New way of doing things… • Cable Connection – Wireless Connection For the first time in television broadcast • Physical Interaction – Virtual Interaction history, CNN aired a live report beamed • Content Users – Content Creators through holographic technology • 2 Dimension – 3 Dimension • Slow Transmission – High Speed Transmission Samsung's first projector phone • Manual - Automatic Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
21st Century Digital Literacy Tools Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI Video : e-Literate_vo1
Mobile Phone • China hits 432 million mobile phone users - The most mobile phone users of any single country in the world – InfoWorld.com • Internet equipped - social networking site connection, e-mail access, browse the Internet, etc.. • GPS Application Installed • Video Calling – Tele-Conference • 3G – 3GS – 4G – 5G – 6G? • Window, IOS, Anroid based application Iphone equipped with world’s most advanced mobile operating systems Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
The Internet • Worldwide connected computer and server - Millions of data, picture, files, image, music, video and lot more were store on servers and users all over the world can view, download, upload, copy and etc. • Vital Instrument - industries, educational institutions, small & medium business and even for home usage. • Get things done faster and effective – video conference, e-mails, instant messaging and etc… • Fast growing Users - It took 38 years for radio to reach 50 million users, 13 years for TV, and only 5 years for the Internet - CyberAtlas.com May 2010 – Youtube exceeds 2 billions views a day. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
The Personal Web • Real Community Vs Virtual Community • Content User Vs Content Creator • Social Networking Site – Facebook , Twitter, Friendster – Facebook estimated 375 million users by year end 2009 and the numbers keep rising • Tremendous impact on current social – people communicate and interact -share their opinion, feelings, pictures, diary and etc. to their virtual community. • Blog - Allow millions of people to publish and share their ideas with many millions of readers - 7.4 million active blogs throughout the world.
Semantic Aware Application and Search Engines • Semantic Web - Web with a meaning - describing things in a way that computers applications can understand it . • Example : •The Beatles was a popular band from Liverpool. •John Lennon was a member of the Beatles. •\"Hey Jude\" was recorded by the Beatles. Sentences like the ones above can be understood by people. But how can they be understood by computers? Statements are built with syntax rules. The syntax of a language defines the rules for building the language statements. • Goggles – 620 millions daily visitors to Google – world’s # 1 search engine. ResourcTess.: MCyObHerDtunHitAieTs.TcoAmBIN HJ MOHAMED ALI @ MD HANI
Smart Objects • Small digital computer based application - ordinary electronic chips but small objects that can perform as programmed onto it. • smart object on the Identity cards, credit cards, bankcards, passports and many more. • Bank Cards or Credit Cards smart chips keep your personal identification numbers ( PIN) Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
https://youtu.be/Yb-sb3tGHms
Online application • Current Trend – Institutions, government bodies, industries, schools, NGO and etc. • Fastest way to get information to the public • E-Business – where online business deal were done – ebay , alibaba…. • E-Government – government own portal – public to view current gov initatives and program – submit forms – application • E-Career – online job hunting – job match making • E-Learning – LMS – education portal Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Digital Literacy Challenges • Anonymity – Misuse of the Internet - allow people to gain positions and gain friends that they would never otherwise have the chance to in real life. • The Balance of Power - celebrities, professional criminals, fashion setters, etc become less powerful than they are in real life. The social group of advanced computer users, geeks, nerds, dweebs, hackers (they have many names) have a much larger power on the Internet. • Shopping Online - strong enterprise on the Internet. By selling items over the Internet, companies can save money on employing shop assistants, buying shops and land, administration costs and a many other things. • Working from Home - Works for computer-oriented jobs and it can also result in people not doing the work at all and just staying at home and watching TV, and even increasing their stress by leaving work until the last minute. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
• Pornography – increasingly accepting of sexual material, it is saturated by domain names with a sexual nature, owned by pornography web sites that charge a small entry fee. Contributed to more sex-related crime. • Freedom of Speech - technology allows anyone who may not have the courage, or in whose locale it may not be acceptable, to reach out to others with their beliefs and ideas. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Digital Technology Initiatives & Issues • Set up of Community ICT Telecenters – World wide initatives – to bridge the Digital Gap of urban vs rural. • The need to reform Internet & Multimedia related Rules and Regulations – technology evolvement needs updated procedure and rules • Copyrighted Issues – plagiarism, pirated sofware and etc.. • Identity Theft and Credit Cards Fraud – world’s major concern. Video : e-Literate_vo5 • Trustworthiness of the resources found on the Internet • Safety and health issues – ergonomics • Unauthorised access – hackers, crackers, phishing and etc.. • Pornography - Video : e-Literate_vo6 • Cyber-Bully – increasing cases – world major concern on youngster – • Internet Addiction Disorder Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
General digital safety guideline • Do not respond to any messages / e-mails that seems suspicious • Beware of pretender and be vigilant. • Never share or post your personal information with anyone. • Do remember, what you post online is not private. Parents, teachers, students and employers, may go online and find out about you. Video : e-Literate_vo7 • Keep safe your Personal Identification Number ( PIN ) Video : e-Literate_vo8 • Regularly scan you pc Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI • Always maintain good ethical behavior when online.
Discussion • How seldom you log in to social networking site? – facebook, friendster,twitter…… • What do you do?... Chatting? Sharing? Tagging….Dat***g?....\\ • Do you share your personal info on the site? – telephone number? e-mail address? Home address in wedding / birthday invitation? • Share your Personal Matters / Opinions? – political view, about someone/somebody, personal life…… Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Be smart and stay safe!
Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Learning Outcomes By the end of the module trainees should be able to, • Know what cyber crime is • Understand how cyber crime affect the economy Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
What is e-Rule? • By definition, it is about Governing communication and technology use. • The module elaborates more on the legal issues pertaining to the communicative, transactional and distributive aspects of networked information technologies and devices. • The purpose is to help you understand importance and significance of e-Rule in the technology world. You will be introduced to nine types of cyber crimes, as well as copyright issues, and the important effects these two subjects bring on people and businesses. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
What is Cyber Crime? • To understand the importance of e-Rule, we need to understand the scenarios of cyber crime. • According to the Oxford Reference Online dictionary, cyber crimes are those which are committed through the use of the Internet. The Encyclopedia Britannica describes cyber crime as any type of crime which is carried out by means of special knowledge or expert use of computer technology. • There are also other names for cyber crimes such as computer crime, digital crime, e-crime and electronic crime. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
What is Cyber Crime?.. • With the growing advancements of computer technology, more and more people are using and relying on computers for personal life and working purposes, which means that more and more people are either getting exposed to the danger of being cyber crime victims. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
What is Cyber Crime Video: e_Rule_V001
Nine Types of Cyber Crimes 1. Theft of Telecommunications services • The act of obtaining access to a company’s or body’s telephone switchboard. Individual or a group of criminals do this in order to gain access to dial-in/dial-out circuits, enabling them to make their own calls freely or sell illegal call time to third parties. (Phreaker) Case Study: In US, a group of computer hackers managed to illegally gain access to Scotland Yard’s telephone network. They managed to make international calls which were worth £620,000, the whole sum of which Scotland Yard was held responsible. (Tendler and Nuttall 1996). Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 2. Communication in furtherance of criminal conspiracies • The act of using telecommunications equipment in order to organise and make illegal activities such as drug trafficking, prostitution, money laundering, gambling, child pornography and trading weapons possible and easier to process (in the jurisdictions where these type of acts are deemed illegal) Case Study: In September 1998, police investigation succeeded in capsizing an international organisation which housed members from at least 14 nations. Access to the network; known as Wonderland Club, was password protected and content encrypted. The investigation successfully made around 100 arrests throughout the world, and the seizure of 100,000 images. The sickening thing is this organization hosts child-porn content. (BBC News, 2001) Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 3. Telecommunications Piracy • The act of reproducing copyrighted materials to be used for personal or business means. The reproduction is carried out illegally and items are usually sold at a lower price or distributed freely. • Case Study: The James Bond film, ‘The World is Not Enough’, was available on the internet before its official date of theatrical release. The Straits Times, 1999) Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 4. Dissemination/Distribution of Offensive Materials • The act of distributing or publishing materials which are generally considered as offensive on the Internet. These include sexually explicit materials, racist propaganda, instructions for the fabrication of inflammable and explosive devices. • Case Study: A man published invitations under the name of a 28-year-old woman, who claimed that she had sexual fantasies of being raped and gang raped. He communicated with men and distributed the victim’s personal information including her address, phone number and how to gain access to her home security system. The women received visits from strange men six different times and also received many obscene phone calls. Although the woman was not harmed, but the incident left her traumatised, afraid of answering the phone and leaving her home, and finally causing the lost of her job (Miller and Maharaj 1999). Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 5. Electronic money laundering and tax evasion • The act of using technology in order to launder money electronically and concealing its illegal origins. • Case Study: In Baltimore, a federal grand jury charged 39 people with the crime of international money laundering, in which the criminals were found to have transferred currency illegally through an informal system known as hawala. (Reuters, 2007) Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Money Laundering https://www.youtube.com/watch?v=cW4AjWNkFCE
Nine Types of Cyber Crimes 6. Electronic vandalism and terrorism • The act of using technology in order to cause damage or interfere with other systems, causing catastrophic consequences. • Case Study: In South Florida, it was found that a number of Germany hackers had disabled eight out of ten ISP servers in compromising the system of an Internet service provider. The criminals were able to gain access to personal information including credit card details of 10,000 subscribers. They communicated via email and demanded that a sum of US$30,000 be delivered to a mail drop in Germany. The US and Germany authorities cooperated with each other and successfully arrested the extortionists (Bauer 1998). Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 7. Sales and Investment fraud • The act of applying the use of digital technology for fraudulent (deceptive) achievements, such as fake sales pitches, deceptive charitable invitations and bogus investment proposals. • Case Study: In November 2007, two men were charged with a 12-year prison sentence after a jury found them guilty of being involved in \"fraudulent investments schemes that involved activities occurring from North Dakota to St Vincent and Grenada, and then to Switzerland and Spain\". (Carribean News, 2008) Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 8. Illegal interception of telecommunications • The act of intercepting electromagnetic signals emitted by a computer for electronic eavesdropping. • Case Study: The infamous American Hacker, Kevin Poulsen (Dark Dante) was known to gain access to law enforcement and national security wiretap data before being arrested in 1991. • His best-appreciated hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller, and the potential prize of a Porsche 944 S2. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Nine Types of Cyber Crimes 9. Electronic Funds Transfer fraud • The act of intercepting electronic funds transfer through electronic or physical means. • Case Study: In 1994, a Russian hacker by the name of Vladimir Levin obtained access the computers of Citibank’s central wire transfer department. Operating from St Petersburg, he transferred $10 Million from large corporate accounts to other accounts opened by his accomplices in Finland, Germany, Israel, the Netherlands and the United States. Officials from one of the corporate bodies in Argentina notified the bank, resulting in the freezing of the suspect accounts in San Francisco and the arrest of the accomplice. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Lesson Learnt • Never commit cyber crime. • Never involve with cyber crime • Never be a victim of cyber crime
Objective • Conditions where digital security breaches & attacks can happen • Understand the effects of various kind of security breaches & attacks. • Ways to get protect from security breaches & attacks. • Important to safe guard digital safety and security. • Shared Resources VS Dedicated Resources Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Defining e-Safety • INTERNET is vital in todays life – Virtual world VS Real World • Generally, everyone can own computers and gain access to Internet remotely. – schools, universities, rural folks, children learned how to use computers and browse the Internet. • Cyber-Safety has become main agenda of most countries of the world – China set-up hundreds of Internet Rehabilitation Center for youth with Internet Addiction cases. - http://www.csmonitor.com/World/Asia-Pacific/2009/0106/p01s03-woap.html • INTERNET dangers: • Internet threats can take on a range of forms or attacks • Internet can create illusion to turn strangers into “friends” • It can damage your reputation. • Common Forms of Digital Security Breaches • Identity Theft - • Phishing e-mails • Hacker & Crackers • Cyber stalking • Cyber bully • Internet Predator and Pornography Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Identity Theft • The use of someone’s personal information without their permission. - They use the information they find on the site to pretend to be someone they're not and coax other information out of you • Damages not limited to just financial problems, it can leave a person feeling violated , can cause emotional struggles, damage your name and result in illegal activities being associated with you. - In some instances, it can even take several years to completely clear up and have all illegal transactions cleared from your credit report. • How does it happens? • How to avoid being a victim? Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Phishing e-mail • SPAM emails? - randomly sent email purporting to come from an organisation or individual and claim to contain urgent news, confirmation of a non-existent order, which charges will be made to a credit card, or indeed any excuse to encourage the recipient to click on a link and visit a fake web site. • Why? - to get as much personal information from a user as possible. This includes login information, date of birth, and other identifiable information that can help Cyberstalkers open up bogus accounts under your name or steal from your existing ones. • Effect? Visiting to this web site with an unprotected computer and web browser allows the attacker to run spyware on your PC. Should this happen, the attacker can gain full remote access to your PC, which then allows them to steal usernames, passwords, other personal information and to control the computer for other purposes such as sending more spam emails and installing other spyware. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Hacker and Cracker • Somebody can access to your private connection -LAN/wireless/broadband – not using WEP key or you allow guest to access your network – view all files, password, bank account, PIN no, Documents and etc. • Effect? • Can fully access and doing whatever he want inside your connection. • Steal your information as email login, online banking login • Steal your money and will impersonate as you • Disgruntled employees stealing customer and supplier information to use it for personal or sell it. • Important data will lost forever. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Malware and Spyware • Any technology that aids in gathering information about a person or organization without their knowledge – non authorised • Sometimes occasionally installed just by visiting a Web site - drive-by download • Effect? - ability to control keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for marketing purposes or sell the information to another party. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Sample website suspected contains spyware Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
This is not real CIMB Bank website address Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Stolen IT equipment and improper way to dispose old equipment. • Stolen of laptop, external hard disk, thumb drive, hand phone – no of worldwide cases? • Old equipment still contained important information – how to dispose them? - Even if you think all of your files are erased there are still ways for criminals to restore the data Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Protection from security breaches & attacks 1. Self Awareness • Online Banking: You should only access your accounts from a safe location where no stranger can either watch you or use the same computer. Internet cafes and public libraries are not suitable places to use sensitive information, and even using your work computer isn't advisable. Only do online banking in the security of your own home if at all possible. • Identity Theft: Never give out your private personal information online or on the phone without knowing for certain that you are indeed dealing with a legitimate business that needs this information. • Safely destroy any financial documents or transaction receipts you don't need to keep anymore. Incineration or a cross cut paper shredder should do the trick. • Phishing: If you get an email asking you to confirm your bank details, ignore it. It will 100% certain be a fake, as no bank will ask for details via email, and could be used to illegally access your account. If you get fooled into handing over your details, you should contact your bank immediately so that your account can be changed before any fraudsters can gain access. • When using the Internet, and as things change all the time, keeping up to date is very important. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Protection from security breaches & attacks 2. Technology • Firewall: It will not only protect you from outsiders trying to get in, but also tell you each program on your system that's trying to get out • Antivirus: To make sure that if you slip up, it will be there to catch any nasty worm trying to infect you • Antispyware: It works on programs that don't try to take over your system, but instead pop up ads and unwanted messages’ • Parental Control: . It is good for filtering out websites, blogs, e-mails and instant messages that might contain inappropriate wording • Regular Updates: Keep your software up to date, and use secure software • Browser: Turn off scripting, popups and ads in browser to block unwanted and possibly armful scripts • Backup: If you regularly make backup copies of your files and keep them in a separate place, you can get some, if not all, of your information back in the event something happens to the originals on your computer Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Protection from security breaches & attacks 3.1 Implement policy • Good Password Practice: • Use strong password. At least 8 characters. Combination of letters, numbers and special characters. • Hard to guess by avoid the obvious words like “qwerty”, “password” and “123456” and avoid use personal information like your name, birthday, IC no. • Changed periodically by force password change on first login and establish a maximum password lifetime. it will minimize the risk of unauthorized access. • Kept it secret. be VERY careful where it’s stored and don’t tell anyone else your password. And the most important thing is, you can remembered it: • Embedding special characters like “P@sswOrd”. • Use the first letters of a common phrase and throw in some special characters and numbers like “Hope for the best, plan for the worst” to “H4tb,p4tw”. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Protection from security breaches & attacks 3.2 Implement policy on shared resources • A shared resource or network share is a device or piece of information on a computer that can be remotely accessed from another computer via a local area network or Intranet. It can be a file access, printer, scanner or etc. i. Best Practice: • Limit user access to sensitive areas of the network, so users can only access specified areas as required by their job. • Ensure users have the correct hardware, resources and software in place to protect them against data breaches. • Educating users on organisation security policies and precautions, so they are aware of how data breaches can happen and the implications • Ensuring users log off their accounts, turn of computers and don’t share passwords with others to prevent people accessing data. • Plan backup and recovery strategy to ensure organisation functioning well. • Ask user to report immediately to network admin if they see something weird on your pc. Ts. MOHD HATTA BIN HJ MOHAMED ALI @ MD HANI
Stay safe when online!
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200