ceid100finalprojectblog
ceid100finalprojectblog
FINAL PROJECT
7 posts
~ CEID100 - Educational Blog About Cybersecurity, Cybercrime & IP ~ (Blogs By: Shagani, Mithuna & Yalini)
Don't wanna be here? Send us removal request.
ceid100finalprojectblog ¡ 2 years ago
Text
Integrating Cybersecurity Within Our Daily Lives (Yalini)
Tumblr media Tumblr media
Images sources from: Kaspersky https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
Through the use of cybersecurity while on the internet, our data is protected from potential breaches by internal and external threats, and ensured to only be accessed by authorized users. Cybersecurity comes in many forms, such as softwares and applications, and developing an understanding of them is essential. Cyber threats often look to exploit vulnerabilities in the safety of our data. The following are several practices to reduce chances of such vulnerability:
Different Passwords For ALL Your Accounts (Cipher, 2021)
To ensure internet safety, create a strong password by:
 Making sure your password is at a minimum of 10 to 12 characters 
Being sure to use a complex arrangements of punctuations, characters such as @#!$% with both lower and upper case letters 
Ensuring to never use the same password as someone else or share your password 
Using a password manager to keep track of passwords.
Having a strong password is crucial for preventing hackers from accessing your info!
Use Endpoint Security and Network Security (Cipher, 2021)
Endpoint security softwares such as AV (anti-virus) protection protects against malicious attacks by preventing Malware and other harmful viruses from accessing your device and corrupting your data. (Kaspersky, 2022)
Ensure to use antivirus programmes from reputable providers, and have only one AV application running on your system. 
Network security such as firewalls helps filter out hackers, viruses, and other harmful Internet activities while deciding which traffic is permitted to access your device. Firewalls also help by shielding your network from threats. (Kaspersky, 2022)
A few well known endpoint and network security brands include McAfee, Kaspersky, and Norton products.
Do Not Use Public Wifi (Cipher, 2021)
Only connect to public wifi while using a VPN, which works by encrypting the communication exchange with your device, making it more challenging for a cybercriminal to access your data. 
Using your personal phone network is a safe alternative if you don’t have a VPN.
Think Before You Click (Cipher, 2021)
Do not clink random links from unauthorized or unrecognized emails, texts or messages and do not click random pop ups as they may contain malware.
0 notes
ceid100finalprojectblog ¡ 2 years ago
Text
Think Before You Click! You Might Be One Click Away from a Cybersecurity attack! (Yalini)
Tumblr media Tumblr media
Images sourced from: Kaspersky https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
Cyber security is the organization and collection of tools, procedures, and structures used to safeguard electronic networks and systems that can access them against situations where de jure and de facto property rights are not aligned (Craigen et al., 1970). The use of computer networks and information technology has become heavily reliant on our society, economy, and essential infrastructures. As our reliance on information technology grows, cyber attacks become more prevalent and dangerous. Studies by Symantec state that cyberattack victims are also rapidly increasing. A study in which 20 000 people from 24 countries was conducted in which 69% of the respondents had experienced a cyberattack at some point in their lives. The study also determined that more than one million cyber attacks occur each day which is equivalent to 14 adult victims per second (Jang-Jaccard & Nepal, 2014).
Cybersecurity breaches occur within our day to day lives through a plethora of ways, predominantly through malware softwares. Malware is any computer software that was created by hackers or cybercriminals to disrupt or harm a legitimate user's machine. Malware is often distributed by an unauthorized email attachment or a download that appears legitimate (Kaspersky, 2022). It can be used by cybercriminals to steal money or launch cyberattacks with political motivations. Softwares such as Trojans and viruses are also used by these attackers as they are cloaked as trustworthy software (Kaspersky, 2022). Cybercriminals utilize deception to get people to download Trojans onto their computers, where they damage the system or gather data (Kaspersky, 2022). Other ways that cybersecurity can be breached through malware software is through uses of ransomware which deletes data, spyware which collects private information, and bonnets which infect devices by enabling attackers to conduct tasks without the user’s permission (Kaspersky, 2022). This emphasizes the necessity for us to be aware of cyber security practices in order to be invulnerable to such cyber attacks.
0 notes
ceid100finalprojectblog ¡ 2 years ago
Text
Digital Copyright Infringement (Mithuna)
Tumblr media
Image Source: Getty 
As our society became more digital, copyright infringement via digital technology has become a prominent issue. Numerous individuals find it easier to infringe copyright through digital media platforms such as YouTube. An example of this would be using music without the permission of the individual who holds copyrights to that music, which frequently happens on platforms such as YouTube. 
Laws surrounding digital copyright infringement vary based on the country. Based on the Canadian Copyright Act, there are two types of infringement, direct or primary infringement and indirect or secondary infringement. Direct or primary is infringement as a result of doing anything that the owner of the copyright only has exclusive rights to. An example of primary or direct infringement is using a sound recording with the copyright owner’s consent. This type of infringement is known to occur without the individual realizing that they are infringing someone’s copyright and work. Indirect or secondary infringement occurs when a work already infringes someone’s copyright, and continues to sell, distribute, and or rent it out without the copyright holder’s consent. In Canada, if an individual’s material is being infringed online, the copyright holder can send a notice to the ISP under the “notice and notice” regime that came into effect in 2015 (Heer et al., 2022). If the notice meets the requirements outlined in the Copyright Act, it sends it to the alleged infringer. The copyright infringement laws in Canada are not as severe as it is in other countries where there is possibility for imprisonment (Heer et al., 2022). 
The lack of Canada’s strict copyright laws are seen as a factor in limiting opportunities for creative industries to recover income (Stephens, 2020). The pandemic exposed the number of flaws present in the copyright system in Canada, with one being the tariffs approved by the Copyright Board are not mandatory for individuals and institutions who use unlicensed content (Stephens, 2020). The copyright laws in Canada need significant work in order to support the creative industry and recover what is rightfully there and attain full credits. 
0 notes
ceid100finalprojectblog ¡ 2 years ago
Text
What is IP? (Mithuna)
Tumblr media
Image Source: Created by Flaticon
Intellectual Property, also commonly referred to as IP, is a work or invention from the creations of the mind. It consists of complex laws and regulations which govern the distribution of such creations, which include ideas, inventions, creativity and expression (World Intellectual Property Organization, 2008). Ideas, expression and symbols are not easy to establish ownership rights like material objects as they are non-rivalrous in nature. However, by establishing an IP regime, it regulates the supply of the valuable goods, whether it be expressive work, ideas and inventions from the creative mind. IP has two main functions, the first by serving the public by providing incentives for the supply of valuables that benefit the community and the second providing assurance of their rightful revenue through exclusive control over their work. 
IP comes in three principle forms: trademark, patent and copyright. The trademark provides the owner of the creative work the exclusive right to the design, words or a combination of both, that enable it to be distinguished from others. A patent provides the owner of the work the ability to prevent others from making, using, or selling the invention (WWorld Intellectual Property Organization, 2008). Lastly, copyright is a type of intellectual property that enables the owner to protect the original work of authorship. They have the exclusive right to make copies of their original work and sell them. The copyrights are automatically provided to the creator of the work, however it can be legally sold to others. 
IP plays a crucial role in the modern economy. It has also been established that it is important to provide intellectual labor connected with creation innovation the importance it requires (Saha et al., 2011). Furthermore, IP and its associated rights (trademark, patent, and copyright) are heavily influenced by the market and its needs, response and the cost involved in IP (Saha et al., 2011). 
0 notes
ceid100finalprojectblog ¡ 2 years ago
Text
References
Canadian Intellectual Property Office. “Government of Canada.” Copyright Theft , Government of Canada , 19 Mar. 2021, https://ised-isde.canada.ca/site/canadian-intellectual-property-office/en/manage-your-intellectual-property/stopping-intellectual-property-theft/copyright-theft.
Cipher. (2021, September 20). 10 personal cyber security tips - #cyberaware. Cipher. Retrieved December 16, 2022, from https://cipher.com/blog/10-personal-cyber-security-tips-cyberaware/ 
Craigen, D., Diakun-Thibault, N., & Purse, R. (1970). Defining cybersecurity. Technology Innovation Management Review. Retrieved from https://www.timreview.ca/article/835 
Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal, 0(0). https://doi.org/10.1177/0032258X221107584
Hawdon, J. Cybercrime: Victimization, Perpetration, and Techniques. Am J Crim Just 46, 837–842 (2021). https://doi.org/10.1007/s12103-021-09652-7
Heer, Christopher, et al. “Copyright Infringement Online.” Heer Law, 10 Feb. 2022, https://www.heerlaw.com/copyright-infringement-online. 
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/10.1016/j.jcss.2014.02.005
Kaspersky. (2022, May 16). What is cyber security? www.kaspersky.com. Retrieved December 16, 2022, from https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security 
Saha, Chandra Nath, and Sanjib Bhattacharya. “Intellectual property rights: An overview and implications in pharmaceutical industry.” Journal of advanced pharmaceutical technology & research vol. 2,2 (2011): 88-93. doi:10.4103/2231-4040.82952
Stephens, Hugh. “Canada's Copyright Laws Are Limiting Opportunities for Creative Industries to Recover Income.” The Globe and Mail, The Globe and Mail, 13 Oct. 2020, https://www.theglobeandmail.com/arts/article-canadas-copyright-laws-are-limiting-opportunities-for-creative/. 
World Intellectual Property Organization. WIPO Intellectual Property Handbook: Policy, Law and Use. WIPO, 2008. 
0 notes
ceid100finalprojectblog ¡ 2 years ago
Text
Cybercrime Statistics (Shagani)
Tumblr media
Image Source: Created by Shagani
The likelihood of becoming a victim of cybercrimes increases yearly as more aspects of our life become digital. Cybercrimes are risky, but they are not frequently random. In addition to being irresponsible online, the majority of victims of these crimes have had their data compromised by international businesses and institutions. They provide criminals with the data they need to use phishing, fraud, and other scams to target their victims. It's crucial to understand the full scope of internet crime for this reason. The data and statistics on cybercrime in the infographic, which has been created with data from 2021, ranges from annual breaches and density to impacts and expenses.
There are various types of cybercrimes that individuals fall victim to. As seen in the infographic, phishing is the most common cybercrime. In 2021, there were a total of 323,972 reported phishing victims. Although, each cybercrime comes at a different cost. Phishing victims on average lost the least amount of money, around $136 per victim, whereas individuals that fell victim to investment fraud lost the most, around $70,811 per victim.
Repeatedly over the years, the group most resilient to cybercrimes was always individuals under 20 years old. Until 2019, approximately 10,000 people under 20 fell victim to cybercrime every year. However, this number increased drastically after the students switched to online studying due to the pandemic. In 2021, this number decreased by 36%, but it is still 51% higher than the pre-pandemic average. The age group most resistant to the pandemic cybercrime increases was seniors (over 60 years old). They were generally the most vulnerable age group to cybercrime with over 92K yearly victims in 2021.
0 notes
ceid100finalprojectblog ¡ 2 years ago
Text
What is Cybercrime? (Shagani)
Tumblr media
Image Source: Freepik
Cybercrime, often known as the use of computers or online networks to perpetrate crimes, includes everything from identity theft and fraud to intimidation and threats (Hawdon, 2021). Even if there is no physical violence, a cybercriminal can launch a malicious attack from another continent onto a laptop or smartphone and cause genuine harm to their victims. Governments, businesses, civic organizations and regular civilians are just a few of the many victims of cybercrime, which is continually developing with new strategies, targets, and technologies. Profit and the hope of someday turning control of your data or gadget into money are these criminals' main driving forces. However, other cybercrime is driven by much darker motives, including hate, sexual assault, and geopolitical disruption. 
The rise in cybercrime in recent years is in many aspects expected. Cybercriminals advance in sophistication alongside technology. It is expected that cybercrime would increase as more people participate in an ever-increasing range of online activities and as more organizations conduct their operations online. Human users are frequently the weakest link in computer security, and depending on the type of cybercrime, their vulnerabilities can be exploited in different ways, turning victims into tools of their own oppression. The use of predictable habits in relation to website use, downloads, password use, and social or professional networking are all examples of exploitation techniques. They also include social engineering and trickery, manipulation of decision-making processes through the perception of urgency or authority, and social engineering. Therefore, victims may place responsibility on themselves or get blame from others, in addition to suffering potentially grave repercussions like financial loss or harm to one's reputation and career. Even after being victimized, only a small percentage of internet users turn their fears about cybercrime, the value of information security, and worries about privacy into preventative actions (Curtis & Oxburgh, 2022).
1 note ¡ View note