1. Security and EthicalSecurity and Ethical
ChallengesChallenges
Management Information SystemsManagement Information Systems
1BSIT (5th)
Specially We talk about :
OKARA city (History)
Computer Security
Security challenges
Cyber Crime
And other Many information about society
Taimoor , Sabira , Rana Bilal , Rizwan Chuhdry
Special Lecturer
3. Meer Chaaqar RindMeer Chaaqar Rind OKARAOKARA
īļ Touch Three RiverTouch Three River
īļ Milk of LakeMilk of Lake
īļ DEPALPURDEPALPUR
īļ 2500 years Before Orion2500 years Before Orion
īļ Population in 1998Population in 1998
īļ S.YONANI injuredS.YONANI injured
īą Okara KingOkara King
īą Proud of Bloch familyProud of Bloch family
4. OKARAOKARA
īŽ Ahmed khan kharalAhmed khan kharal
īŽ 18571857
īŽ Fight against EnglishFight against English
ArmyArmy
5. Computer securityComputer security
Computer securityComputer security , also known as cyber, also known as cyber
security or ITÂ security or ITÂ securitysecurity, is the protection of, is the protection of
computercomputer systems from the theft or systems from the theft or
damage to the hardware, software or thedamage to the hardware, software or the
information on them, as well as frominformation on them, as well as from
disruption or misdirection of the servicesdisruption or misdirection of the services
they provide.they provide.
8. Security challengesSecurity challenges
Computer crimes that exist in the presentComputer crimes that exist in the present
society are:-society are:-
īŽ HackingHacking
īŽ Cyber TheftCyber Theft
īŽ Unauthorized use at workUnauthorized use at work
īŽ Software PiracySoftware Piracy
īŽ Piracy of intellectual propertyPiracy of intellectual property
īŽ Computer viruses and wormsComputer viruses and worms
Management Information Systems 8
9. HackingHacking
Hacking is the obsessive use of computers, or theHacking is the obsessive use of computers, or the
unauthorized access and use of networkedunauthorized access and use of networked
computer systems. Hackers usuallycomputer systems. Hackers usually
īŽ Steal or damage dataSteal or damage data
īŽ Get unauthorized access to computer filesGet unauthorized access to computer files
īŽ Monitor e-mails or web server accessMonitor e-mails or web server access
īŽ May use remote services that allow oneMay use remote services that allow one
computer to execute programs on anothercomputer to execute programs on another
īŽ Plant data that will cause system to welcomePlant data that will cause system to welcome
intrudersintruders
Management Information Systems 9
10. Cyber TheftCyber Theft
Cyber theft involves theft of money byCyber theft involves theft of money by
unauthorized network entry and fraudulentunauthorized network entry and fraudulent
alteration of computer databases.alteration of computer databases.
Management Information Systems 10
11. Unauthorized use at WorkUnauthorized use at Work
Unauthorized use of computer resourcesUnauthorized use of computer resources
especially by employeesespecially by employees
īŽ Playing video gamesPlaying video games
īŽ Unauthorized use of internetUnauthorized use of internet
īŽ Non-work related upload/downloadNon-work related upload/download
īŽ Transmission of confidential dataTransmission of confidential data
īŽ MoonlightingMoonlighting
Management Information Systems 11
12. Software PiracySoftware Piracy
Unauthorized copying of data is calledUnauthorized copying of data is called
software piracy or software theftsoftware piracy or software theft
Software is protected by copyright law andSoftware is protected by copyright law and
user license agreement that allows onlyuser license agreement that allows only
limited copies to be madelimited copies to be made
Management Information Systems 12
13. Piracy of Intellectual PropertyPiracy of Intellectual Property
Materials other than software are alsoMaterials other than software are also
pirated by making multiple copiespirated by making multiple copies
īŽ Piracy of music, video, images, articles,Piracy of music, video, images, articles,
books etc.books etc.
īŽ Dissemination of these material throughDissemination of these material through
internet websitesinternet websites
Management Information Systems 13
14. Computer viruses and wormsComputer viruses and worms
īŽ A virus is a program code that cannot work without beingA virus is a program code that cannot work without being
inserted into another programinserted into another program
īŽ A worm is a distinct program that can run unaidedA worm is a distinct program that can run unaided
These programs copy annoying or destructive routines intoThese programs copy annoying or destructive routines into
the networked computer systems of anyone whothe networked computer systems of anyone who
accesses computers affected with the virus or who usesaccesses computers affected with the virus or who uses
copies of magnetic disks taken from infected computerscopies of magnetic disks taken from infected computers
They enter a computer through e-mail or file attachments,They enter a computer through e-mail or file attachments,
or through illegal software. A virus usually copies itselfor through illegal software. A virus usually copies itself
into the OS, and then spreads to main memory and thusinto the OS, and then spreads to main memory and thus
hard disk and any inserted external memory.hard disk and any inserted external memory.
Management Information Systems 14
15. Privacy IssuesPrivacy Issues
īŽ Privacy on the internetPrivacy on the internet
īŽ Computer MatchingComputer Matching
īŽ Privacy LawsPrivacy Laws
īŽ Computer libel and censorship (threats areComputer libel and censorship (threats are
spamming and flaming)spamming and flaming)
Management Information Systems 15
16. Other ChallengesOther Challenges
īŽ Employment challenges because a lot of tasksEmployment challenges because a lot of tasks
have been automatedhave been automated
īŽ Computer monitoring causes intrusion inComputer monitoring causes intrusion in
personal space for workerspersonal space for workers
īŽ Challenges in working conditions are caused byChallenges in working conditions are caused by
tasks which are monotonous in nature. But ittasks which are monotonous in nature. But it
also automates most of the work and gives wayalso automates most of the work and gives way
to more challenging jobsto more challenging jobs
īŽ Challenges to individuality as they eliminate theChallenges to individuality as they eliminate the
human relationships between peoplehuman relationships between people
Management Information Systems 16
17. Health issuesHealth issues
īŽ The use of IT in the workplace raises a variety of
health issues. Heavy use of computers is
reportedly causing health problems such as:
īŽ ¡ Job stress
īŽ ¡ Damaged arm and neck muscles
īŽ ¡ Eye strain
īŽ ¡ Radiation exposure
īŽ ¡ Death by computer-caused accidents
Management Information Systems 17
18. BenefitsBenefits
īŽ Medical diagnosisMedical diagnosis
īŽ Crime controlCrime control
īŽ Environmental monitoringEnvironmental monitoring
īŽ Urban planningUrban planning
īŽ Computer based trainingComputer based training
īŽ Distance learningDistance learning
Management Information Systems 18
19. Ethical responsibility of businessEthical responsibility of business
professionalsprofessionals
Business ethics are concerned withBusiness ethics are concerned with
īŽ EquityEquity
īŽ RightsRights
īŽ HonestyHonesty
īŽ Exercise of corporate powerExercise of corporate power
Management Information Systems 19
20. Categories of Ethical Business IssuesCategories of Ethical Business Issues
Management Information Systems 20
21. CYBER CRIME IN PAKISTANCYBER CRIME IN PAKISTAN
īŽ Cybercrime, also called computer crime, is any illegalCybercrime, also called computer crime, is any illegal
activity that involves a computer or network-connectedactivity that involves a computer or network-connected
device, such as a mobile phone. crimes in which thedevice, such as a mobile phone. crimes in which the
computing device is the target, for example, to gaincomputing device is the target, for example, to gain
network access; crimes in which the computer is used asnetwork access; crimes in which the computer is used as
a weapon, for example,a weapon, for example,
īŽ any criminal activity that uses a computer device orany criminal activity that uses a computer device or
Ineternet is called cyber crimeIneternet is called cyber crime
Management Information Systems 21
22. TYPES OF CYBER CRIMETYPES OF CYBER CRIME
īŽ HackingHacking
īŽ PhishingPhishing
īŽ SpoofingSpoofing
īŽ ScamScam
īŽ virus ATTACKvirus ATTACK
Management Information Systems 22
23. TYPESTYPES
īŽ hacking in simple term means illegal instruction into a computer systemhacking in simple term means illegal instruction into a computer system
īŽ without the permission of computer .ownerwithout the permission of computer .owner
īŽ phishingphishing
īŽ LOGIN PAGELOGIN PAGE
īŽ NOT A ACTUAL Official PAGENOT A ACTUAL Official PAGE
īŽ build BANK WEBSITEbuild BANK WEBSITE
NOT A OFFICAL BANK WEBSIENOT A OFFICAL BANK WEBSIE
GET THE USER NAME AND PASSWORDGET THE USER NAME AND PASSWORD
THE ACCOUNT NUMBERTHE ACCOUNT NUMBER
Management Information Systems 23
25. GET USER INFORMATIONGET USER INFORMATION
GET THE ACCOUNT NUMBERGET THE ACCOUNT NUMBER
AND ALL INFORMATION RELATED TO THE ACCONTAND ALL INFORMATION RELATED TO THE ACCONT
for security purpose you can change your passwordfor security purpose you can change your password
CRIMINAL SEND SMSCRIMINAL SEND SMS
CRIMAL SEND EMAIL TO THE USERCRIMAL SEND EMAIL TO THE USER
CRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGECRIMAL SEND LINK OF THE WEBSITE PHISHIG PAGE
use key logger softwareuse key logger software
Management Information Systems 25
26. SCAMINGSCAMING
1.1. A scam is a quick-profit scheme where a person cheats another individualA scam is a quick-profit scheme where a person cheats another individual
or group out of money by presenting them with false information during aor group out of money by presenting them with false information during a
deal or offer.deal or offer.
2.2. There are many different types of scams Scammers can approach theirThere are many different types of scams Scammers can approach their
victims via email, SMS, and sometimes even a phone to your personal cellvictims via email, SMS, and sometimes even a phone to your personal cell
number.number.
3.3. . In this scheme, a person receives news via phone call or email that they. In this scheme, a person receives news via phone call or email that they
have won the lottery and can retrieve the cash prize after submitting a smallhave won the lottery and can retrieve the cash prize after submitting a small
processing fee. After submitting the fee, the attacker disappears with theprocessing fee. After submitting the fee, the attacker disappears with the
money.money.
4.4. use websitesuse websites
5.5. social mediasocial media
6.6. scammer can also use face book pagesscammer can also use face book pages
7.7. face book groupsface book groups
Management Information Systems 26
27. SCAMINGSCAMING
MOSTLY ECOMERCE WEBSITES AREMOSTLY ECOMERCE WEBSITES ARE
INVOLED IN SACAMSINVOLED IN SACAMS
BAD PRODUCTSBAD PRODUCTS
HIGH PRICEHIGH PRICE
YOU CAN CHECK THE WEBSITE FAQ'SYOU CAN CHECK THE WEBSITE FAQ'S
CHECK THE ADMIN GROUPCHECK THE ADMIN GROUP
DESCRIPTIONDESCRIPTION
Management Information Systems 27
28.
29. LIST OF CYBER CRIME AND THEIR PUNISHMENTS INLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN
PAKISTANPAKISTAN
spreading False Information up to 3 Years inspreading False Information up to 3 Years in
Prison or up to Rs. 1 Million in FinePrison or up to Rs. 1 Million in Fine
You know that an information is wrong and youYou know that an information is wrong and you
still post or share it on Facebook about astill post or share it on Facebook about a
person that damages his/her reputationperson that damages his/her reputation
Making / Spreading Explicit Images or VideosMaking / Spreading Explicit Images or Videos
of an Individual: up to 5 Years in Prison or up toof an Individual: up to 5 Years in Prison or up to
Rs. 5 Million in Fine or bothRs. 5 Million in Fine or both
photoshop any imagephotoshop any image
Management Information Systems 29
30. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or bothUp to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
If you try to get into a relation with someone online throughIf you try to get into a relation with someone online through
internet website, email, SMS, phone or any communicationinternet website, email, SMS, phone or any communication
tool despite there is disinterest from the other party thentool despite there is disinterest from the other party then
you can be jailed for three years or imposed a fine whichyou can be jailed for three years or imposed a fine which
may extend to one million rupees or with both.may extend to one million rupees or with both.
You repeatedly call someoneYou repeatedly call someone
If you call, chat with someone and other party has noIf you call, chat with someone and other party has no
issues with that then its all cool, nothing to worry about.issues with that then its all cool, nothing to worry about.
Management Information Systems 30
31. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Making Videos/Pics and Distributing without Consent: Up toMaking Videos/Pics and Distributing without Consent: Up to
3 Years in Jail or Up to Rs. 1 Million in Fine or both,,3 Years in Jail or Up to Rs. 1 Million in Fine or both,,
You take a photograph or make a video of any person andYou take a photograph or make a video of any person and
displays or distributes it without his/her consent in adisplays or distributes it without his/her consent in a
manner that harms a person then you can go behind barsmanner that harms a person then you can go behind bars
for up to three years and may have to bear a fine of up tofor up to three years and may have to bear a fine of up to
Rs. 1 million or bothRs. 1 million or both
Spoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 orSpoofing: Up to 3 Years in Jail or Fine up to Rs. 500,00 or
bothboth
Management Information Systems 31
32. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
virus Code: Up to 2 Years in Jail or up to Rs.virus Code: Up to 2 Years in Jail or up to Rs.
1 Million in Fine or Both1 Million in Fine or Both
You write a virusYou write a virus
You write a code that can be used toYou write a code that can be used to
destruct a hard drivedestruct a hard drive
You develop a mobile app to spy someoneYou develop a mobile app to spy someone
Yo develop an app to spread virusYo develop an app to spread virus
Management Information Systems 32
33. LIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTANLIST OF CYBER CRIME AND THEIR PUNISHMENTS IN PAKISTAN
Unauthorized copying or transmission of Data: up to 6Unauthorized copying or transmission of Data: up to 6
Months Prison or up to Rs. 100,000 Fine or bothMonths Prison or up to Rs. 100,000 Fine or both
If you copies data of someone elseâs flash driveIf you copies data of someone elseâs flash drive
If you gain access to someoneâs phone and copy a mobileIf you gain access to someoneâs phone and copy a mobile
numbernumber
Unauthorized use of identity information: Up to 3 Years inUnauthorized use of identity information: Up to 3 Years in
Prison or up to Rs. 5 Million fine or bothPrison or up to Rs. 5 Million fine or both
You use someoneâs email addressYou use someoneâs email address
Management Information Systems 33