Real world cyber crime cases
|
|
|
- Blake Gaines
- 10 years ago
- Views:
Transcription
1 Real world cyber crime cases This document is an extract from the book Cyber Crime & Digital Evidence Indian Perspective authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian School of Cyber Laws
2 23. Real World Cases This chapter serves as a ready reference guide. First the various scenarios are covered. A detailed discussion on the various cyber crimes, is covered in the ASCL publication titled Understanding Hackers and Cyber Criminals. This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course. Then the applicable law and legal liabilities are covered. Then the modus operandi usually followed by the criminals is discussed. The investigation guidelines for cyber crime investigators are not discussed in this book as they are part of the syllabus of the ASCL Certified Cyber Crime Investigator course only. For real world case studies on investigation of cyber crimes, please refer to the ASCL publication titled Case Studies on Cyber Crime Investigation. This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course Rohas Nagpal. All rights reserved.
3 23.1 Orkut Fake Profile cases Cyber Crime & Digital Evidence Indian Perspective Orkut.com is a very popular online community and social networking website. Orkut users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Orkut members are publicly viewable. s 1. A fake profile of a woman is created on Orkut. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of loose character who wants to have sexual relations with anyone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favours. This leads to a lot of harassment for the victim and also defames her in society. 2. An online hate community is created. This community displays objectionable information against a particular country, religious or ethnic group or even against national leaders and historical figures. 3. A fake profile of a man is created on Orkut. The profile contains defamatory information abut the victim (such as his alleged sexual weakness, alleged immoral character etc) Scenario 1: Section 67 of Information Technology Act and section 509 of the Indian Penal Code. Scenario 2: Section 153A and 153B of Indian Penal Code. Scenario 3: Section 500 of Indian Penal Code. Scenario 1: Directors of Orkut as well as all those who create and update the fake profile. Scenario 2: Same as Scenario 1. Scenario 3: Same as Scenario Rohas Nagpal. All rights reserved
4 Scenario 1: Jealousy or revenge (e.g. the victim may have rejected the advances made by the suspect). Scenario 2: Desire to cause racial hatred (e.g. Pakistani citizens creating an anti-india online community). Scenario 3: Hatred (e.g. a school student who has failed may victimize his teachers). 1. The suspect would create a free Gmail account using a fictitious name. 2. The ID chosen by him would be unrelated to his real identity. 3. The suspect would then login to Orkut.com and create the offensive profile Rohas Nagpal. All rights reserved.
5 23.2 Account Hacking s are increasingly being used for social interaction, business communication and online transactions. Most account holders do not take basic precautions to protect their account passwords. Cases of theft of passwords and subsequent misuse of accounts are becoming very common. s 1. The victim s account password is stolen and the account is then misused for sending out malicious code (virus, worm, Trojan etc) to people in the victim s address book. The recipients of these viruses believe that the is coming from a known person and run the attachments. This infects their computers with the malicious code. 2. The victim s account password is stolen and the hacker tries to extort money from the victim. The victim is threatened that if he does not pay the money, the information contained in the s will be misused. 3. The victim s account password is stolen and obscene s are sent to people in the victim s address book. Scenario 1: Sections 43 and 66 of Information Technology Act. Scenario 2: Sections 43 and 66 of Information Technology Act and section 384 of Indian Penal Code. Scenario 3: Sections 43, 66 and 67 of Information Technology Act and section 509 of the Indian Penal Code. Scenario 1: Persons who have stolen the account password and who are misusing the account. Scenario 2: Persons who have stolen the account password and who are threatening to misuse it Rohas Nagpal. All rights reserved
6 Scenario 3: Persons who have stolen the account password and who are misusing the account. Scenario 1: Corporate Espionage, perverse pleasure in being able to destroy valuable information belonging to strangers etc. Scenario 2: Illegal financial gain. Scenario 3: Revenge, jealousy, hatred. 1. The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. 2. Unsuspecting victims would login to their accounts using these infected computers. 3. The passwords of the victim s accounts would be ed to the suspect Rohas Nagpal. All rights reserved.
7 23.3 Credit Card Fraud Credit cards are commonly being used for online booking of airline and railway tickets and for other ecommerce transactions. Although most of ecommerce websites have implemented strong security measures (such as SSL, secure web servers etc), instances of credit card frauds are increasing. The victim s credit card information is stolen and misused for making online purchases (e.g. airline tickets, software, subscription to pornographic websites etc). Sections 43 and 66 of Information Technology Act and section 420 of Indian Penal Code. All persons who have stolen the credit card information as well as those who have misused it. Illegal financial gain. Scenario 1: The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these infected computers to make online transactions. The credit card information of the victim would be ed to the suspect. Scenario 2: Petrol pump attendants, workers at retail outlets, hotel waiters etc note down information of the credit cards used for making payment at these establishments. This information is sold to criminal gangs that misuse it for online frauds Rohas Nagpal. All rights reserved
8 23.4 Online Share Trading Fraud With the advent of dematerialization of shares in India, it has become mandatory for investors to have demat accounts. In most cases an online banking account is linked with the share trading account. This has led to a high number of online share trading frauds. Scenario 1: The victim s account passwords are stolen and his accounts are misused for making fraudulent bank transfers. Scenario 2: The victim s account passwords are stolen and his share trading accounts are misused for making unauthorised transactions that result in the victim making losses. Scenario 1: Sections 43 and 66 of Information Technology Act and section 420 of Indian Penal Code. Scenario 2: Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Scenario 1: All persons who have stolen the account information as well as those who have misused it. Scenario 2: All persons who have stolen the account information as well as those who have misused it. Scenario 1: Illegal financial gain Scenario 2: Revenge, jealousy, hatred Scenario 1: The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these infected computers to login to their online banking and share trading accounts. The passwords and other information of the victim would be ed to the suspect. Scenario 2: Same as scenario Rohas Nagpal. All rights reserved.
9 23.5 Tax Evasion and Money Laundering Many unscrupulous businessmen and money launderers (havala operators) are using virtual as well as physical storage media for hiding information and records of their illicit business. Scenario 1: The suspect uses physical storage media for hiding the information e.g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, ipods etc. Scenario 2: The suspect uses virtual storage media for hiding the information e.g. accounts, online briefcases, FTP sites, Gspace etc. Scenario 1: Depending upon the case, provisions of the Income Tax Act and Prevention of Money Laundering Act will apply. Scenario 2: Depending upon the case, provisions of the Income Tax Act and Prevention of Money Laundering Act will apply. Scenario 1: The person who hides the information. Scenario 2: The person who hides the information. If the operators of the virtual storage facility do not cooperate in the investigation, then they also become liable. Scenario 1: Illegal financial gain Scenario 2: Illegal financial gain Scenario 1: The suspect would purchase small storage devices with large data storage capacities. Scenario 2: The suspect would open free or paid accounts with online storage providers Rohas Nagpal. All rights reserved
10 23.6 Source Code Theft Computer source code is the most important asset of software companies. Simply put, source code is the programming instructions that are compiled into the executable files that are sold by software development companies. As is expected, most source code thefts take place in software companies. Some cases are also reported in banks, manufacturing companies and other organisations who get original software developed for their use. Scenario 1: The suspect (usually an employee of the victim) steals the source code and sells it to a business rival of the victim. Scenario 2: The suspect (usually an employee of the victim) steals the source code and uses it as a base to make and sell his own version of the software. Scenario 1: Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act. Scenario 2: Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act. Scenario 1: The persons who steal the source code as well as the persons who purchase the stolen source code. Scenario 2: The persons who steal the source code. Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Scenario 1: If the suspect is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device Rohas Nagpal. All rights reserved.
11 If the suspect is not an employee of the victim, he would hack into the victim s servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then contact potential buyers to make the sale. Scenario 2: If the suspect is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. If the suspect is not an employee of the victim, he would hack into the victim s servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then modify the source code (either himself or in association with other programmers) and launch his own software Rohas Nagpal. All rights reserved
12 23.7 Theft of Confidential Information Most business organisations store their sensitive information in computer systems. This information is targeted by rivals, criminals and sometimes disgruntled employees. Scenario 1: A business rival obtains the information (e.g. tender quotations, business plans etc) using hacking or social engineering. He then uses the information for the benefit of his own business (e.g. quoting lower rates for the tender). Scenario 2: A criminal obtains the information by hacking or social engineering and threatens to make the information public unless the victim pays him some money. Scenario 3: A disgruntled employee steals the information and mass mails it to the victim s rivals and also posts it to numerous websites and newsgroups. Scenario 1: Sections 43 and 66 of the Information Technology Act, section 426 of Indian Penal Code. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 384 of Indian Penal Code. Scenario 3: Sections 43 and 66 of the Information Technology Act, section 426 of Indian Penal Code. Scenario 1: The persons who steal the information as well as the persons who misuse the stolen information. Scenario 2: The persons who steal the information as well as the persons who threaten the victim and extort money. Scenario 3: The disgruntled employee as well as the persons who help him in stealing and distributing the information. Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Scenario3: Revenge Rohas Nagpal. All rights reserved.
13 Scenario 1: The suspect could hire a skilled hacker to break into the victim systems. The hacker could also use social engineering techniques. Illustration: A very good looking woman went to meet the system administrator (sysadmin) of a large company. She interviewed the sysadmin for a magazine article. During the interview she flirted a lot with the sysadmin and while leaving she accidentally left her pen drive at the sysadmin s room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized! Once the Trojan was in place, a lot of sensitive information was stolen very easily. Illustration: The sysadmin of a large manufacturing company received a beautifully packed CD ROM containing security updates from the company that developed the operating system that ran his company s servers. He installed the updates which in reality were Trojanized software. For 3 years after that a lot of confidential information was stolen from the company s systems! Scenario 2: Same as scenario 1. Scenario 3: The disgruntled employee would usually have direct or indirect access to the information. He can use his personal computer or a cyber café to spread the information Rohas Nagpal. All rights reserved
14 23.8 Software Piracy Many people do not consider software piracy to be theft. They would never steal a rupee from someone but would not think twice before using pirated software. There is a common perception amongst normal computer users to not consider software as property. This has led to software piracy becoming a flourishing business. Scenario 1: The software pirate sells the pirated software in physical media (usually CD ROMs) through a close network of dealers. Scenario 2: The software pirate sells the pirated software through electronic downloads through websites, bulletin boards, newsgroups, spam s etc. Scenario 1: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 1: The software pirate as well as the persons who buy the pirated software from him. Scenario 2: The software pirate as well as the persons who buy the pirated software from him. Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Scenario 1: The suspect uses high speed CD duplication equipment to create multiple copies of the pirated software. This software is sold through a network of computer hardware and software vendors. Scenario 2: The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. Such service providers do not divulge client information to law enforcement officials of other countries Rohas Nagpal. All rights reserved.
15 23.9 Music Piracy Many people do not consider music piracy to be theft. They would never steal a rupee from someone but would not think twice before buying or using pirated music. There is a common perception amongst people users to not consider music as property. There is a huge business in music piracy. Thousands of unscrupulous businessmen sell pirated music at throw away prices. Scenario 1: The music pirate sells the pirated music in physical media (usually CD ROMs) through a close network of dealers. Scenario 2: The music pirate sells the pirated music through electronic downloads through websites, bulletin boards, newsgroups, spam s etc. Scenario 1: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 1: The music pirate as well as the persons who buy the pirated software from him. Scenario 2: The music pirate as well as the persons who buy the pirated software from him. Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain. Scenario 1: The suspect uses high speed CD duplication equipment to create multiple copies of the pirated music. This music is sold through a network of dealers. Scenario 2: The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. Such service providers do not divulge client information to law enforcement officials of other countries Rohas Nagpal. All rights reserved
16 Scams s are fast emerging as one of the most common methods of communication in the modern world. As can be expected, criminals are also using s extensively for their illicit activities. In the first step, the suspect convinces the victim that the victim is going to get a lot of money (by way of winning a lottery or from a corrupt African bureaucrat who wants to transfer his ill gotten gains out of his home country). In order to convince the victim, the suspect sends s (some having official looking documents as attachments). Once the victim believes this story, the suspect asks for a small fee to cover legal expenses or courier charges. If the victim pays up the money, the suspect stops all contact. Section 420 of Indian Penal Code The sender of the . Illegal financial gain. The suspect creates accounts in fictitious names and sends out millions of fraudulent s using powerful spam software Rohas Nagpal. All rights reserved.
17 23.11 Phishing With the tremendous increase in the use of online banking, online share trading and ecommerce, there has been a corresponding growth in the incidents of phishing being used to carry out financial frauds. Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc) by masquerading as a trusted entity. Scenario 1: The victim receives an that appears to have been sent from his bank. The urges the victim to click on the link in the . When the victim does so, he is taken to a secure page on the bank s website. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim s information is stolen and misused. Sections 43 and 66 of Information Technology Act and sections 419, 420 and 468 of Indian Penal Code. All persons involved in creating and sending the fraudulent s and creating and maintaining the fake website. The persons who misuse the stolen or phished information are also liable. Illegal financial gain. The suspect registers a domain name using fictitious details. The domain name is usually such that can be misused for spoofing e.g. Noodle Bank has its website at The suspects can target Noodle customers using a domain name like The suspect then sends spoofed s to the victims. e.g. the s may appear to come from [email protected] The fake website is designed to look exactly like the original website Rohas Nagpal. All rights reserved
18 23.12 Cyber Pornography Cyber pornography is believed to be one of the largest businesses on the Internet today. The millions of pornographic websites that flourish on the Internet are testimony to this. While pornography per se is not illegal in many countries, child pornography is strictly illegal in most nations today. Cyber pornography includes pornographic websites, pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). The suspect accepts online payments and allows paying customers to view / download pornographic pictures, videos etc from his website. Section 67 of Information Technology Act. The persons who create and maintain the pornographic websites are liable. In some cases cyber café owners and managers may also be liable in case they knowingly allow their customers to access the pornographic websites. Illegal financial gain. The suspect registers a domain name using fictitious details and hosts a website on a server located in a country where cyber pornography is not illegal. The suspect accepts online payments and allows paying customers to view / download pornographic pictures, videos etc from his website Rohas Nagpal. All rights reserved.
19 23.13 Online Sale of Illegal Articles It is becoming increasingly common to find cases where sale of narcotics drugs, weapons, wildlife etc. is being facilitated by the Internet. Information about the availability of the products for sale is being posted on auction websites, bulletin boards etc. The suspect posts information about the illegal sale that he seeks to make. Potential customers can contact the seller using the IDs provided. If the buyer and seller trust each other after their and / or telephonic conversation, the actual transaction can be concluded. In most such cases the buyer and seller will meet face to face at the time of the final transaction. Illustration: In March 2007, the Pune rural police cracked down on an illegal rave party and arrested hundreds of illegal drug users. The social networking site, Orkut.com, is believed to be one of the modes of communication for gathering people for the illegal drug party. Depending upon the illegal items being transacted in, provisions of the Narcotic Drugs and Psychotropic Substances Act, Arms Act, Indian Penal Code, Wildlife related laws etc may apply. The persons who buy and sell these items. Illegal financial gain. The suspect creates an ID using fictitious details. He then posts messages, about the illegal products, in various chat rooms, bulletin boards, newsgroups etc. Potential customers can contact the seller using the IDs provided. If the buyer and seller trust each other after their and / or telephonic conversation, the actual transaction can be concluded. In most such cases the buyer and seller will meet face to face at the time of the final transaction Rohas Nagpal. All rights reserved
20 23.14 Use of Internet and Computers by Terrorists Many terrorists are using virtual as well as physical storage media for hiding information and records of their illicit business. They also use s and chat rooms to communicate with their counterparts around the globe. The suspects carry laptops wherein information relating to their activities is stored in encrypted and password protected form. They also create accounts using fictitious details. In many cases, one account is shared by many people. E.g. one terrorist composes an and saves it in the draft folder. Another terrorist logs into the same account from another city / country and reads the saved . He then composes his reply and saves it in the draft folder. The s are not actually sent. This makes tracking and tracing almost impossible. Terrorists also use physical storage media for hiding the information e.g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, ipods etc. They also use virtual storage media for hiding the information e.g. accounts, online briefcases, FTP sites, Gspace etc. Terrorists are covered by conventional laws such as Indian Penal Code and special legislation relating to terrorism. Terrorists as well as those who help them to protect their information are liable. If service providers do not assist the law enforcement personnel in the investigation then they are also legally liable. Keeping terrorism related information confidential. Secure communication amongst terrorist group members. The terrorists purchase small storage devices with large data storage capacities. They also purchase and use encryption software. The terrorists may also use free or paid accounts with online storage providers Rohas Nagpal. All rights reserved.
21 23.15 Virus Attacks Computer viruses are malicious programs that destroy electronic information. As the world is increasingly becoming networked, the threat and damage caused by viruses is growing by leaps and bounds. Scenario 1: The virus is a general in the wild virus. This means that it is spreading all over the world and is not targeted at any specific organisation. Scenario 2: The virus targets a particular organisation. This type of a virus is not known to anti-virus companies as it is a new virus created specifically to target a particular organisation. Scenario 1: Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Scenario 2: Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Scenario 1: The creator of the virus. Scenario 2: The creator of the virus as well as the buyer who purchases the virus (usually to target his business rivals). Scenario 1: Thrill and a perverse pleasure in destroying data belonging to strangers. Scenario 2: Illegal financial gain, revenge, business rivalry. Scenario 1: A highly skilled programmer creates a new type or strain of virus and releases it on the Internet so that it can spread all over the world. Being a new virus, it goes undetected by many anti-virus software and hence is able to spread all over the world and cause a lot of damage. Anti-virus companies are usually able to find a solution within 8 to 48 hours Rohas Nagpal. All rights reserved
22 Scenario 2: A highly skilled programmer creates a new type or strain of virus. He does not release it on the Internet. Instead he sells it for a huge amount of money. The buyer uses the virus to target his rival company. Being a new virus, it may be undetected by the victim company s anti-virus software and hence would be able to cause a lot of damage. Anti-virus companies may never get to know about the existence of the virus Rohas Nagpal. All rights reserved.
23 23.16 Web Defacement Website defacement is usually the substitution of the original home page of a website with another page (usually pornographic or defamatory in nature) by a hacker. Religious and government sites are regularly targeted by hackers in order to display political or religious beliefs. Disturbing images and offensive phrases might be displayed in the process, as well as a signature of sorts, to show who was responsible for the defacement. Websites are not only defaced for political reasons, many defacers do it just for the thrill. The homepage of a website is replaced with a pornographic or defamatory page. In case of Government websites, this is most commonly done on symbolic days (e.g. the Independence day of the country). Sections 43 and 66 of Information Technology Act [In some cases section 67 and 70 may also apply]. The person who defaces the website. Thrill or a perverse pleasure in inciting communal disharmony. The defacer may exploit the vulnerabilities of the operating system or applications used to host the website. This will allow him to hack into the web server and change the home page and other pages. Alternatively he may launch a brute force or dictionary attack to obtain the administrator passwords for the website. He can then connect to the web server and change the webpages Rohas Nagpal. All rights reserved
24 Head Office 6th Floor, Pride Senate, Behind Indiabulls Mega Store, Senapati Bapat Road, Pune India Contact Numbers [email protected] URL:
Liability of Network Service Providers
Liability of Network Service Providers This document is an extract from the book Cyber Crime & Digital Evidence Indian Perspective authored by Rohas Nagpal. This book is available as courseware for the
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
ICT POLICY AND PROCEDURE
ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day
Crimes relating to Digital Signature Certificates
Crimes relating to Digital Signature Certificates This document is an extract from the book Cyber Crime & Digital Evidence Indian Perspective authored by Rohas Nagpal. This book is available as courseware
Cybercrimes NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Simple Guide to Digital Signatures
Simple Guide to Digital Signatures Rohas Nagpal Asian School of Cyber Laws About the author Rohas Nagpal is the founder President of Asian School of Cyber Laws. He advises Governments and corporates around
WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014
WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation
Obtaining a digital signature certificate
Obtaining a digital signature certificate This document is an extract from the book Ecommerce - Legal Issues authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
Acceptable Use of Information Technology Policy
Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.
1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
CYBER CRIME AWARENESS
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) CYBER CRIME AWARENESS RITU DHANOA* ABSTRACT: Cyber crime is emerging as
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Dene Community School of Technology Staff Acceptable Use Policy
Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
INTRODUCTION DEVELOPMENT AND PHENOMENA
INTRODUCTION DEVELOPMENT AND PHENOMENA ITU, ICB4PAC 02.03.2011, Vanuatu Prof. Dr. Marco Gercke, Director Cybercrime Research Institute Cybercrime Page: 1 GENERAL INTRODUCTION Cybercrime Seite: 2 CYBERCRIME
GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V
GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy
Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy I. Overview RCMA supports instruction through the use of educational and administrative computers. The responsible use of
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
Conditions of Use. Communications and IT Facilities
Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Computer Network & Internet Acceptable Usage Policy. Version 2.0
Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
TECHNOLOGY ACCEPTABLE USE POLICY
Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Information Security. Louis Morgan, CISSP Information Security Officer
Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
------------------- COMPUTER NETWORK AGREEMENT FORM
COMPUTER NETWORK AGREEMENT FORM I (we) have read the guidelines for participating in the Wickliffe District Network and Internet Access program and agree to adhere to all ofthe provisions contained therein.
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different
How To Monitor The Internet In Idaho
Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Customer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
John of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Acceptable Use Policy (AUP) School Computing
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
