CS204 Handouts by MS
CS204 Handouts by MS
CS204 Handouts by MS
HANDOUTS TOPIC NO 1 TO 15
MUHAMMAD IMRAN
Lesson # 1INTRODUCTION TO CYBER SOCIETY CYBER CULTURE AND CYBER SPACE
TOPICS:
Main Objective
Cyber Society
Cyber Culture
Cyber Culture Components
Cyber Space Concept
Cyber Space Communities
The Cultures of Computing
Effects of Cyber Culture on Society
Outcomes
MAIN OBJECTIVES:
Positive Online Environment of Internet users and a healthy cyber culture for the Internet
community.
A recognition of the power of the Internet to benefit oneself and the community at large .
To reflect on how to become a responsible user of social networking sites and a commitment
towards building a healthy cyber culture .
CYBER SOCIETY
Cyber Society :Focuses on the construction, maintenance and facilitation of community in electronic
networks and computer mediated communication.
CYBER CULTURE
Introduction:
World Wide web is the collection of electronic documents.
Each electronic document on the web is called a web page. Which can contain text, graphics,
audio and video.
The use of World Wide Web by a people or a group of people for the exchange of social
expectations, custom, history and language is called cyber culture.
Like every culture has its own language, the cyber culture is not the exception to this rule.
It converts the human written language or symbols to machine language and reconverts to
human understandable language so the people on the destination can understand.
Now a day’s specially in online chatting the cyber language is creates of new codes which
affects our daily spoken language.
MUHAMMAD IMRAN 1
Blog
Online Chat
E-Commerce
Social Networks
The Internet
The network formed by the co-operative interconnection of a large number of computer
networks.
No one owns the Internet.
There is no central administration to the internet.
Main goal of the internet is to connect several computers together for the exchange of
messages and share the information etc.
Community of people.
Collection of resources
Website
A location connected to the Internet that maintains one or more web pages.
Web pages are the building blocks of the website.
Web pages includes documents like texts and multimedia contents etc.
A web sites may be accessible through a public Internet Protocol (IP) network, such as the
Internet, or a private local area network (LAN), by referencing a uniform resource locator (URL)
that identifies the site.
E-mail
E-mail (Electronic Mail)
Electronic mail, most commonly called email.
E-mail is the Most widely used application on the internet.
Messages that are sent electronically from one computer to another is an e-mail message.
Blog:
A blog is a discussion or informational site published on the World Wide Web consisting of
discrete entries ("posts").
A regularly updated website or web page, typically , runs by an individual or a small group.
Online Chat
Any kind of communication over the Internet that offers a real-time transmission of text messages
from sender to receiver is called online chat.
Online chat may address point-to-point communications as well as multicast communications
from one sender to many receivers and video chat, or may be a feature of a web conferencing
service.
Any direct text-based or video-based (webcams), one-on-one chat or one-to-many group chat by
using tools such as instant messengers, Internet Relay Chat (IRC) etc.
E-Commerce
Electronic commerce, commonly written as e-commerce, is the trading or facilitation of trading in
products or services using computer networks, such as the Internet.
Commercial transactions conducted electronically on the Internet.
E.g.
Online shopping.
Online market places.
Business to business buying & selling.
Online newsletter for marketing prospective.
Social Networks
A dedicated website or other application which enables users to communicate with each other by
posting information, comments, messages, images , videos are referred to as social networks.
For example networks like
MUHAMMAD IMRAN 2
Face book.
Linked in.
Twitter.
OUT COME
The cyber culture is developing and we need to know the values and believes of this culture. Cyber
culture has great influence on human culture and in way new uniform global culture is developing.
E-COMMERECE EAMPLE
E-COMMERECE TYPES
MUHAMMAD IMRAN 4
TYPES OF E-COMMERECE MODELS
-
1. Business-to-Business (B2B) Model
2. Business-to-Consumer (B2C) Model
3. Consumer –to-Business (C2B) Model
4. Consumer-to-Consumer (C2C) Model
The B2C model involves transactions between business organizations and consumers. It applies to
any business organization that sells its products or services to consumers over the Internet. These
sites display product information in an online catalog and store it in a database. The B2C model also
includes services online banking, travel services, and health information.
Example: www.daraz.pk, www.amazon.com etc….
MUHAMMAD IMRAN 5
4.Consumer-to-Consumer (C2C) Model
The C2C model involves transaction between consumers. Here, a consumer sells directly to another
consumer.
eBay.com, olx.com, etc… are common examples of online auction web sites that provide a consumer
to advertise and sell their products online to another consumer.
PROCESS OF E-COMMERCE
A consumer uses Web browser to connect to the home page of a merchant's Web site on the
Internet.
The consumer browses the catalog of products featured on the site and selects items to purchase.
The selected items are placed in the electronic equivalent of a shopping cart.
When the consumer is ready to complete the purchase of selected items, He/she provides a bill-to
and ship-to address for purchase and delivery .
When the payment method is identified and the order is completed at the Commerce Server site,
the merchant's site displays a receipt confirming the customer's purchase.
The Commerce Server site then forwards the order to a Processing Network for payment
processing and fulfilment.
These are some common steps of online transactions.
MUHAMMAD IMRAN 6
ADVANTAGES OF E-COMMERCE
Faster buying/selling procedure, as well as easy to find products.
Buying/selling 24/7.
You can shop anywhere in the world.
Low operational costs and better quality of services.
No need of physical company set-ups.
Easy to start and manage a business.
Customers can easily select products from different providers without moving around physically.
DISADVANTAGES OF E-COMMERCE
Communication improvement.
Unable to examine products personally.
Not everyone is connected to the Internet.
There is the possibility of credit card number theft.
Mechanical failures can cause unpredictable effects on the total processes.
OUTCOMES
Have the concepts and processes that comprise the technical infrastructure of e-commerce sites and
be able to solve problems about online transactions.
Main Objective
Introduction to Cyber Crime
Categories Of Cyber Crime
Types of Cyber Crimes
Safety Tips
MAIN OBJECTIVES
Outcomes
– To explore about cybercrime.
– To create basic awareness about cyber crime .
– To gain more knowledge about cyber crime.
– Understanding of the risks of harmful online behavior.
Cyber Crime:
Computer crime or cybercrime, refers to any crime that involves a computer , Mobile and a network.
Computer may be used as a weapon for crime or as a target.
The Computer as a Target : Using a computer to attack other computers.
MUHAMMAD IMRAN 7
The computer as a weapon: Using a computer to commit real world crimes.
Cyber Criminals:
Those who are doing crimes by using the computer as a target or an object.
MUHAMMAD IMRAN 8
E-mail Spamming & Spoofing: Email spoofing refers to email that appears to have been
originated from one source and it was actually sent from another source. Email "spamming" refers to
sending email to thousands and thousands of users - similar to a chain letter.
Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is
called cyber vandalism. These are program that attach themselves to a file and then circulate.
SAFETY TIPS
Use antivirus software’s .
Insert firewalls .
uninstall unnecessary software .
Maintain backup .
Never send your credit card number to any site that is not secured.
Avoid sending any photograph online particularly to strangers.
Do not open mails from strangers. This prevents your system from unwanted attacks.
Don't respond to harassing or negative messages.
Learn more about Internet privacy.
Keep your operating system up to date.
Change passwords frequently and Use hard-to-guess passwords.
Don't share access to your computers with strangers .
OUTCOMES
If you have a Wi-Fi network, password protect it.
Disconnect from the Internet when not in use.
As internet technology advances so does the threat of cyber crime. In times likes these we
must protect ourselves from cyber crime. Antivirus software, firewalls and security patches are just
the beginning. Never open suspicious emails and only navigate to trusted sites.
Main Objective
Outcomes
The objective is to educate and create awareness amongst the students community on use of
technology, internet media and its implication on possible cyber crimes.
Some of the possible prevention measures . One can take to avoid getting victimized for a cyber
crime.
MUHAMMAD IMRAN 9
2. Integrity: Assurance that resources has not been modified.
3. Availability : Assurance that authorized user may access a resource when requested.
Hackers:
A person who secretly gets access to a computer system in order to get information, cause damage,
etc.
Hackers attack where they see weakness. A system that hasn't been updated recently has flaws in it
that can be taken advantage of by hackers.
MUHAMMAD IMRAN 10
Solution:
It may be impossible to prevent computer hacking, however effective security controls
including strong passwords, and the use of firewalls can helps.
Regu
Malware:
The word "malware" comes from the term
"Malicious software."
Malware is any software that infects and damages a computer system without the owner's knowledge
or permission.
Solution:
Download an anti-malware program that also helps prevent infections.
Activate Network Threat Protection,
Firewall, Antivirus.
Password Cracking:
Password attacks are attacks by hackers that are able to determine passwords or find passwords to
different protected electronic areas and social network sites.
Solution:
Use always Strong password.
Never use same password for two different sites.
SECURITY MEASURES
THINGS TO DO FOR PROTECTING YOUR COMPUTER
Use security software.
Maintain current software and updates.
Never share passwords .
Do not click random links.
Do not download unfamiliar software off the Internet.
Log out or lock your computer.
Remove unnecessary programs or services.
Frequently back up important documents and files.
OUTCOMES
Improve the knowledge about cyber security and to overcome several security loopholes , Also
it helps to spread awareness among normal people about emerging security threats. Simple and
practical prevention methods are explained in the lesson to prevent PCs from infection.
MUHAMMAD IMRAN 11
Lesson # 5 CRYPTGRAPHT
INTRODUCTION OF CRYPTGRAPHT
The method of hiding plaintext in such a way as to hide its substance is called encryption.
Encrypting plaintext results in unreadable gibberish called cipher text
ORIGIN
When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced
every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone
who knew the “shift by 3” rule could decipher his messages.
CAESAR’S CIPHER
ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything up by 3, you get
DEFGHIJKLMNOPQRSTUVWXYZABC where D=A, E=B, F=C, and so on. “SECRET” encrypts as
“VHFUHW
CONVENTIONAL CRYPTGRAPHT
It is very fast. It is especially useful for encrypting data that is not going anywhere.
BUT
Both ends must agree upon a key and keep it secret between themselves.
KEY MANAGEMENT
Being on different physical locations, they must trust a courier (secure communication
medium) to prevent the disclosure of the secret key.
Anyone who overhears or intercepts the key in transit can later read, modify, and forge all
information encrypted or authenticated with that key
MUHAMMAD IMRAN 12
CERTIFICATE MANAGEMENT AND DISTRIBUTION
Public Key Infrastructures
Certification Authority, or CA
◦ CA is authorized to issue certificates to its computer users. (ACA’s role is analogous to a country’s
government’s Passport Office.)
HYBRID APPROACH
MUHAMMAD IMRAN 13
Lesson # 6 INTRODUCTION TO CYBER LAW
DEFINITION
The term “Cyber Law” Refers to all the legal and regulatory aspects of the Internet and its users
MUHAMMAD IMRAN 14
Consultancy
The Subject matter Expert
A blend of Law and Technology
PRE-(ETO), 2002
POST-(ETO), 2002
MUHAMMAD IMRAN 15
Electronic Documentation & Records recognized
Electronic & Digital forms of authentication & identification
Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
Sections
There are 43 sections in this ordinance
It deals with following 8 main areas relating to e-Commerce.
(ETO), 2002
◦ Recognition of Electronic Documents
◦ Electronic Communications
◦ Web Site
◦ Digital Signatures Certification Providers
◦ Stamp Duty
◦ Attestation, certified copies
◦ Jurisdiction
Offences
MUHAMMAD IMRAN 16
◦ Electronic forgery
◦ Unauthorized access to code
◦ Cyber stalking
◦ Cyber Spamming/spoofing
Punishments
Every respective offence under this law has its distinctive punishment which can be
imprisonment or/and fine.
sectionS
Data Damage:
Whoever with intent to illegal gain or cause harm to the public or any person, damages any
data, shall come under this section.
Punishment:
3 years
3 Lac
Electronic fraud:
People for illegal gain get in the way or use any data, electronic system or device or with intent
to deceive any person, which act or omissions is likely to cause damage or harm.
Punishment:
7 years
7 Lac
Electronic Forgery:
Whoever for unlawful gain interferes with data, electronic system or device, with intent to
cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in
unauthentic data that it be considered or acted upon for legal purposes as if it were authentic
Punishment:
Whoever willfully writes, offers, makes available, distributes or transmits malicious code
through an electronic system or device, with intent to cause harm to any electronic system or
resulting in the theft or loss of data commits the offence of malicious code.
Punishment:
5 years
5 Lac
Cyber stalking:
Whoever with intent to harass any person uses computer, computer network, internet, or any
other similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or
indecent language, picture or image.
MUHAMMAD IMRAN 17
Threaten any illegal or immoral act
Take or distribute pict
the offence of cyber stalking.
Punishment:
Spamming:
Illegal electronic messages to any person without the permission of the recipient.
Punishment:
6 month
50,000
Spoofing:
Whoever establishes a website, or sends an electronic message with a fake source intended
to be believed by the recipient or visitor or its electronic system to be an authentic source with intent
to gain unauthorized access or obtain valuable information
Punishment:
3 Years
3 Lac
CRITICISM
MUHAMMAD IMRAN 18
Practically in all issues the government has gone the extra mile to reinvent a new definition,
significantly deviating from the internationally accepted norms.
There seems to be an elaborate play of words within the document
allow room for the regulating body (FIA) to confuse and entrap the innocent people
The FIA, has been given complete and unrestricted control to arrest and confiscate material as
they feel necessary
A very dangerous supposition
Safeguards and Protection
One example of the hideous nature of the bill:
◦ The Government has literally attempted to insert a new word in the English language.
◦ The word TERRORISTIC is without doubt a figment of their imagination vocabulary
◦ Hence they attempt to define the word, quite literally compounding the problem at hand
◦ They have actually defined what real-life terrorism might be
◦ But fail to explain what they mean by the word Cyber in cyber terrorism.
◦ the concern is that there happens to be no clear-cut explanation on how a Cyber Terrorism crime is
committed.
TERRITORIAL jurisdiction
Refers to jurisdiction over cases arising in or involving persons residing within a defined
territory.
CYBER jurisdiction
A virtual approach, defining the cyber world beyond the boundaries of nation states
enforcement of cyber laws uniformly accepted.
MUHAMMAD IMRAN 19
CYBER DISPUTE / CONFLICT
A tense situation between and/or among nation-states and/or organized groups where
unwelcome cyber attacks may result in retaliation
Cyber Security
MUHAMMAD IMRAN 20
others may experience it. The value of a URL or an email address is not solely that the owner can
control it; the value is that other people can connect to it, and can experience it. They may not be able
to control it without the owner’s permission, but – as with real estate in the real world
–
TRADEMARKS
Definition
A symbol, word, or words legally registered or established by use as representing a company
or product.
In cyber world URL’s are more like trademarks
Provides the rights of the owner of a name, symbol, mark for protection to avoid consumer
confusion. This applies specifically in the acquisition of domain names that are appropriate for a
business' trademark. Trademark protection has typically resided at the nation state level, and the
global nature of the internet has caused problems with the use of certain domain names. A secondary
issue is the difference in countries with respect to "first to use" versus "first to file".
Consumer Protection Act, 15 U.S.C. § 1114, 1125(a) (2000)
Cybersquatting: is the behavior of acquiring a domain name with the intention of reselling to a
third party which has a higher perceived value for that name, or to exploit 'traffic' that domain name
generates based on consumers' presumption of the purpose of the domain name.
COPYRIGHT
PATENTS
A patent is a government authority or license conferring a right or title for a set period,
especially the sole right to exclude others from making, using, or selling an invention
Patent Right
Patent Ordinance
Patent Rules
Patents Granted by IPO (Intellectual Property Organization of Pakistan)
Patents Expired
Cyber Security
Cyber Crime
One of the largest computer security companies, Symantec Corporation, defines cybercrime as “Any
crime that is committed using a computer or network, or hardware device”.
MUHAMMAD IMRAN 22
Provide timely information to critical infrastructure owners and government departments about
threats, actual attacks and recovery techniques. A role of Computer Emergency Response Team
(CERT).
To provide on demand state-of-the-art electronic forensic services and cyber investigative to
support local police.
POWER OF OFFICERS
Subject to provisions of Cybercrime Bill 2015 Act, an investigating officer shall have the powers to :
Have access to and inspect the operation of any specified information system.
Use or cause to be used any specified information system to search any specified data
contained in or available to such information system.
Obtain and copy any data, use equipment to make copies and obtain an intelligible output from
an information system.
Have access to or demand any information, code or technology which has the capability of
retransforming or unscrambling encrypted data contained or available to such information system into
readable and comprehensible format or plain version.
Require any person by whom or on whose behalf, the investigating officer has reasonable
cause to believe, any information system has been used to grant access to any data within any
information system within the control of such person.
Require any person having charge of or otherwise concerned with the operation of any
information system to provide him reasonable technical and other assistance as the investigating
officer may require for investigation of an offence under this Act; and
Require any person who is in possession of decryption information of an information system,
device or data under investigation to grant him access to such decryption information necessary to
decrypt data required for the purpose of investigating any such offence.
The policy for retention of Traffic data Under Pakistan Electronic Crime act 2015 is as follows
A service provider shall, within its existing or required technical capability, retain its traffic data
for a minimum period of ninety days or such period as the Authority may notify from time to time and
provide that data to the special investigating agency or the investigating officer whenever so required.
The service providers shall retain the traffic data under sub section (1) by fulfilling all the
requirements of data retention and its originality as provided under sections 5 and 6 of the Electronic
Transaction Ordinance, 2002 (LI of 2002).
Any person who contravenes the provisions of this section shall be punished with
imprisonment for a term which may extend to six months or with fine which may extend to or with
both.
MUHAMMAD IMRAN 23
system is reasonably required for the purpose of a criminal investigation or criminal proceedings with
respect to an offence made out under this Act, the Court may, after recording reasons, order that a
person in control of the information system or data to provide such data or access to such data to the
investigating officer.
The period of a warrant issued under sub-section (1) may be extended beyond seven days if,
on an application, a Court authorizes an extension for a further period of time as may be specified by
the Court.
MUHAMMAD IMRAN 24
Impediments to Evidence Discovery and Analysis
Secure IT Infrastructure
Logical Network Security Segmentation
Network Security Zones
Restricted Zone
Management Zone
Security Event Logging
Network Intrusion Detection and Prevention Systems
Password Policy
Packet Capture
This policy is designed to protect the organizational resources on the network by requiring strong
passwords along with protection of these passwords, and establishing a minimum time between
changes to passwords.
Password Protection
Password Requirements
Choosing Passwords
MUHAMMAD IMRAN 25
Awareness learning needs to enter the 21st Century
49% Intentional attack by external hackers, criminals, terrorists or activists.
45% unintentional Error by Employees or Contractors.
40% Intentional Attacks by Employees or Contractors.
17% Third party suppliers or joint venture partners as a route exploited by cyber criminals.
CYBER AWARENESS
LACK OF CYBER AWARENESS
CHALLENGES
NATIONAL CYBER SECURITY FORUM
ABSENCE OF REGIONAL COOPERATION
DIGITAL RIGHTS AND OBLIGATION
CYBER CENSORSHIP
UNCHECKED HACKTIVISM
CYBER AWARENESS
Cyber security has yet to blip on the national radar.
No political party has included it on its manifesto.
No legislation on cyber issues in the parliament .
Police department, judiciary & lawyers have little/no knowledge and experience in investigating
& prosecuting digital crimes.
No chamber of commerce runs any cyber security course or gives advice to businesses to
secure their digital enterprises.
No policy in preventing import of hardware with embedded technologies.
None of the government agency, electronic media, higher education institute has a cyber
security policy.
Digitally advanced countries organize cyber awareness days/weeks.
MUHAMMAD IMRAN 26
– policy for delegates attending the GGE conferences at the un, internet governance
conferences & international seminars .
– policy guidelines for engagement with ITU.
Defense policy – how to react to various kinds of attacks .
Cyber censorship
Cyber censorship is of what can be accessed, published, or viewed on the Internet. Cyber censorship
can be implemented by:
National policy for handling digital incidents e.g. The YouTube incident .
Stronger filters for pornographic sites .
Efficient mechanisms to control preventing spread of hate literature & operations of prohibited
organizations .
UNCHECKED hacktivism
Uncontrolled hacktivism now forms part of the India Pakistan rivalry.
Independent group of hackers with colorful names like Pakistan cyber army, Indian cyber
army, Pakistan hackers club, Pakhaxors, predators PK, Hindustan hacker’s organization defaces an
Indian or Pakistani website.
Mostly the homepage is littered with poorly- worded patriotic statements and taunts that often
provoke the other nation’s hacking groups to retaliate.
The homepage is defaced and replaced with juvenile comments. Often, these hackers block
visitors’ access to important information. Such acts, of course, lead to more cyber defacements, with
the most “coveted” targets being government websites. A cyber-attack is usually triggered by some
act of violence or aggression from the rival country. Within a span of hours, these groups of hackers
MUHAMMAD IMRAN 27
locate a high-value website that doesn’t have adequate cyber security in place, and gains root access
to the web server by hacking into it.
KTH-SEECS Applied Information Security (AIS) Lab
CHALLENGES
International Cyber Crime
International Jurisdiction
Convention on Cyber Crime
Role of ICANN in Internet Regulation
What is a gTLD?
A gTLD is a generic top level domain. It is the top-level domain of an Internet address,
for example: .com, .NET and .org.
In addition, seven new gTLDs were also selected by ICANN (the Internet Corporation
for Assigned Names and Numbers) on November 16, 2000.
These are:
.aero (for the entire aviation community)
.biz (for business purposes)
.coop (for cooperatives)
.info (unrestricted)
.museum (for museums)
.name (for personal names) .pro (for professionals).
What is a ccTLD?
A ccTLD is a country code top-level domain, for example: .mx for Mexico.
These ccTLDs are administered independently by nationally designated registration
authorities.
There are currently 252 ccTLDs reflected in the database of the Internet Assigned
Numbers Authority (IANA).
WIPO, which has a ccTLD Program, has launched a database portal, facilitating online
searches for information related to country code top level domains.
MUHAMMAD IMRAN 28
International Jurisdiction
International jurisdiction refers to the fact that the courts of a given country will be the
most appropriate to hear and determine a case that has an international dimension.
A dispute has an international dimension where, for example, the parties have different
nationalities or are not resident in the same country.
In such a situation the courts of several countries might have jurisdiction in the case,
and we have what is known as a conflict of jurisdiction.
The rules of international jurisdiction lay down criteria for determining the country whose
courts will have jurisdiction in the case.
MUHAMMAD IMRAN 29
Trade and business communications through electronic means give rise to a number of legal
issues.
For instance if a service were sold over the Internet across countries, in which geographical
location can the transaction be deemed to have occurred? This question may be important from the
point of view of consumer protection and establishing jurisdiction.
Furthermore electronic transactions require electronic contracts and electronic signatures
which have not been provided for in the contract laws of many countries. Most countries that wished
to participate in electronic commerce needed to undertake major legislative reforms in this regard.
worldwide.
Legal and legislative guides and recommendations of great practical value.
Technical assistance in law reform projects.
A report was prepared by the UNCITRAL experts on “Legal value of computer records” and based
on that report the Commission adopted the following recommendations to states to review legal
requirements:
Affecting the use of computer records as evidence in litigation.
That certain trade transactions or trade related documents be in writing.
Necessitate handwritten signature or other paper-based method of authentication on trade related
documents; and
That documents for submission to governments be in writing and manually signed .
TWO-TIRE APPROACH
Some jurisdictions have begun to realize that first two approaches are not necessarily mutually
exclusive, and so have adopted “two tier” approach representing convergence and synthesis of
the first two approaches.
This consolidated approach generally takes the form of enacting laws that prescribe standards for
operation of PKIs, and concurrently take a broad view of what constitutes a valid electronic
signature for legal purposes.
This “two-tier” approach has found increasing support, most notably in the European Union and
Singapore.
MUHAMMAD IMRAN 30
Cyber Laws Situation in Pakistan
Overall the situation of cyber laws is very encouraging in Pakistan and we are ahead of many
developing countries in this respect.
The Analysis of the above laws shows that :
◦ There should be some well-coordinated effort to critically review drafts already prepared.
◦ Prepare drafts of remaining required laws with single focal point in the Federal Government
to avoid conflicts, overlapping and gaps.
MUHAMMAD IMRAN 31