŽ Get unauthorized access to computer filesGet unauthorized access to computer files
īŽ Monitor e-mails or web server accessMonitor e-mails or web server access
īŽ May use remote services that allow oneMay use remote services that allow one
computer to execute programs on anothercomputer to execute programs on another
īŽ Plant data that will cause system to welcomePlant data that will cause system to welcome
intrudersintruders
Management Information Systems 9
Cyber TheftCyber Theft
Cyber theft involves theft of money byCyber theft involves theft of money by
unauthorized network entry and fraudulentunauthorized network entry and fraudulent
alteration of computer databases.alteration of computer databases.
Management Information Systems 10
Unauthorized use at WorkUnauthorized use at Work
Unauthorized use of computer resourcesUnauthorized use of computer resources
especially by employeesespecially by employees
īŽ Playing video gamesPlaying video games
īŽ Unauthorized use of internetUnauthorized use of internet
īŽ Non-work related upload/downloadNon-work related upload/download
īŽ Transmission of confidential dataTransmission of confidential data
īŽ MoonlightingMoonlighting
Management Information Systems 11
Software PiracySoftware Piracy
Unauthorized copying of data is calledUnauthorized copying of data is called
software piracy or software theftsoftware piracy or software theft
Software is protected by copyright law andSoftware is protected by copyright law and
user license agreement that allows onlyuser license agreement that allows only
limited copies to be madelimited copies to be made
Management Information Systems 12
Piracy of Intellectual PropertyPiracy of Intellectual Property
Materials other than software are alsoMaterials other than software are also
pirated by making multiple copiespirated by making multiple copies
īŽ Piracy of music, video, images, articles,Piracy of music, video, images, articles,
books etc.books etc.
īŽ Dissemination of these material throughDissemination of these material through
internet websitesinternet websites
Management Information Systems 13
Computer viruses and wormsComputer viruses and worms
īŽ A virus is a program code that cannot work without beingA virus is a program code that cannot work without being
inserted into another programinserted into another program
īŽ A worm is a distinct program that can run unaidedA worm is a distinct program that can run unaided
These programs copy annoying or destructive routines intoThese programs copy annoying or destructive routines into
the networked computer systems of anyone whothe networked computer systems of anyone who
accesses computers affected with the virus or who usesaccesses computers affected with the virus or who uses
copies of magnetic disks taken from infected computerscopies of magnetic disks taken from infected computers
They enter a computer through e-mail or file attachments,They enter a computer through e-mail or file attachments,
or through illegal software. A virus usually copies itselfor through illegal software. A virus usually copies itself
into the OS, and then spreads to main memory and thusinto the OS, and then spreads to main memory and thus
hard disk and any inserted external memory.hard disk and any inserted external memory.
Management Information Systems 14
Privacy IssuesPrivacy Issues
īŽ Privacy on the internetPrivacy on the internet
īŽ Computer MatchingComputer Matching
īŽ Privacy LawsPrivacy Laws
īŽ Computer libel and censorship (threats areComputer libel and censorship (threats are
spamming and flaming)spamming and flaming)
Management Information Systems 15
Other ChallengesOther Challenges
īŽ Employment challenges because a lot of tasksEmployment challenges because a lot of tasks
have been automatedhave been automated
īŽ Computer monitoring causes intrusion inComputer monitoring causes intrusion in
personal space for workerspersonal space for workers
īŽ Challenges in working conditions are caused byChallenges in working conditions are caused by
tasks which are monotonous in nature. But ittasks which are monotonous in nature. But it
also automates most of the work and gives wayalso automates most of the work and gives way
to more challenging jobsto more challenging jobs
īŽ Challenges to individuality as they eliminate theChallenges to individuality as they eliminate the
human relationships between peoplehuman relationships between people
Management Information Systems 16
Health issuesHealth issues
īŽ The use of IT in the workplace raises a variety of
health issues. Heavy use of computers is
reportedly causing health problems such as:
īŽ ¡ Job stress
īŽ ¡ Damaged arm and neck muscles
īŽ ¡ Eye strain
īŽ ¡ Radiation exposure
īŽ ¡ Death by computer-caused accidents
Management Information Systems 17
BenefitsBenefits
īŽ Medical diagnosisMedical diagnosis
īŽ Crime controlCrime control
īŽ Environmental monitoringEnvironmental monitoring
īŽ Urban planningUrban planning
īŽ Computer based trainingComputer based training
īŽ Distance learningDistance learning
Management Information Systems 18
Ethical responsibility of businessEthical responsibility of business
professionalsprofessionals
Business ethics are concerned withBusiness ethics are concerned with
īŽ EquityEquity
īŽ RightsRights
īŽ HonestyHonesty
īŽ Exercise of corporate powerExercise of corporate power
Management Information Systems 19
Categories of Ethical Business IssuesCategories of Ethical Business Issues
Management Information Systems 20
CYBER CRIME IN PAKISTANCYBER CRIME IN PAKISTAN
īŽ Cybercrime, also called computer crime, is any illegalCybercrime, also called computer crime, is any illegal
activity that involves a computer or network-connectedactivity that involves a computer or network-connected
device, such as a mobile phone. crimes in which thedevice, such as a mobile phone. crimes in which the
computing device is the target, for example, to gaincomputing device is the target, for example, to gain
network access; crimes in which the computer is used asnetwork access; crimes in which the computer is used as
a weapon, for example,a weapon, for example,
īŽ any criminal activity that uses a computer device orany criminal activity that uses a computer device or
Ineternet is called cyber crimeIneternet is called cyber crime
Management Information Systems 21
TYPES OF CYBER CRIMETYPES OF CYBER CRIME
īŽ HackingHacking
īŽ PhishingPhishing
īŽ SpoofingSpoofing
īŽ ScamScam
īŽ virus ATTACKvirus ATTACK
Management Information Systems 22
TYPESTYPES
īŽ hacking in simple term means illegal instruction into a computer systemhacking in simple term means illegal instruction into a computer system
īŽ without the permission of computer .ownerwithout the permission of computer .owner
īŽ phishingphishing
īŽ LOGIN PAGELOGIN PAGE
īŽ NOT A ACTUAL Official PAGENOT A ACTUAL Official PAGE
īŽ build BANK WEBSITEbuild BANK WEBSITE
NOT A OFFICAL BANK WEBSIENOT A OFFICAL BANK WEBSIE
GET THE USER NAME AND PASSWORDGET THE USER NAME AND PASSWORD
THE ACCOUNT NUMBERTHE ACCOUNT NUMBER
Management Information Systems 23
Management Information Systems 24
GET USER INFORMATIONGET USER INFORMATION
GET THE ACCOUNT NUMBERGET THE ACCOUNT NUMBER
AND ALL INFORMATION RELATED TO THE ACCONTAND ALL INFORMATION RELATED TO THE ACCONT
for security purpose you can change your passwordfor security purpose you can change your password
CRIMINAL SEND SMSCRIMINAL SEND SMS
CRIMAL SEND EMAIL TO THE USERCRIMAL SEND EMAIL TO THE USER
CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGECRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE
use key logger softwareuse key logger software
Management Information Systems 25
SCAMINGSCAMING
1.1. A scam is a quick-profit scheme where a person cheats another individualA scam is a quick-profit scheme where a person cheats another individual
or group out of money by presenting them with false information during aor group out of money by presenting them with false information during a
deal or offer.deal or offer.
2.2. There are many different types of scams Scammers can approach theirThere are many different types of scams Scammers can approach their
victims via email, SMS, and sometimes even a phone to your personal cellvictims via email, SMS, and sometimes even a phone to your personal cell
number.number.
3.3. . In this scheme, a person receives news via phone call or email that they. In this scheme, a person receives news via phone call or email that they
have won the lottery and can retrieve the cash prize after submitting a smallhave won the lottery and can retrieve the cash prize after submitting a small
processing fee. After submitting the fee, the attacker disappears with theprocessing fee. After submitting the fee, the attacker disappears with the
money.money.
4.4. use websitesuse websites
5.5. social mediasocial media
6.6. scammer can also use face book pagesscammer can also use face book pages
7.7. face book groupsface book groups
Management Information Systems 26
SCAMINGSCAMING
MOSTLY ECOMERCE WEBSITES AREMOSTLY ECOMERCE WEBSITES ARE
INVOLED IN SACAMSINVOLED IN SACAMS
BAD PRODUCTSBAD PRODUCTS
HIGH PRICEHIGH PRICE
YOU CAN CHECK THE WEBSITE FAQ'SYOU CAN CHECK THE WEBSITE FAQ'S
CHECK THE ADMIN GROUPCHECK THE ADMIN GROUP
DESCRIPTIONDESCRIPTION
Management Information Systems 27
LIST OF CYBER CRIME AND THEIR PUNISHMENTS INLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN
PAKISTANPAKISTAN
spreading False Information up to 3 Years inspreading False Information up to 3 Years in
Prison or up to Rs. 1 Million in FinePrison or up to Rs. 1 Million in Fine
You know that an information is wrong and youYou know that an information is wrong and you
still post or share it on Facebook about astill post or share it on Facebook about a
person that damages his/her reputationperson that damages his/her reputation
Making / Spreading Explicit Images or VideosMaking / Spreading Explicit Images or Videos
of an Individual: up to 5 Years in Prison or up toof an Individual: up to 5 Years in Prison or up to
Rs. 5 Million in Fine or bothRs. 5 Million in Fine or both
photoshop any imagephotoshop any image
Management Information Systems 29
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or bothUp to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
If you try to get into a relation with someone online throughIf you try to get into a relation with someone online through
internet website, email, SMS, phone or any communicationinternet website, email, SMS, phone or any communication
tool despite there is disinterest from the other party thentool despite there is disinterest from the other party then
you can be jailed for three years or imposed a fine whichyou can be jailed for three years or imposed a fine which
may extend to one million rupees or with both.may extend to one million rupees or with both.
You repeatedly call someoneYou repeatedly call someone
If you call, chat with someone and other party has noIf you call, chat with someone and other party has no
issues with that then its all cool, nothing to worry about.issues with that then its all cool, nothing to worry about.
Management Information Systems 30
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Making Videos/Pics and Distributing without Consent: Up toMaking Videos/Pics and Distributing without Consent: Up to
3 Years in Jail or Up to Rs. 1 Million in Fine or both,,3 Years in Jail or Up to Rs. 1 Million in Fine or both,,
You take a photograph or make a video of any person andYou take a photograph or make a video of any person and
displays or distributes it without his/her consent in adisplays or distributes it without his/her consent in a
manner that harms a person then you can go behind barsmanner that harms a person then you can go behind bars
for up to three years and may have to bear a fine of up tofor up to three years and may have to bear a fine of up to
Rs. 1 million or bothRs. 1 million or both
Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 orSpoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or
bothboth
Management Information Systems 31
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
virus Code: Up to 2 Years in Jail or up to Rs.virus Code: Up to 2 Years in Jail or up to Rs.
1 Million in Fine or Both1 Million in Fine or Both
You write a virusYou write a virus
You write a code that can be used toYou write a code that can be used to
destruct a hard drivedestruct a hard drive
You develop a mobile app to spy someoneYou develop a mobile app to spy someone
Yo develop an app to spread virusYo develop an app to spread virus
Management Information Systems 32
LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Unauthorized copying or transmission of Data: up to 6Unauthorized copying or transmission of Data: up to 6
Months Prison or up to Rs. 100,000 Fine or bothMonths Prison or up to Rs. 100,000 Fine or both
If you copies data of someone else’s flash driveIf you copies data of someone else’s flash drive
If you gain access to someone’s phone and copy a mobileIf you gain access to someone’s phone and copy a mobile
numbernumber
Unauthorized use of identity information: Up to 3 Years inUnauthorized use of identity information: Up to 3 Years in
Prison or up to Rs. 5 Million fine or bothPrison or up to Rs. 5 Million fine or both
You use someone’s email addressYou use someone’s email address
Management Information Systems 33
Okara history and security slides 2017

More Related Content

What's hot

computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensicShabnamkhan113
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Information security awareness
Information security awarenessInformation security awareness
Information security awarenessCAS
 
Computer Use Policy EK Computers
Computer Use Policy EK ComputersComputer Use Policy EK Computers
Computer Use Policy EK ComputersKirstin Long
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMostafa Elgamala
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Malware
MalwareMalware
Malwaregalaxy201
 
Cybercrime and IT ACT
Cybercrime and IT ACTCybercrime and IT ACT
Cybercrime and IT ACTAkshay Bhardwaj
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Security measure
Security measureSecurity measure
Security measuresanizah_md
 
Hacking
HackingHacking
HackingVirus
 

What's hot (20)

computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensic
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Hamza
HamzaHamza
Hamza
 
File000145
File000145File000145
File000145
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Computer Use Policy EK Computers
Computer Use Policy EK ComputersComputer Use Policy EK Computers
Computer Use Policy EK Computers
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Computer
ComputerComputer
Computer
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Malware
MalwareMalware
Malware
 
Cybercrime and IT ACT
Cybercrime and IT ACTCybercrime and IT ACT
Cybercrime and IT ACT
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Security measure
Security measureSecurity measure
Security measure
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Hacking
HackingHacking
Hacking
 

Viewers also liked

Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
Time Management And Time Stealers
Time Management And Time StealersTime Management And Time Stealers
Time Management And Time StealersLauren11
 
4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence Teams4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence TeamsRecorded Future
 
Service Culture Indicator
Service Culture IndicatorService Culture Indicator
Service Culture IndicatorUpYourService
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Time management
Time managementTime management
Time managementJudi Ungar
 
Time Management
Time ManagementTime Management
Time ManagementArsalan Ahmad
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Testing Metrics - Making your tests visible
Testing Metrics - Making your tests visibleTesting Metrics - Making your tests visible
Testing Metrics - Making your tests visibleAlper Mermer
 
10 Time Management Tips - PART 1
10 Time Management Tips - PART 110 Time Management Tips - PART 1
10 Time Management Tips - PART 1Linda Hauck
 
Time Management
Time ManagementTime Management
Time Managementvipin balan
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slidesAndre Debilloez
 
Office Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductOffice Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductMonica Dhoundiyal
 
Ethics in the workplace
Ethics in the workplaceEthics in the workplace
Ethics in the workplaceviviandabu
 

Viewers also liked (20)

Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Time Management And Time Stealers
Time Management And Time StealersTime Management And Time Stealers
Time Management And Time Stealers
 
4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence Teams4 Rules for Successful Threat Intelligence Teams
4 Rules for Successful Threat Intelligence Teams
 
Service Culture Indicator
Service Culture IndicatorService Culture Indicator
Service Culture Indicator
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Time management
Time managementTime management
Time management
 
Time Management
Time ManagementTime Management
Time Management
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Testing Metrics - Making your tests visible
Testing Metrics - Making your tests visibleTesting Metrics - Making your tests visible
Testing Metrics - Making your tests visible
 
TIME MANAGEMENT TIPS
TIME MANAGEMENT TIPSTIME MANAGEMENT TIPS
TIME MANAGEMENT TIPS
 
10 Time Management Tips - PART 1
10 Time Management Tips - PART 110 Time Management Tips - PART 1
10 Time Management Tips - PART 1
 
Time Management
Time ManagementTime Management
Time Management
 
Work Ethics
Work EthicsWork Ethics
Work Ethics
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Time Management
Time ManagementTime Management
Time Management
 
Office Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductOffice Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conduct
 
Ethics in the workplace
Ethics in the workplaceEthics in the workplace
Ethics in the workplace
 

Similar to Okara history and security slides 2017

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityArshad Khan
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptxJoselitoJMebolos
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxBWUBTS19022
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdfAaradhyaPandey4
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data ProtectionDr. Hemant Kumar Singh
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.pptPradeep513562
 

Similar to Okara history and security slides 2017 (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
 

More from TAIMOOR KHAQAN

taimoor khaqan poetry
taimoor khaqan poetrytaimoor khaqan poetry
taimoor khaqan poetryTAIMOOR KHAQAN
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence TAIMOOR KHAQAN
 
Knowlage Management System 2017 slides
Knowlage Management System 2017 slidesKnowlage Management System 2017 slides
Knowlage Management System 2017 slidesTAIMOOR KHAQAN
 
Html tags slides 2016
Html tags slides 2016Html tags slides 2016
Html tags slides 2016TAIMOOR KHAQAN
 
Peace presentation
Peace presentationPeace presentation
Peace presentationTAIMOOR KHAQAN
 

More from TAIMOOR KHAQAN (9)

taimoor khaqan poetry
taimoor khaqan poetrytaimoor khaqan poetry
taimoor khaqan poetry
 
Shah wali allah
Shah wali allahShah wali allah
Shah wali allah
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence
 
Knowlage Management System 2017 slides
Knowlage Management System 2017 slidesKnowlage Management System 2017 slides
Knowlage Management System 2017 slides
 
html 2017
html 2017html 2017
html 2017
 
Html tags slides 2016
Html tags slides 2016Html tags slides 2016
Html tags slides 2016
 
DIVORSE /TALAQ
DIVORSE /TALAQDIVORSE /TALAQ
DIVORSE /TALAQ
 
Peace presentation
Peace presentationPeace presentation
Peace presentation
 
family matters
family mattersfamily matters
family matters
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,
ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,
ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,Virag Sontakke
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,
ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,
ā¤­ā¤žā¤°ā¤¤-ā¤°āĨ‹ā¤Ž ā¤ĩāĨā¤¯ā¤žā¤Ēā¤žā¤°.pptx, Indo-Roman Trade,
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Okara history and security slides 2017

  • 1. Security and EthicalSecurity and Ethical ChallengesChallenges Management Information SystemsManagement Information Systems 1BSIT (5th) Specially We talk about : OKARA city (History) Computer Security Security challenges Cyber Crime And other Many information about society Taimoor , Sabira , Rana Bilal , Rizwan Chuhdry Special Lecturer
  • 2. OkaraOkara OKARAOKARA īļ Area 4181 km²Area 4181 km² īļ Number of Number of  Union councilsUnion councils 6060 īļ Four Tahsil in OKARAFour Tahsil in OKARA
  • 3. Meer Chaaqar RindMeer Chaaqar Rind OKARAOKARA īļ Touch Three RiverTouch Three River īļ Milk of LakeMilk of Lake īļ DEPALPURDEPALPUR īļ 2500 years Before Orion2500 years Before Orion īļ Population in 1998Population in 1998 īļ S.YONANI injuredS.YONANI injured īą Okara KingOkara King īą Proud of Bloch familyProud of Bloch family
  • 4. OKARAOKARA īŽ Ahmed khan kharalAhmed khan kharal īŽ 18571857 īŽ Fight against EnglishFight against English ArmyArmy
  • 5. Computer securityComputer security Computer securityComputer security , also known as cyber, also known as cyber security or IT security or IT securitysecurity, is the protection of, is the protection of computercomputer systems from the theft or systems from the theft or damage to the hardware, software or thedamage to the hardware, software or the information on them, as well as frominformation on them, as well as from disruption or misdirection of the servicesdisruption or misdirection of the services they provide.they provide.
  • 7.
  • 8. Security challengesSecurity challenges Computer crimes that exist in the presentComputer crimes that exist in the present society are:-society are:- īŽ HackingHacking īŽ Cyber TheftCyber Theft īŽ Unauthorized use at workUnauthorized use at work īŽ Software PiracySoftware Piracy īŽ Piracy of intellectual propertyPiracy of intellectual property īŽ Computer viruses and wormsComputer viruses and worms Management Information Systems 8
  • 9. HackingHacking Hacking is the obsessive use of computers, or theHacking is the obsessive use of computers, or the unauthorized access and use of networkedunauthorized access and use of networked computer systems. Hackers usuallycomputer systems. Hackers usually īŽ Steal or damage dataSteal or damage data īŽ Get unauthorized access to computer filesGet unauthorized access to computer files īŽ Monitor e-mails or web server accessMonitor e-mails or web server access īŽ May use remote services that allow oneMay use remote services that allow one computer to execute programs on anothercomputer to execute programs on another īŽ Plant data that will cause system to welcomePlant data that will cause system to welcome intrudersintruders Management Information Systems 9
  • 10. Cyber TheftCyber Theft Cyber theft involves theft of money byCyber theft involves theft of money by unauthorized network entry and fraudulentunauthorized network entry and fraudulent alteration of computer databases.alteration of computer databases. Management Information Systems 10
  • 11. Unauthorized use at WorkUnauthorized use at Work Unauthorized use of computer resourcesUnauthorized use of computer resources especially by employeesespecially by employees īŽ Playing video gamesPlaying video games īŽ Unauthorized use of internetUnauthorized use of internet īŽ Non-work related upload/downloadNon-work related upload/download īŽ Transmission of confidential dataTransmission of confidential data īŽ MoonlightingMoonlighting Management Information Systems 11
  • 12. Software PiracySoftware Piracy Unauthorized copying of data is calledUnauthorized copying of data is called software piracy or software theftsoftware piracy or software theft Software is protected by copyright law andSoftware is protected by copyright law and user license agreement that allows onlyuser license agreement that allows only limited copies to be madelimited copies to be made Management Information Systems 12
  • 13. Piracy of Intellectual PropertyPiracy of Intellectual Property Materials other than software are alsoMaterials other than software are also pirated by making multiple copiespirated by making multiple copies īŽ Piracy of music, video, images, articles,Piracy of music, video, images, articles, books etc.books etc. īŽ Dissemination of these material throughDissemination of these material through internet websitesinternet websites Management Information Systems 13
  • 14. Computer viruses and wormsComputer viruses and worms īŽ A virus is a program code that cannot work without beingA virus is a program code that cannot work without being inserted into another programinserted into another program īŽ A worm is a distinct program that can run unaidedA worm is a distinct program that can run unaided These programs copy annoying or destructive routines intoThese programs copy annoying or destructive routines into the networked computer systems of anyone whothe networked computer systems of anyone who accesses computers affected with the virus or who usesaccesses computers affected with the virus or who uses copies of magnetic disks taken from infected computerscopies of magnetic disks taken from infected computers They enter a computer through e-mail or file attachments,They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itselfor through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thusinto the OS, and then spreads to main memory and thus hard disk and any inserted external memory.hard disk and any inserted external memory. Management Information Systems 14
  • 15. Privacy IssuesPrivacy Issues īŽ Privacy on the internetPrivacy on the internet īŽ Computer MatchingComputer Matching īŽ Privacy LawsPrivacy Laws īŽ Computer libel and censorship (threats areComputer libel and censorship (threats are spamming and flaming)spamming and flaming) Management Information Systems 15
  • 16. Other ChallengesOther Challenges īŽ Employment challenges because a lot of tasksEmployment challenges because a lot of tasks have been automatedhave been automated īŽ Computer monitoring causes intrusion inComputer monitoring causes intrusion in personal space for workerspersonal space for workers īŽ Challenges in working conditions are caused byChallenges in working conditions are caused by tasks which are monotonous in nature. But ittasks which are monotonous in nature. But it also automates most of the work and gives wayalso automates most of the work and gives way to more challenging jobsto more challenging jobs īŽ Challenges to individuality as they eliminate theChallenges to individuality as they eliminate the human relationships between peoplehuman relationships between people Management Information Systems 16
  • 17. Health issuesHealth issues īŽ The use of IT in the workplace raises a variety of health issues. Heavy use of computers is reportedly causing health problems such as: īŽ ¡ Job stress īŽ ¡ Damaged arm and neck muscles īŽ ¡ Eye strain īŽ ¡ Radiation exposure īŽ ¡ Death by computer-caused accidents Management Information Systems 17
  • 18. BenefitsBenefits īŽ Medical diagnosisMedical diagnosis īŽ Crime controlCrime control īŽ Environmental monitoringEnvironmental monitoring īŽ Urban planningUrban planning īŽ Computer based trainingComputer based training īŽ Distance learningDistance learning Management Information Systems 18
  • 19. Ethical responsibility of businessEthical responsibility of business professionalsprofessionals Business ethics are concerned withBusiness ethics are concerned with īŽ EquityEquity īŽ RightsRights īŽ HonestyHonesty īŽ Exercise of corporate powerExercise of corporate power Management Information Systems 19
  • 20. Categories of Ethical Business IssuesCategories of Ethical Business Issues Management Information Systems 20
  • 21. CYBER CRIME IN PAKISTANCYBER CRIME IN PAKISTAN īŽ Cybercrime, also called computer crime, is any illegalCybercrime, also called computer crime, is any illegal activity that involves a computer or network-connectedactivity that involves a computer or network-connected device, such as a mobile phone. crimes in which thedevice, such as a mobile phone. crimes in which the computing device is the target, for example, to gaincomputing device is the target, for example, to gain network access; crimes in which the computer is used asnetwork access; crimes in which the computer is used as a weapon, for example,a weapon, for example, īŽ any criminal activity that uses a computer device orany criminal activity that uses a computer device or Ineternet is called cyber crimeIneternet is called cyber crime Management Information Systems 21
  • 22. TYPES OF CYBER CRIMETYPES OF CYBER CRIME īŽ HackingHacking īŽ PhishingPhishing īŽ SpoofingSpoofing īŽ ScamScam īŽ virus ATTACKvirus ATTACK Management Information Systems 22
  • 23. TYPESTYPES īŽ hacking in simple term means illegal instruction into a computer systemhacking in simple term means illegal instruction into a computer system īŽ without the permission of computer .ownerwithout the permission of computer .owner īŽ phishingphishing īŽ LOGIN PAGELOGIN PAGE īŽ NOT A ACTUAL Official PAGENOT A ACTUAL Official PAGE īŽ build BANK WEBSITEbuild BANK WEBSITE NOT A OFFICAL BANK WEBSIENOT A OFFICAL BANK WEBSIE GET THE USER NAME AND PASSWORDGET THE USER NAME AND PASSWORD THE ACCOUNT NUMBERTHE ACCOUNT NUMBER Management Information Systems 23
  • 25. GET USER INFORMATIONGET USER INFORMATION GET THE ACCOUNT NUMBERGET THE ACCOUNT NUMBER AND ALL INFORMATION RELATED TO THE ACCONTAND ALL INFORMATION RELATED TO THE ACCONT for security purpose you can change your passwordfor security purpose you can change your password CRIMINAL SEND SMSCRIMINAL SEND SMS CRIMAL SEND EMAIL TO THE USERCRIMAL SEND EMAIL TO THE USER CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGECRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE use key logger softwareuse key logger software Management Information Systems 25
  • 26. SCAMINGSCAMING 1.1. A scam is a quick-profit scheme where a person cheats another individualA scam is a quick-profit scheme where a person cheats another individual or group out of money by presenting them with false information during aor group out of money by presenting them with false information during a deal or offer.deal or offer. 2.2. There are many different types of scams Scammers can approach theirThere are many different types of scams Scammers can approach their victims via email, SMS, and sometimes even a phone to your personal cellvictims via email, SMS, and sometimes even a phone to your personal cell number.number. 3.3. . In this scheme, a person receives news via phone call or email that they. In this scheme, a person receives news via phone call or email that they have won the lottery and can retrieve the cash prize after submitting a smallhave won the lottery and can retrieve the cash prize after submitting a small processing fee. After submitting the fee, the attacker disappears with theprocessing fee. After submitting the fee, the attacker disappears with the money.money. 4.4. use websitesuse websites 5.5. social mediasocial media 6.6. scammer can also use face book pagesscammer can also use face book pages 7.7. face book groupsface book groups Management Information Systems 26
  • 27. SCAMINGSCAMING MOSTLY ECOMERCE WEBSITES AREMOSTLY ECOMERCE WEBSITES ARE INVOLED IN SACAMSINVOLED IN SACAMS BAD PRODUCTSBAD PRODUCTS HIGH PRICEHIGH PRICE YOU CAN CHECK THE WEBSITE FAQ'SYOU CAN CHECK THE WEBSITE FAQ'S CHECK THE ADMIN GROUPCHECK THE ADMIN GROUP DESCRIPTIONDESCRIPTION Management Information Systems 27
  • 28.
  • 29. LIST OF CYBER CRIME AND THEIR PUNISHMENTS INLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANPAKISTAN spreading False Information up to 3 Years inspreading False Information up to 3 Years in Prison or up to Rs. 1 Million in FinePrison or up to Rs. 1 Million in Fine You know that an information is wrong and youYou know that an information is wrong and you still post or share it on Facebook about astill post or share it on Facebook about a person that damages his/her reputationperson that damages his/her reputation Making / Spreading Explicit Images or VideosMaking / Spreading Explicit Images or Videos of an Individual: up to 5 Years in Prison or up toof an Individual: up to 5 Years in Prison or up to Rs. 5 Million in Fine or bothRs. 5 Million in Fine or both photoshop any imagephotoshop any image Management Information Systems 29
  • 30. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or bothUp to 3 Years in Jail or Up to Rs. 1 Million in Fine or both If you try to get into a relation with someone online throughIf you try to get into a relation with someone online through internet website, email, SMS, phone or any communicationinternet website, email, SMS, phone or any communication tool despite there is disinterest from the other party thentool despite there is disinterest from the other party then you can be jailed for three years or imposed a fine whichyou can be jailed for three years or imposed a fine which may extend to one million rupees or with both.may extend to one million rupees or with both. You repeatedly call someoneYou repeatedly call someone If you call, chat with someone and other party has noIf you call, chat with someone and other party has no issues with that then its all cool, nothing to worry about.issues with that then its all cool, nothing to worry about. Management Information Systems 30
  • 31. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN Making Videos/Pics and Distributing without Consent: Up toMaking Videos/Pics and Distributing without Consent: Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both,,3 Years in Jail or Up to Rs. 1 Million in Fine or both,, You take a photograph or make a video of any person andYou take a photograph or make a video of any person and displays or distributes it without his/her consent in adisplays or distributes it without his/her consent in a manner that harms a person then you can go behind barsmanner that harms a person then you can go behind bars for up to three years and may have to bear a fine of up tofor up to three years and may have to bear a fine of up to Rs. 1 million or bothRs. 1 million or both Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 orSpoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or bothboth Management Information Systems 31
  • 32. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN virus Code: Up to 2 Years in Jail or up to Rs.virus Code: Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both1 Million in Fine or Both You write a virusYou write a virus You write a code that can be used toYou write a code that can be used to destruct a hard drivedestruct a hard drive You develop a mobile app to spy someoneYou develop a mobile app to spy someone Yo develop an app to spread virusYo develop an app to spread virus Management Information Systems 32
  • 33. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN Unauthorized copying or transmission of Data: up to 6Unauthorized copying or transmission of Data: up to 6 Months Prison or up to Rs. 100,000 Fine or bothMonths Prison or up to Rs. 100,000 Fine or both If you copies data of someone else’s flash driveIf you copies data of someone else’s flash drive If you gain access to someone’s phone and copy a mobileIf you gain access to someone’s phone and copy a mobile numbernumber Unauthorized use of identity information: Up to 3 Years inUnauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine or bothPrison or up to Rs. 5 Million fine or both You use someone’s email addressYou use someone’s email address Management Information Systems 33