REPORT OF THE GOI PROGRAMMES ON CYBER SECURITY

Size: px
Start display at page:

Download "REPORT OF THE GOI PROGRAMMES ON CYBER SECURITY 2012-13"

Transcription

1 REPORT OF THE GOI PROGRAMMES ON CYBER SECURITY Cyber Crimes being committed by cleverest of the clever, the users of computers, cell phones and other electronic devices should be aware of the mischiefs of these criminals, and the precautions to be taken to get rid of them. In spite of very high punishments prescribed by law, such crimes are on the rise. Looking at the growing importance of Cyber Security, IMG formulates and conducts Training Programmes on Cyber Security to different categories of employees. 14 GOI Programmes on Cyber Security of 3 days duration were conducted by IMG during the Year Programmes were conducted in IMG Thiruvananthapuram by Dr. A. Prasanna and 2 Programmes were conducted in IMG Kozhikode by Shri. M. K. Sadique. 1) Training Programme on Cyber Law and Cyber Security for Employees of Various Departments. Considering the demands of Training Programme on Cyber Law and Cyber Security from the part of the employees of various departments who are users of computer 2 such programmes were conducted in IMG Thiruvananthapuram for the employees of Various Departments. The first progrmme (GOI-7/12) was conducted from 15/05/2012 to 17/05/2012. Thirty three officers attended the programme. The second programme (GOI- 02) was conducted from 24/05/12 to 26/05/12 (3 days). Twenty four (24) officers attended the programme. The participants were of opinion that the classes were extremely useful to them and the hands on exercises performed in the Computer lab was of much use to the participants for securing their system from cyber attacks. In the IMG Regional Centre Kozhikkode two Training Programmes on Cyber Security were conducted from 28/1/ 2013 to 30/1/13 with 24 participants and from 5/3/13 to 7/3/13 with 20 participants.shri. M. K. Sadique Associate Fellow facilitated the Programmes. 1

2 2

3 2) Training Programme on Cyber Security and Cyber law for the Employees of Banks Banking Frauds are posing serious threats to our Economy. The advancement in information technology, has led to new ways of doing business in banking, saving time and increasing efficiency. Internet facilities of computer have revolutionized international banking for fund transfer and for exchange of data relating to banking. However Banking frauds are increasing day by day. So bank employees are trained to ensure customer security in banking transactions through internet. IMG conducted a Govt. of India sponsored Training Programme on Cyber Security and Cyber Law for Bank Employees (GOI-19) from 25/06/12 to 27/06/12. Seventeen officers from different banks attended the programme. 3

4 3)Training Programme on Cyber Security and Cyber law for the Employees of Treasury Financial transactions through computerised treasury accounts give ample opportunity to cyber criminals to commit cyber crimes like data diddling and online cheating. So training is given to employees of Treasury to enlighten them on the need to avoid misuse of internet and also the precautions to be taken to get rid of cyber criminals. 4) Training Programme on Cyber Law and Cyber Security for Teachers of Schools and Institutes Training is given to teachers of schools so that they can make their students aware of cyber ethics and cyber security since students of schools are culprits and victims of cyber 4

5 crimes. It is necessary to enlighten students on the need to avoid misuse of internet and also the precautions to be taken to get rid of cyber criminals. Teachers can contribute much in this regard. IMG conducted 2 Govt. of India sponsored Training Programmes on Cyber Security and Cyber Law for teachers of schools. The first Programme (GOI-111) was conducted from 6/06/12 to 8/06/12 with twenty teachers from Government Vocational Higher Secondary Schools. The second Programme was conducted (GOI-49) from 10/09/12 to 12/09/12. schools attended the programme. Twenty four teachers from different Government High 5

6 5) Training Progrmme on Cyber Law and Cyber Security for Teachers of Colleges Since the students colleges happen to be the culprits and victims of cyber crimes it is necessary to enlighten them in this regard. Training is given to teachers of colleges so that they can share knowledge on cyber security with their students. IMG has conducted a GOI Programmes on Cyber Law and Cyber Security for Teachers of Colleges (GOI-43) from 7/08/12 to 9/08/12 (3 days). Twenty eight teachers from 6) Training Programme on Cyber Security and Cyber Law for the Students of Colleges The students of colleges are both culprits and victims of cyber crimes. So it is necessary to enlighten them on the need to avoid misuse of internet and also the precautions to be taken to get rid of cyber criminals. Training is given to students of colleges so that they are aware of cyber ethics and cyber security. IMG conducted a Govt. of India sponsored Training Programmes on Cyber Security and Cyber Law for students of colleges from21/ 11/ 2012 to 23/11/ 2012 (GOI 73) with 29 students from different colleges. 6

7 7) Training Programme on Cyber Security and Cyber law for the Staff of Education Department Considering the key position of the General Education Department, training was given to employees of General Education Department (GOI 90) from to employees participated in the programme. They evaluated the programme as most useful to users of computer to protect themselves from cyber criminals. 7

8 8) Training Programme on Cyber Security and Cyber law and Cyber Forensics for Police Officers Considering the importance of investigation and trial in cases involving cyber crimes, three training Programmes on Cyber Law and Cyber Security were conducted in IMG Thiruvananthapuram from to with 14 participants (GOI 68), from to (GOI 69) with 27 participants and from to (GOI 34 ) with 32 participants. The Programmes went well and the participants evaluated the Programmes as usefull for cyber crime investigation and trial of cases before court of law. Police Officers from Cyber crime Police Station contributed much in the interactive sessions. 8

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand

More information

The International MBA in Corporate Security Management (IMBASM) Distance Learning

The International MBA in Corporate Security Management (IMBASM) Distance Learning MEDITERRANEAN INSTITUTE FOR SCIENTIFIC RESEARCH The International MBA in Corporate Security Management (IMBASM) Distance Learning Module Content Modules: Aims and Objectives Mandatory Modules SS247M1:

More information

Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008

Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008 Victimization by Credit Card Fraud and Identity Theft in Kentucky 2008 Dr. David May Emily Raine Eastern Kentucky University Acknowledgement The data used in this presentation were collected as part of

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING

MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING MALAYSIA ANTI-CORRUPTION ACADEMY: GLOBAL COMMITMENT TOWARDS ANTI-CORRUPTION CAPACITY BUILDING PRESENTER: ROHAIZAD YAAKOB SENIOR ASSISTANT DIRECTOR INTERNATIONAL STUDIES CENTRE MALAYSIA ANTI-CORRUPTION

More information

Timing: between 45 minutes and 75 minutes depending on options chosen.

Timing: between 45 minutes and 75 minutes depending on options chosen. eaching notes Key Stage: KS4. Criminal Justice System 3 How does the Youth Justice System work? Resources: internet access Resource 1 Quick quiz true or false? Resource 2 Key words and events Resource

More information

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne The 2012/3 SA Cyber Threat Barometer Craig Rosewarne An improved cyber security framework for South Africa Research - Initiatives South Africa (Pty) Ltd Stakeholder Risk Management / Alignment to business

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

ICT Barriers, High Tech Crime, and Police

ICT Barriers, High Tech Crime, and Police ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and

More information

Security in the Cloud an end to end Problem

Security in the Cloud an end to end Problem ID WORLD Abu Dhabi 18-19 March 2012 Cloud Computing & Mobile Applications Dr. Andrew Jones Programme Chair for Information Security Khalifa University of Science, Technology and Research, Abu Dhabi Security

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Teacher s Guide - Feature Showcase. Forensic Science. Grades: 6-8 Content Area: Science

Teacher s Guide - Feature Showcase. Forensic Science. Grades: 6-8 Content Area: Science Teacher s Guide - Feature Showcase Forensic Science Grades: 6-8 Content Area: Science Standards Alignment: McRel Level III; Nature of Science 13 National Standards: NS.5-8.6 Personal and Social Perspectives

More information

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Policing Together. A quick guide for businesses to Information Security and Cyber Crime Policing Together A quick guide for businesses to Information Security and Cyber Crime This leaflet has been produced by the Surrey and Sussex Cyber Crime Unit Who is this leaflet for? This leaflet will

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

New Horizons Regional Education Centers (C&T) Pacing Guide

New Horizons Regional Education Centers (C&T) Pacing Guide New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003 Introducing

More information

Technology Crime Services

Technology Crime Services Technology Crime Services Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime Traditional Policing

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead

Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead COURSE DESCRIPTION: Fingerprints. Blood spatter. DNA analysis. The world of law enforcement is increasingly making use of the techniques

More information

MSc Criminal Justice Studies LM520

MSc Criminal Justice Studies LM520 MSc Criminal Justice Studies LM520 1. Introduction The current social condition of the country is such that law and order is becoming a real social issue. Therefore, there is a definite need to understand

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues

Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1 VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 2 To view

More information

Updated Administration Proposal: Law Enforcement Provisions

Updated Administration Proposal: Law Enforcement Provisions Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security 3 (COMPUTER ETHICS AND COMPUTER SECURITY) (Ethics) 4 Computer Ethics 2 Ethics in Computer System 4 Issues in Information Ethics* Consequences of Ethical Issues 5 6 *Richard O. Mason, Four Ethical Issues

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Holiday Safe Shopping

Holiday Safe Shopping Holiday Safe Shopping Or How to keep the Grinch away this Holiday Season What is Identify Theft Scams and Technology How to Protect yourself How to Protect your customers What is Identity Theft Identity

More information

EMR: Electronic Medical Records Security: International Law Review

EMR: Electronic Medical Records Security: International Law Review EMR: Electronic Medical Records Security: International Law Review HCCA 11 th Annual Compliance Institute, April 2007 Jill Nelson, RN, MBA, JD, CPC, CHC Cleveland Clinic, Director of Corporate Compliance

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations.

Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations. Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations. The exponential increase in Cyber Crimes, the rapid advancement in technology,

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

NATIONAL CERTIFICATES (VOCATIONAL)

NATIONAL CERTIFICATES (VOCATIONAL) NATIONAL CERTIFICATES (VOCATIONAL) SUBJECT GUIDELINES PRINCIPLES OF CRIMINAL JUSTICE NQF Level 2 October 2007 PRINCIPLES OF CRIMINAL JUSTICE - LEVEL 2 CONTENTS INTRODUCTION 1 DURATION AND TUITION TIME

More information

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days) Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

Police College of Finland

Police College of Finland Tampere 3. biggest city in Finland 2 Tasks police training recruitment selection of students diploma studies further training research and development 3 Recent developments Education structure development

More information

New Horizons Regional Education Centers (C&T) Pacing Guide

New Horizons Regional Education Centers (C&T) Pacing Guide New Horizons Regional Education Centers (C&T) 1 st /Marking Period Course Introduction/ Introduction to New Horizons Handout & Lecture Safety and Safe Practices TDI8702-04.001; TDI8702-04.002; TDI8702-04.003

More information

The Innocence Legal Team specializes in [defending against] false allegations of

The Innocence Legal Team specializes in [defending against] false allegations of The Innocence Legal Team specializes in [defending against] false allegations of sexual and physical abuse. Patrick Clancy is the Chief Strategist of the Innocence Legal Team. He is nationally known as

More information

The Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law

The Changing Cyberthreat. and the Challenge of Policing Cybercrimes in the EU. Criminal Justice Studies School of Law School Centre for of something Criminal Justice Studies School of Law FACULTY OF OTHER The Changing Cyberthreat Landscape and the Challenge of Policing Cybercrimes in the EU EVIDENCE-BASED POLICING, 2015

More information

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws

Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws Industry Oriented Training and Capacity Building Program on Mobile Threats, Android Security, IOS security and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces

More information

Making a Victim Personal Statement

Making a Victim Personal Statement Making a Victim Personal Statement Your chance to explain how the crime has affected you VPS. Every crime has a victim. Every victim deserves a voice. Contents About this leaflet 01 About the VPS 03 How

More information

What can I do with a degree in CRIMINAL JUSTICE?

What can I do with a degree in CRIMINAL JUSTICE? What can I do with a degree in CRIMINAL JUSTICE? SOCIAL SERVICES Areas Corrections Counseling Juvenile Justice Casework Administration Probations & Parole Victim Advocacy Employers State and federal correction

More information

BOARD OF GOVERNORS MEETING JUNE 25, 2014

BOARD OF GOVERNORS MEETING JUNE 25, 2014 CYBER RISK UPDATE BOARD OF GOVERNORS MEETING JUNE 25, 2014 EXECUTIVE SUMMARY Cyber risk has become a major threat to organizations around the world, as highlighted in several well-publicized data breaches

More information

Class Times and Location: CJS 101.03 meets in F471 at 2 PM - 3:15PM TR.

Class Times and Location: CJS 101.03 meets in F471 at 2 PM - 3:15PM TR. INTRODUCTION TO CRIMINAL JUSTICE CJS 101 - Course Syllabus Dr. Walter H. Scalen, Jr. Liberal Arts North, Room 108 Office Phone: 936-468-3948 Home Phone: 936-639-6480 E-mail: waltscalen@sfasu.edu Home E-mail:

More information

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial

More information

Cyber Security Certification Program

Cyber Security Certification Program Centre for Cyber Security Cyber Security Certification Program Sardar Patel University of Police, Security & Criminal Justice, jodhpur (Established by Govt. of Rajasthan) SCISP SPUP Certified Information

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

NATIONAL CERTIFICATES (VOCATIONAL)

NATIONAL CERTIFICATES (VOCATIONAL) NATIONAL CERTIFICATES (VOCATIONAL) SUBJECT GUIDELINES PRINCIPLES OF CRIMINAL JUSTICE LEVEL 2 IMPLEMENTATION: JANUARY 2011 PRINCIPLES OF CRIMINAL JUSTICE - LEVEL 2 CONTENTS INTRODUCTION 1 DURATION AND

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 1: Course introduction Magnus Almgren (Erland Jonsson) Department of Computer Science and Engineering Chalmers University of Technology Sweden Motivation Course

More information

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO CERTIFICATE NUMBER (FOR COMPTROLLER S USE ONLY) TO: CITY COUNCIL FROM (ORIGINATING DEPARTMENT): Police Department DATE: 5/26/2015 SUBJECT: Informational update

More information

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext

More information

What can I do with a major in Justice Studies: Criminal Justice?

What can I do with a major in Justice Studies: Criminal Justice? Lewis-Clark State College offers a Bachelor of Arts or Science Degree in Justice Studies with an Emphasis in Criminal Justice through the Social Sciences Division. You can learn more about the Social Sciences

More information

GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL

GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL GROUP 2 STRENGTHENING THE CAPACITY AND INTEGRITY OF CRIMINAL JUSTICE AUTHORITIES AND THEIR PERSONNEL Chairman Mr. Francis Gichure Kariuki (Kenya) Co-Chairman Mr. Koichiro Hino (Japan) Rapporteur Mr. Ali

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME All Rights Reserved Index No No. of Pages - 09 No of Questions - 07 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME END SEMESTER EXAMINATION OCTOBER 2015

More information

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional

More information

Attachment A. ITT Technical Institute Criminal Justice. Fourth Semester. Course Equivalencies NWTC Criminal Justice- Corrections First Semester

Attachment A. ITT Technical Institute Criminal Justice. Fourth Semester. Course Equivalencies NWTC Criminal Justice- Corrections First Semester Course Equivalencies NWTC Criminal Justice- Corrections First Semester Attachment A ITT Technical Institute Criminal Justice 10-106-15 Keyboarding 1 TB 133 Strategies 10-50-11 POLlCE~NUTRITION/FITt\lESS

More information

New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor

New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor New Hampshire Cyber Crime Initiative Overview Briefing NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor Background: Cyber Crime Many traditional crimes now have a cyber component

More information

CYBER CRIME AWARENESS

CYBER CRIME AWARENESS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) CYBER CRIME AWARENESS RITU DHANOA* ABSTRACT: Cyber crime is emerging as

More information

Emerging risks for internet users

Emerging risks for internet users Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber

More information

VERNON COLLEGE SYLLABUS. DIVISION: Behavioral & Social Sciences DATE: 2010-2011. COURSE NUMBER AND TITLE: CRIJ 1301 Introduction to Criminal Justice

VERNON COLLEGE SYLLABUS. DIVISION: Behavioral & Social Sciences DATE: 2010-2011. COURSE NUMBER AND TITLE: CRIJ 1301 Introduction to Criminal Justice VERNON COLLEGE SYLLABUS DIVISION: Behavioral & Social Sciences DATE: 2010-2011 CREDIT HRS: 3 HRS/WK LEC: 3 HRS/WK LAB: 0 LEC/LAB COMB: 3 I. VERNON COLLEGE GENERAL EDUCATION PHILOSOPHY STATEMENT General

More information

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions: A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself

More information

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE CURRICULUM VITAE Jason Jordaan: CFE, PMCSSA, ACE MTech (Forensic Investigation), BComHons (Information Systems), BSc (CJ Computer Science) Summa Cum Laude, BTech (Policing) +27 (083) 556 7112 jjordaan@siu.org.za

More information

Sexual Assault Nurse Examiners (SANE) Certification Application Kit

Sexual Assault Nurse Examiners (SANE) Certification Application Kit Sexual Assault Nurse Examiners (SANE) Certification Application Kit Sexual Assault Prevention & Crisis Services Program Crime Victim Services Division Office of the Attorney General Revised June 2010 Page

More information

Helping the police to support people with vulnerabilities

Helping the police to support people with vulnerabilities Helping the police to support people with vulnerabilities Contents Foreword 1 Mental Health Crisis Care Concordat 3 Mental Health Street Triage 4 Liaison and Diversion 5 Multi Agency Working 6 Drugs 7

More information

How To Pass A Criminology Course

How To Pass A Criminology Course Programme Specification MSc in Forensic Psychology Entry Requirements: Applicants for this course must have a good Honours degree (2:1 or better) in Psychology that confers Graduate Basis for Registration

More information

Identity Theft Victims Universal Complaint Form (FTC)

Identity Theft Victims Universal Complaint Form (FTC) Average time to complete: 10 minutes A voluntary form for filing a report with law enforcement and disputes with credit reporting agencies and creditors about identity theft-related problems. Visit ftc.gov/idtheft

More information

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue shoplifting Guidance for police in England and Wales First publication: June 2014 1 Introduction 1.

More information

Teacher Assessment Blueprint. Criminal Justice. Test Code: 5269 / Version: 01. Copyright 2010 NOCTI. All Rights Reserved.

Teacher Assessment Blueprint. Criminal Justice. Test Code: 5269 / Version: 01. Copyright 2010 NOCTI. All Rights Reserved. Teacher Assessment Blueprint Test Code: 5269 / Version: 01 Copyright 2010 NOCTI. All Rights Reserved. General Assessment Information Blueprint Contents General Assessment Information Written Assessment

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

Department of Home Affairs

Department of Home Affairs GD 2015/0018 Department of Home Affairs POLICING PLAN 2015-2016 April 2015 Foreword by Minister for Home Affairs This is my fourth policing plan as Minister for Home Affairs. The economic backdrop has

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

Annexure 09: Governance Structure of the CCTNS Project

Annexure 09: Governance Structure of the CCTNS Project Annexure 09: Governance Structure of the CCTNS Project The table below provides the committees /teams that form part of the governance structure and their roles and responsibilities as defined in the CCTNS

More information

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital

More information

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM About the programme Crime and security related matters have become a major concern in modern society. In view of this development, it has become increasingly necessary to enhance the capacity of institutions

More information

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police Home Team Behavioural Sciences Centre (HTBSC) Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology Guests: Penelope, Jane HTBSC Director: Dr A Majeed B A Khander, concurrently Deputy Director

More information

Private Prosecutions

Private Prosecutions Private Prosecutions P r i v a t e P r o s e c u t i o n s Any victim of crime may bring a private prosecution. The ability of a company or individual to bring its own prosecution is protected by law and

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options

More information

Board of Technical Examinations, Kerala

Board of Technical Examinations, Kerala List of qualifications accepted so far as equivalent to KGTE Computer Word Processing for selection to the post of LD Typist in Various Departments. (Please see the notification for the post published

More information

VICTIMS. Tend to be smaller companies (<100 employees) *

VICTIMS. Tend to be smaller companies (<100 employees) * ANTI-FRAUD CONTROLS SCOPE According to experts, fraud averages about 6% of revenues for the average entity * Average loss of a fraud is about $160K and goes about 18-24 months before being detected 25%

More information

Cyber Security, Cyber Crimes and Cyber Laws

Cyber Security, Cyber Crimes and Cyber Laws Continuing Education Programme on Cyber Security, Cyber Crimes and Cyber Laws Name of the Proposer: Anil K. Roy and Manik Lal Das Other Instructors: arranged by CLS, Ahmedabad Course Objectives: Information

More information

REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS

REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS If you are experiencing or have experienced domestic volence and/or sexual violence there are a number of ways the law can protect

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

THE TAMIL NADU VICTIM COMPENSATION SCHEME, 2013 LAWYER STATUTES

THE TAMIL NADU VICTIM COMPENSATION SCHEME, 2013 LAWYER STATUTES THE TAMIL NADU VICTIM COMPENSATION SCHEME, 2013 LAWYER STATUTES P. VAIRAVA SUNDARAM - ADVOCATE 31st December 2013 Contents 1. Short title.-... 2 2. Definitions.-... 2 3. Victim Compensation Fund.-... 3

More information

INTEGRATED OFFENDER MANAGEMENT KEY PRINCIPLES

INTEGRATED OFFENDER MANAGEMENT KEY PRINCIPLES INTEGRATED OFFENDER MANAGEMENT KEY PRINCIPLES March 2010 CONTENTS Introduction Overview of Integrated Offender Management (IOM) Principles of IOM PPO refresh and traffic light assessments DIP review Hallmarks

More information

How Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, 2014. Jesse Mayer and RobbMayeski.

How Do We Prepare the Next. Generation ofcyber Warrior? Education v. Experience. April 30, 2014. Jesse Mayer and RobbMayeski. How Do We Prepare the Next Generation ofcyber Warrior? Education v. Experience April 30, 2014 Jesse Mayer and RobbMayeski Northrop Grumman Cyber Security Operations Center Overview Who are we? Introduction

More information

CRITICAL INCIDENT REPORTING POLICY DEPARTMENT OF HUMAN SERVICES MEDICAL SERVICES DIVISION - MFP DN 533 (8-2008)

CRITICAL INCIDENT REPORTING POLICY DEPARTMENT OF HUMAN SERVICES MEDICAL SERVICES DIVISION - MFP DN 533 (8-2008) General Definition A Critical Incident is any actual or alleged event or situation that creates a significant risk of substantial or serious harm to the physical or mental health, safety or well being

More information

How To Secure Your Information Systems

How To Secure Your Information Systems isec Securing the Insecure Securing The Insecure e Security Rapid development of information technology has increased the use of open systems spanning local and remote sites. Great effort has gone into

More information