...------------------------------------------------- Cyber security and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years....
Words: 3707 - Pages: 15
... Outline I. Introduction: In today’s world with the identity theft and fraudulent accounts being created on a daily basis, a person might ask there self if privacy in the 21st century might be possible. People put their privacy in jeopardy without even realizing it by using social networking websites. Social networking is a good tool as long as you use it responsibly by protecting yourself and maintaining security. II. Identity theft defined Ways that thieves steal identity a. Dumpster diving b. Phishing c. ATM Skimmers II. Dangers of social networking a. Stalking/cyber stalking b. Impersonation c. cyber bullying III. Ways to prevent identity theft and maintain security a. Monitor credit report with fraud alert b. Do not share personal information c. Shop on websites with secure seal d. Use privacy settings on social network cites IIII Conclusion In today’s world with the identity theft and fraudulent accounts being created on a daily basis, a person might ask there self if privacy in the 21st century might be possible. People put their privacy in jeopardy without even realizing it by using social networking websites. Social networking is a good tool as long as you use it responsibly by protecting yourself and maintaining security. Identity theft is a form of stealing someone’s identity in which someone pretends to...
Words: 650 - Pages: 3
...It is also used for other various purposes such as to communicate with one another and shopping. The Internet has expanded to the point where one is able to access the Internet not only from computers, but cell phones, tables and iPods making it extremely accessible from any location. As always, there is the other side of the coin. The Internet is dangerous despite being beneficial to the people. People of all age can surf the Internet regardless of their gender, age, or races. Hence, the Internet can be dangerous towards the unawared children and adults. The Internet can be dangerous because people can encounter sexual online predators and lose social interaction skills. Besides these, cyber-bullying occurs and one’s reputation may be compromised. In addition, there are cases of cyber-stalking and the Internet might lead to revolution which increases the social coordination of the public. First and foremost, the Internet has been dangerous because people may encounter sexual online predators. An online predator is one who attempts to sexually exploit a person through the use of online services and the Internet. Anyone can be an online predator. Most young teens are being targeted by the online predators. According to Richard M. Goo’s “Stranger Danger and The Online Social Network” (2008), the number of online sexual predators has been increased due to the increasing usage of the social networks. The trust and intimacy can be developed quickly online due to the anonymous of...
Words: 2012 - Pages: 9
...Global Positioning System: the Opinions of Public and Political Influences and Implications Abstract This paper focuses on two primary topics which are “Public opinion on Global Positioning System’ (GPS)” and “Political implications and influences”. This paper will provide positive and negative views that the general public has in regard to GPS technology usage. It will explore the intended purpose of the GPS and how useful the technology is for navigation assistance and the advantages it affords law enforcement. This paper will also examine the GPS’ unintended uses and expand upon the public’s concerns about over relying on technology and stalking. It will demonstrate that, while the GPS is immensely useful for navigation purposes, safety and security, it also causes potential risks and threats, primarily to the privacy and personal lives of individuals. Next, the political implications and influences will be examined and the nation’s national security dilemma will be analyzed. The intent of this paper is to look at the GPS as more than simply a navigation technology and provide alternate theories on intended versus unintended uses. Public opinion on GPS technology While the majority of people across the globe agree that a GPS is an extremely useful tool that has become integrated into our everyday lives, there are some that raise valid concerns regarding misuse. Opponents argue that this type of advanced technology, if used for unintended purposes, could potentially...
Words: 1203 - Pages: 5
...WHAT IS CYBER CRIME? Crime is a common word that we always heard in this globalization era. Crimes refer to any violation of law or the commission of an act forbidden by law. Crime and criminality have been associated with man since long time ago. There are different strategies practices by different countries to contend with crime. It is depending on their extent and nature. It can be concluded that a nation with high index of crime cases cannot grow or develop well. This is because crime is the direct opposite of development. It can contribute to negative impact in term of social and economic development. Cyber crime is a new type of crime that occurs in this Science and Technology years. There are a lot of definitions for cyber crime. According to Wikipidia.com cyber crime also known as computer crime that refers to any crime that involves a computer and a network. Cyber crime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. Besides that cyber crime can be defined as crimes committed on the internet using the computer as either a tool or a targeted victim (Joseph A E, 2006). Computer can be considers as a tool in cyber crime when the individual is the main target of cyber crime. But computer can be considers as target when the crime is directed to the computer. In addition, cyber crime also includes traditional crimes that been conducted with the access of Internet. For example hate crimes, telemarketing Internet fraud...
Words: 1433 - Pages: 6
...Running Head: Juvenile Justice Juvenile Justice Case Law Capella University PSF5372 - History of the Juvenile Justice System Introduction Approximately 12, 8-10 year old children commit suicide every year because they are victims of bullying, whereas 1.3 million children a year bully others. Recent incidents of school violence have brought bullying to the nation’s attention in a dramatic way. Research shows that approximately 30% of teens in the United States either bully, are targets of bullying, or both (National Youth, n.d.). Some bullies attack their targets physically, which can mean anything from shoving or tripping to punching or hitting, or even sexual assault. Others use psychological control or verbal insults to put themselves in charge (Hurst, 2005). Two of the main reasons people are bullied are because of appearance and social status. Bullies pick on the people they think don't fit in, maybe because of how they look, how they act (for example, kids who are shy and withdrawn), their race or religion, or because the bullies think their target may be gay or lesbian. One of the cases associated with bullying is that of Megan Taylor Meier (November 6, 1992 – October 17, 2006) an American teenager from Dardenne Prairie, Missouri, who had committed suicide by hanging three weeks before her fourteenth birthday. Meier attended Immaculate Conception Catholic School in Dardenne Prairie, with a uniform and policy against makeup and jewelry that the Meier’s...
Words: 1290 - Pages: 6
...How Ethics Relate To Computer Crimes Herman T. Everidge III Legal and Ethical Issues in Computing CIS 4253, 847 James R. Moore, Jr. September 29, 2012 Computer Viruses, Worms, Trojan Horses and Malware Malware refers to software programs designed to damage or do other unwanted actions on computer systems; viruses, worms, Trojan horses, and spyware are the most common types of malware. Computer viruses show us how vulnerable we are; viruses can have a devastating effect on businesses, they disrupt productivity and can cause billions of dollars in damages. They also show us how sophisticated and interconnected we have become. Computer viruses are called viruses because they share some of the traits of biological viruses; computer viruses pass from computer to computer much like a biological virus passes from person to person. Computer viruses are created by people by writing code to create the virus, and designing the attack phase which could be a message or initiate the destruction of a piece of hardware. Early viruses were pieces of code embedded in legitimate programs, like games or word processors. A virus is a small piece of software that piggybacks on real programs; it might attach itself to a program and each time the program runs the virus runs too, and they can reproduce by attaching to other programs. E-mail viruses travel as an attachments to e-mail messages and can replicate themselves by automatically mailing itself to people in the victim's e-mail address...
Words: 3580 - Pages: 15
.............................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum for England, Wales and Northern Ireland in 2000. As of September 2013, the term "ICT" in the UK National Curriculum has been replaced by the broader term "computing". The term ICT is now also used to refer to...
Words: 6414 - Pages: 26
...Cyber Crime Research Presentation by the Australian Institute of Criminology Dr Russell G Smith Principal Criminologist The Australian Institute of Criminology • Australia's national research and knowledge centre on crime and justice • Core funding from the Australian Government, with income for contract research from public and private sectors • Criminology Research Advisory Council representing all jurisdictions • Staff of 30 academic researchers and 25 support staff – total 55 Cyber crime research Research questions • • • • • • • • • • How are cyber crimes committed (e.g. credit cards, internet)? How many crimes are committed and what are the crime trends? Who commits them and why do people commit them? How much money is at stake, lost and recovered? How can such crime be reduced – by prevention or punishment? Online and desk-based reviews of books, reports and articles Legislative and case-law analysis, including sentencing research Consultations with business, government and the community Surveys of households, businesses, offenders and victims Analysis of media reporting of crime Research methods Dissemination of findings • Reports, books, articles, conference papers, roundtables, online, media Cyber crime concepts Organised Crime e.g. OMCGs Identity Crime Cyber Crime e.g. off-line crimes e.g. ID theft Internet Crime e.g. Offensive Content Phishing Financial Crime e.g. Home renovation scams A chronology of cyber crime Cloud...
Words: 1301 - Pages: 6
...profit is made. It has changed how crimes are investigated and solved by law enforcement agencies. Unfortunately, it has also changed how criminals conduct their crimes- through cyberspace. President Obama, Sony executives, Target organization and many of its’ customers have all been victims of some form of cyber crimes. This writer will provide a brief overview of the six types of cybercrimes and the economic loss as it affects America’s businesses. TYPES OF CYBER CRIME The growth and availability of technology has resulted in cyber attacks becoming a major concern for governments worldwide (Dzielinski, 2014). Small companies along with the larger corporations are now being targeted. A recent survey reported that more than one-third of small companies have been victims of some form of cyber attacks (Dzielinski, 2014). Approximately 75 percent of these companies were unable to recover their stolen data. The Central Intelligence Agency (CIA) has classified cyber crimes into six categories; fraud, computer trespassing, hardware hijacking, bullying-harassment-stalking, spam, and cyber warfare. Financial fraud is considered to be the most common of the six cyber attacks. The Target Corporation, the third largest U.S. retailer, and its customers were affected in 2013 (Target Corporation, 2013). Despite in place security measures, Target failed to detect the breach. The retailer was notified by credit card processors of an unusual high number of fraudulent purchases...
Words: 1600 - Pages: 7
...Law Enforcement Challenges August 23, 2015 The world is policed by many different forms of authority. The physical aspect of law enforcement has been seen in the media in the modern day for many good and many poor reasons. While race unfortunately gets tied in as a major role in many events today, it is tough to pull the race when a crime is committed behind a keyboard. While this challenge can pretty much be crossed off of the list, there are many more that law enforcement agencies face when investigating computer crime. There are so many laws that apply to regions of enforcement and also to the rights of the suspected criminal. The even more difficult part is that while all parties are working together to achieve the same goal, there are so many grey areas in the chain of command and jurisdictional rules. Agencies investigation crimes such as corruption face a number of different challenges as well. In my eyes, if the crime can be solved, it should not matter where the officer is from. All members of law enforcement have the same goals and that is to keep the citizens of this nation safe by preventing crime. When prevention is not possible or fails, the teams investigating should not have to worry about whether they are allowed to be doing their job. They should simply work together and document evidence and witness material accordingly. Before we tackle the jurisdiction let us point out some of the other challenges that law enforcement faces with different types...
Words: 1964 - Pages: 8
...The Impact of Counterproductive Behavior in Organizations, and how it relates to the topics discussed in Carroll University’s course, BUS315: Organizational Behavior. Stan Mack (2015) suggests that the impact of counterproductive behavior in organizations are negative. The counterproductive behaviors discussed in the article include poor attendance, employee theft, interpersonal problems, and cyber loafing. Throughout this paper, the counterproductive behaviors analyzed in the article will be related to the topics discussed from the required course text, Organizational Behavior: Improving Performance and Commitment in the Workplace, by Jason Colquitt, Jeffery Lepine, and Michael Wesson. Current Organizational Behavior Article 1 Counterproductive Behavior and its Effects in the Workplace Article Review The article written by Stan Mack, The Impact of Counterproductive Behavior in Organizations (TICBO), is an article discussing various counterproductive behaviors in organizations. He discusses behaviors from poor attitudes and attendance, to employee theft, interpersonal problems, and cyber loafing. Mack recognizes each of these negative behaviors, how they cannot be completely eliminated, but can be lessened by handling them appropriately. Work and project quality may decrease due to poor employee attendance, as well as managers not being as effective due to having to address poor absenteeism (TICBO, 2015). Employers should also make it a point to have proper security and security...
Words: 1099 - Pages: 5
...and friends just by the click of a button. Social media is beneficial in many ways. However, social media can be dangerous in many ways to our society. Some examples of how social media can be harmful is by sex trafficking, cyberbullying, trolling, stalking, and more. These things take place in our lives everyday without us even noticing. Many states have created laws that have forbidden using social media in the previous ways. Although these laws are in existence, it does not stop people from using social media in harmful ways. Many people believe social media is just an...
Words: 995 - Pages: 4
...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...
Words: 2869 - Pages: 12
..."The free internet is used every day and is the most popular form of communication, marketing, and business. Apps and websites such as Instagram, Google, and online banking, are all controlled by the producers and or companies of each single application. Abusing these types of businesses can result in consequences, and abusing them in ways that break the law should concern the government and its power to monitor the sources. For example, posting inappropriate media or sending hostile comments are able to be dealt with within the Instagram company. In these scenarios, social media sites offer a “report†option, allowing users to report content they feel shouldn’t be on the site. In cases where media that breaks the law of harassment like posting a video of a minor using an illegal drug or a video of a robbery, can be taken over by the government and taken into further steps than just “report.†The government should have the power to take things involving the government into their hands, keeping the internet safe....
Words: 577 - Pages: 3