You are on page 1of 4

In the name of the Most High, Who is sufficient for us!





SUBMITTED BY: NAME Ayesha Rafiq Fakiha Hassan Rizvi Madiha Maqsood Syed Hassan Tahir Santosh Kumar Singh ROLL NUMBER 25 26 40 55 53


CYBER TERRORIST: A cyber terrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. The cyber terrorist might target the nations air control system, electricity generating companies, or a telecommunications infrastructure. The term cyber warfare, describes an attack whose goal ranges from disabling a governments computer network to crippling a country. Cyber terrorism and cyber warfare usually require a team of highly skilled individuals, millions of dollars and several years of planning. Business and home users must protect their computers from breaches of security and other computer security risks. Some organizations hire individuals previously convicted of computer crimes to help identify security risks and implement safeguards because these individuals know how criminals attempt to breach security. PRIVACY LAWS

The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data. Summary of some of the major U.S government laws concerning privacy is as follows:

Fair Credit Reporting Act (1970): Prohibits credit reporting agencies from releasing credit information to unauthorized people and allows consumers to review their own credit records. Family Education Rights and Privacy Act (1974): Gives students and parents access to school records and limits disclosure of records to unauthorized parties. Privacy Act (1974): Forbids federal agencies from allowing information to be used for a reason other than that for which it was collected. Right to financial Privacy Act (1978): Strictly outlines procedures federal agencies must follow when looking at customers records in banks. Electronic Communications Privacy Act (ECPA) (1986): Provides the same right of privacy protection for postal delivery service and telephone companies to the new forms of electronic communications, such as voice mail, e-mail, and cell phones. Video Privacy Protection Act (1988): Forbids retailers from releasing from releasing or selling video- rental records without customer consent or a court order. Computer Matching and Privacy Protection Act (1988): Regulates the use of government data to determine the eligibility of individuals for federal benefits. Computer Abuse Amendment Act (1994): Amends 1984 act to outlaw the transmission of harmful computer codes such as viruses. Childrens online privacy protection act (COPPA) (1998): Requires web sites protect personal protection of children under 13 years.

Childrens Internet Protection Act (CIPA) (2001): Protects minors from inappropriate content when accessing the internet in schools and libraries. CAN- SPAM Act (2003): Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.