Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List.

Similar presentations


Presentation on theme: "Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List."— Presentation transcript:

1 Copyright © 2012 Knowledge Point Cyber Rule

2 Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List three examples of cyber crimes. State three effetcts of cyber crimes related to individuals. Elaborate three benefits of having Cyber law in the country

3 Copyright © 2012 Knowledge Point Definition Cyber Rule is defined as governing communication and technology use including respect for ownership and authorship.

4 Copyright © 2012 Knowledge Point What is Cyber Crimes? Crimes which are committed through the use of technology are known as ‘cyber crimes’. Computers are used to intimidate people, commit fraud or steal valuable information. Many ‘real world’ crimes such as blackmailing, forgery, theft, money laundering and embezzlement have become cyber crimes as criminals are now using the Internet to carry out their deeds.

5 Copyright © 2012 Knowledge Point Cyber Crimes Following are some Examples of Cyber Crimes Internet banking fraud Harassment

6 Copyright © 2012 Knowledge Point Internet banking fraud Internet banking fraud is defined as any fraud or theft committed using online technology to illegally remove money from, or transfer it to, a different bank account. Types of Internet banking fraud include phishing and mule recruitment.

7 Copyright © 2012 Knowledge Point UAE Cyber Crimes Law Article No.11: Anyone convicted of obtaining data of credit card or any other electronic cards by the use of the internet or any high-tech means, shall be imprisoned and fined.

8 Copyright © 2012 Knowledge Point Case Study 1: ‘Phishing’ Raid Empties Mashreq Bank Customer Accounts: Fraud victims who lost around Dh128,500 (US$35,000) from their bank accounts are demanding refunds after hackers siphoned (took off) their savings under the guise of recharging hundreds of mobile numbers...”

9 Copyright © 2012 Knowledge Point Case Study 2: Abu Dhabi Police Warn Public against Online Fraud Abu Dhabi – The public has been warned against online fraud schemes involving users’ bank accounts by the Abu Dhabi Police. According to the head of the Department, Colonel Rashid Bu Rasheed, the Criminal Investigation Department of Abu Dhabi Police has received reports on fraudulent attempts to obtain sensitive information by fraudsters. These people pose as banking service providers in fake emails to trick recipients into filling in application forms to “reactivate their de-activated bank accounts”.

10 Copyright © 2012 Knowledge Point Harassment Harassment is defined as the act of systematic or continued unwanted and annoying actions of one party or a group, including threats and demands. It is driven by various motives such as racial prejudice and personal hatred. Activity: Draw person’s reaction before and after getting blackmail!!

11 Copyright © 2012 Knowledge Point UAE Cyber Crimes Law Article No.9, anyone convicted of using the internet or any other high-tech means for threatening or blackmailing another person.

12 Copyright © 2012 Knowledge Point Case Study: A 38-year-old man faced 5 years of probation, 500 hours of community service, and more than $12,000 as compensation for harassing several employees in the City of Seattle via the Internet. He was charged with two counts of using a telecommunications device with Intent to Annoy, Abuse, Threaten or Harass. The man sent dozens of uninvited and harassing emails and pornographic material to these employees and hid his identity with special email programs. This case is believed to be the first federal prosecution of cyber harassment in the United States.

13 Copyright © 2012 Knowledge Point Intellectual Property infringement Intellectual Property infringement is one of the most rampant business-related criminal activities and normally involves the illegal use or re-production of proprietary information or technology from a legal owner. Advancement in the IT sector has enabled critical information or technology to be duplicated and stored in its digital form.

14 Copyright © 2012 Knowledge Point Case Study: Chinese National Pleads Guilty to Stealing Ford Trade Secrets “...The accused employee copied 4,000 Ford documents as well as sensitive Ford design documents onto an external hard drive before telling Ford that he was leaving the company...”

15 Copyright © 2012 Knowledge Point Software piracy Software piracy is a general occurrence amongst computer and Internet users where many think it is alright to share software they bought. For example, employees often install the same application on multiple computers using software for which only one license agreement was paid. Such actions are against the law, and people who are caught doing this may be fined or even sentenced to prison.

16 Copyright © 2012 Knowledge Point Intrusion Intrusion is defined as illegal, offensive, or unauthorized entry into a facility or system.

17 Copyright © 2012 Knowledge Point Case Study: Hackers Break into UAE Credit Network to Fund US Purchases Hackers Break into UAE Credit Network to Fund US Purchases: “An international investigation is being carried out to find the hackers who broke into UAE financial servers to fund US purchases...”

18 Copyright © 2012 Knowledge Point Offenses Offenses are defined as the acts of causing anger, resentment, displeasure, or affront. For example, in the UAE abuse of any Islamic law or community values or anything said against any recognized religion is considered as an offense.

19 Copyright © 2012 Knowledge Point UAE Cyber Crimes law Article No.15 stipulates that anyone convicted of using the internet or high- tech means for the purpose of committing the following crimes shall be imprisoned or fined. The crimes are as follows: 1. Abuse of any Islamic holy shrines or rituals 2. Abuse of holy shrines and religious rituals stipulated in other religions since such rituals are maintained in accordance to the rulings of Islamic Sharia 3. Insulting any recognized religion 4. Incitement or promotion of sins

20 Copyright © 2012 Knowledge Point UAE Cyber Crimes law “continued” If anyone is convicted of opposing the Islamic religion, or abusing its principles, or carrying out any missionary activities for the benefit of other religions, he should be sentenced to more than seven years in jail. According to Article No.16, anyone convicted of transcending family principles and values or publishing news or pictures related to the private life of the family’s members, shall be jailed for no less than one year and fined Dh50, 000.

21 Copyright © 2012 Knowledge Point Case Study: Middle East Bloggers Two men who operated an online forum in the UAE were convicted and fined according to the law for allowing a commenter to post comments that were deemed defamatory. A blogger was sentenced to 4 years in prison after mocking the authority of the Egyptian president and insulting Islam. The country’s 1996 press law allows criminals to be prosecuted for the crime of “spreading false news” and to the penal code, which prevents material that is considered insulting.

22 Copyright © 2012 Knowledge Point Reasons for Cyber Crime Cyber crimes are committed for many reasons including the following: For pursuit of fame and to gain reputation for intelligence or brilliance Purely out of mischief For financial means To get revenge on someone they hate/dislike To signal some form of protest Purely to pursue criminal activities To steal identity (identity theft) To forge documents and messages

23 Copyright © 2012 Knowledge Point Effects of Cyber Crime Cyber crimes can contribute to the following losses to an organization: Loss of Revenue/Profits Waste of Valuable Time Damaged Reputations Reduced Productivity

24 Copyright © 2012 Knowledge Point Tips: How to protect Yourself from being a Victim of Cyber Crimes DO NOT open emails and email attachments from unknown senders DO NOT execute.EXE or unknown files directly from your mail Purchase a good anti-virus and security software and update regularly (at least once a Week) Use virus-scanning software on all diskettes and thumb drives before attempting to access data Secure your Internet Web browsing Make regular backups of your data and test its integrity Run regular updates of Microsoft Windows on your PC f your office has access to broadband (or high speed) Internet access, consider purchasing a software or hardware firewall that can help in guarding your computer system If you depend on or run a wireless network, take time to secure it and make sure you understand how it works

25 Copyright © 2012 Knowledge Point Tips: How to protect Yourself from being a Victim of Cyber Crimes “contioned” Be responsible and take time to learn about how to take better care of your PC Remember that your PC is just like your car; it requires some basic maintenance in order for it to function well Use the internet to read up on some tips about PC maintenance. This is available on many websites such as www.pcworld.com, www.microsoft.com or www.zdnet.com

26 Copyright © 2012 Knowledge Point What would you do in the following situations? You receive an e-mail from Antony D’souza. What will you do? You have a wireless Internet connection at home. How would you make sure that strangers do not use it? Activity: Find Top 5 free Anti-Virus Software from pcworld.com

27 Copyright © 2012 Knowledge Point Licenses Manufacturers keep track on the legal use of their products by providing valid licenses for which users or buyers have to pay. There are commonly three types of software licenses: Single User License - Software can only be installed on one computer, allowing use to only one person at a time Multi Use License - Multiple users can use the software on multiple machines Site License - Anyone on a particular website or in an organization can use the software

28 Copyright © 2012 Knowledge Point Freeware & Shareware FreewareShareware Software that allows users to download, copy, pass it on or use it for free without a time limit All features of the program are accessible Software that can be used by anyone for free for a limited time period Not all features of the program are accessible unless users buy the full package Note: Nonetheless, being free does not mean it is not copyrighted; it is still considered the Intellectual Property of the developer. Note: There are certain shareware programs that offer users the full version, without setting any time or feature limitations. Class Activity: Search for a Freeware in Internet

29 Copyright © 2012 Knowledge Point EULA – End User License Agreement EULA is the license that comes with commercial software. It states what is allowed in terms of installing the software and making copies. The EULA will appear on the first screen of the installation wizard when you start to install the product. In order to continue with installation, you must read and agree to the terms set out in the license.

30 Copyright © 2012 Knowledge Point Product ID You can check whether you are using a valid copy of software by going to the ‘help’ menu. From the help menu, go to the ‘about’ option. This will let you view the person to whom the software has been licensed and also the valid product ID. Always check the product ID and EULA before you install free software.

31 Copyright © 2012 Knowledge Point Legislation The Copyright, Designs and Patents Act covers the issue of software piracy. There are three main things which the Act covers: It is illegal to make copies of software without obtaining the permission of the owner. Purchasing a license does not make you the owner of the software; it only gives you the rights to use it. It is illegal to use pirated software. It is illegal to transmit pirated software though a telecommunications line.

32 Copyright © 2012 Knowledge Point Rules & Regulations governing Communications & Technology use: Personal data refers to any piece of information that identifies you, such as your name, home address, e-mail, phone number and others. Without you realizing it, every day, your data is either collected or freely given by you over the Internet. Therefore, they can be easily obtained and misused by irresponsible people.

33 Copyright © 2012 Knowledge Point Data Protection Act Due to the increasing amount of personal information that is being collected every day, some countries have set up Data Protection Act to ensure that any data you give is properly used and stored. There are eight principles laid out by the Data Protection Act: 1. Personal data should be fairly and legally obtained and processed 2. Personal data can be held only for specified and legal purposes 3. Personal data should be adequate, relevant and not excessive for the required purpose 4. Personal data should be accurate and kept up-to-date 5. Personal data should not be kept for longer than is necessary 6. Data must be processed in accordance with the rights of the data subject 7. Appropriate security measures must be taken against unauthorized access 8. Personal data cannot be transferred to other countries

34 Copyright © 2012 Knowledge Point Lesson Learned As an IT user, you have to be aware of Cyber Law in the country. By understanding the rules and regulations, it will help you to seek protection should you involve in any cyber crime cases.


Download ppt "Copyright © 2012 Knowledge Point Cyber Rule. Copyright © 2012 Knowledge Point Learning Outcomes By the end of this module, you should be able to: List."

Similar presentations


Ads by Google