0% found this document useful (0 votes)
122 views

Cyber Crime and Cyber Security - An Overview - Ipleaders

The document discusses the history and development of the city of London over three periods of time. It describes how the city began as a small settlement, gradually expanded as more people migrated there, and eventually became one of the largest cities in Europe as trade and commerce flourished. Major events and trends that influenced the growth of London are highlighted for each time period.

Uploaded by

militeripolis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views

Cyber Crime and Cyber Security - An Overview - Ipleaders

The document discusses the history and development of the city of London over three periods of time. It describes how the city began as a small settlement, gradually expanded as more people migrated there, and eventually became one of the largest cities in Europe as trade and commerce flourished. Major events and trends that influenced the growth of London are highlighted for each time period.

Uploaded by

militeripolis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 27

{\rtf1 \ansi \ansicpg1252 \deff0 \stshfdbch2 \stshfloch0 \stshfhich0 \deflang1033 \

deflangfe1033 {\fonttbl {\f0 \froman \fcharset0 \fprq2 {\*\panose


02020603050405020304}Times New Roman{\*\falt Times New Roman};}{\f2 \fnil \
fcharset134 \fprq0 {\*\panose 02010600030101010101}SimSun{\*\falt SimSun};}{\f3 \
fnil \fcharset2 \fprq0 {\*\panose 05000000000000000000}Wingdings{\*\falt
Wingdings};}{\f4 \fswiss \fcharset0 \fprq0 {\*\panose
020f0502020204030204}Calibri{\*\falt Calibri};}{\f5 \fnil \fcharset0 \fprq0 {\*\
panose 020b0606030504020204}Open Sans{\*\falt Open Sans};}{\f6 \fnil \fcharset0 \
fprq0 {\*\panose 020b0604030504040204}Verdana{\*\falt Verdana};}}{\colortbl;\red0\
green0\blue0;\red128\green0\blue0;\red255\green0\blue0;\red0\green128\blue0;\
red128\green128\blue0;\red0\green255\blue0;\red255\green255\blue0;\red17\green17\
blue17;\red34\green34\blue34;\red68\green68\blue68;\red0\green0\blue128;\red128\
green0\blue128;\red0\green128\blue128;\red128\green128\blue128;\red192\green192\
blue192;\red0\green0\blue255;\red255\green0\blue255;\red0\green255\blue255;\red255\
green255\blue255;\red0\green0\blue0;}{\stylesheet {\qj \li0 \ri0 \lisb0 \lisa0 \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \f0 \snext0 \sunhideused \spriority0
Normal;}{\s4 \qj \li0 \ri0 \sb280 \lisb0 \sa290 \lisa0 \sl376 \slmult1 \widctlpar \
keep1 \keepn1 \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \outlinelevel3 \
b1 \fs28 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \f0 \sbasedon0 \snext0
\sunhideused \spriority99 heading 4;}{\*\cs10 \fs24 \rtlch \ltrch \snext10 \
sunhideused \spriority99 Default Paragraph Font;}{\s15 \ql \li0 \ri0 \lisb0 \
lisa0 \nosnaplinegrid \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \tqc \
tx4153 \tqr \tx8306 \itap0 \fs18 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \
loch \f0 \sbasedon0 \snext15 \sqformat \spriority99 footer;}{\s16 \qj \li0 \ri0 \
lisb0 \lisa0 \nosnaplinegrid \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \tqc \tx4153 \tqr \tx8306 \itap0 \fs18 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \f0 \sbasedon0 \snext16 \sqformat \spriority99 header;}}{\*\
latentstyles \lsdstimax260 \lsdlockeddef0 \lsdsemihiddendef1 \lsdunhideuseddef1 \
lsdqformatdef0 \lsdprioritydef99 {\lsdlockedexcept \lsdsemihidden0 \lsdpriority0 \
lsdlocked0 Normal;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 heading 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 heading 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 heading 3;\lsdsemihidden0 \lsdpriority99 \lsdlocked0 heading 4;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 heading 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 heading 6;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 heading 7;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 heading 8;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 heading 9;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 1;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 4;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 6;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 7;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 8;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 index 9;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 1;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 4;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 6;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 7;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 8;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 toc 9;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Normal
Indent;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
footnote text;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 annotation text;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 header;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 footer;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 index heading;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 caption;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 table of figures;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 envelope address;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 envelope
return;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
footnote reference;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 annotation reference;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 line number;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 page number;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 endnote reference;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 endnote
text;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 table
of authorities;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 macro;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 toa heading;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 List;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 List Bullet;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 List Number;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List 2;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List 3;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List 4;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List 5;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List Bullet 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List Bullet
3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List
Bullet 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
List Bullet 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 List Number 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 List Number 3;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 List Number 4;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List Number 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Title;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Closing;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Signature;\
lsdsemihidden0 \lsdpriority99 \lsdlocked0 Default Paragraph Font;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Body Text;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Body Text Indent;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 List
Continue;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
List Continue 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 List Continue 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 List Continue 4;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 List Continue 5;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Message Header;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Subtitle;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Salutation;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Date;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Body Text
First Indent;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Body Text First Indent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Note Heading;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1
\lsdpriority99 \lsdlocked0 Body Text 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1
\lsdpriority99 \lsdlocked0 Body Text 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1
\lsdpriority99 \lsdlocked0 Body Text Indent 2;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Body Text Indent 3;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Block Text;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Hyperlink;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 FollowedHyperlink;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Strong;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Emphasis;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Document
Map;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Plain
Text;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
E-mail Signature;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Normal (Web);\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99
\lsdlocked0 HTML Acronym;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 HTML Address;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1
\lsdpriority99 \lsdlocked0 HTML Cite;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 HTML Code;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 HTML Definition;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 HTML Keyboard;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 HTML Preformatted;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 HTML
Sample;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 HTML
Typewriter;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
HTML Variable;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Normal Table;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99
\lsdlocked0 annotation subject;\lsdpriority99 \lsdlocked0 No List;\lsdpriority99 \
lsdlocked0 1 / a / i;\lsdpriority99 \lsdlocked0 1 / 1.1 / 1.1.1;\lsdpriority99 \
lsdlocked0 Article / Section;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Table Simple 1;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Table Simple 2;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Simple 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
Classic 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Table Classic 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Table Classic 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Table Classic 4;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Table Colorful 1;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Colorful 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
Colorful 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Table Columns 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Table Columns 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Table Columns 3;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Table Columns 4;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Columns 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Grid
1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
Grid 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Table Grid 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Table Grid 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99
\lsdlocked0 Table Grid 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Table Grid 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1
\lsdpriority99 \lsdlocked0 Table Grid 7;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Table Grid 8;\lsdsemihidden0 \lsdunhideused0
\lsdqformat1 \lsdpriority99 \lsdlocked0 Table List 1;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table List 2;\lsdsemihidden0
\lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table List 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table List
4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
List 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Table List 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Table List 7;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99
\lsdlocked0 Table List 8;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Table 3D effects 1;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Table 3D effects 2;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table 3D effects 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
Contemporary;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Table Elegant;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Table Professional;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Table Subtle 1;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Subtle 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Web
1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Web
2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table Web
3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Balloon
Text;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
Grid;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Table
Theme;\lsdpriority99 \lsdlocked0 Placeholder Text;\lsdpriority99 \lsdlocked0 No
Spacing;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Light Shading;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Light List;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Light Grid;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium Shading 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Shading 2;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 1;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid
1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium
Grid 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Medium Grid 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Dark List;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Colorful Shading;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Colorful List;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful Grid;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light Shading Accent 1;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light List
Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Light Grid Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium Shading 1 Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Shading 2 Accent 1;\lsdsemihidden0 \lsdunhideused0
\lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 1 Accent 1;\lsdpriority99 \
lsdlocked0 List Paragraph;\lsdpriority99 \lsdlocked0 Quote;\lsdpriority99 \
lsdlocked0 Intense Quote;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium List 2 Accent 1;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid 1 Accent 1;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid 2 Accent 1;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid
3 Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Dark List Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Colorful Shading Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Colorful List Accent 1;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful Grid Accent 1;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light Shading Accent 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light List
Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Light Grid Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium Shading 1 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Shading 2 Accent 2;\lsdsemihidden0 \lsdunhideused0
\lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 1 Accent 2;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 2 Accent 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid
1 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Medium Grid 2 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Grid 3 Accent 2;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Dark List Accent 2;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful Shading Accent 2;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful
List Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Colorful Grid Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Light Shading Accent 3;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Light List Accent 3;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light Grid Accent 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium
Shading 1 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium Shading 2 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium List 1 Accent 3;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Medium
List 2 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium Grid 1 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Grid 2 Accent 3;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid 3 Accent 3;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Dark List Accent 3;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful
Shading Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Colorful List Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Colorful Grid Accent 3;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Light Shading Accent 4;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light List Accent 4;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light Grid
Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Medium Shading 1 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Shading 2 Accent 4;\lsdsemihidden0 \lsdunhideused0
\lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 1 Accent 4;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 2 Accent 4;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid
1 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Medium Grid 2 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium Grid 3 Accent 4;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Dark List Accent 4;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful Shading Accent 4;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful
List Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Colorful Grid Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Light Shading Accent 5;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Light List Accent 5;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Light Grid Accent 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium
Shading 1 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium Shading 2 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium List 1 Accent 5;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Medium List 2 Accent 5;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid 1 Accent 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid
2 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Medium Grid 3 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Dark List Accent 5;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful Shading Accent 5;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful List Accent 5;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful
Grid Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Light Shading Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Light List Accent 6;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Light Grid Accent 6;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Shading 1 Accent 6;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium
Shading 2 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Medium List 1 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Medium List 2 Accent 6;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid 1 Accent 6;\lsdsemihidden0 \
lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid 2 Accent 6;\
lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0 Medium Grid
3 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \lsdlocked0
Dark List Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority99 \
lsdlocked0 Colorful Shading Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \
lsdpriority99 \lsdlocked0 Colorful List Accent 6;\lsdsemihidden0 \lsdunhideused0 \
lsdqformat1 \lsdpriority99 \lsdlocked0 Colorful Grid Accent 6;}}{\*\listtable {\
list \listtemplateid-1874292969 \listsimple {\listlevel \levelnfc23 \levelnfcn23 \
leveljc0 \leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \
levellegal0 \levelnorestart0 {\leveltext \'01{\uc1 \u61548 ?};}{\levelnumbers ;}\
rtlch \ltrch \dbch \af2 \hich \af3 \loch \f3 \li1620 \lin1620 \fi-360 \jclisttab \
tx1620 }{\listname ;}\listid-1874292969 }{\list \listtemplateid-1596420936 \
listsimple {\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \
levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
leveltext \'02\'00.;}{\levelnumbers \'01;}\li1200 \lin1200 \fi-360 \jclisttab \
tx1200 }{\listname ;}\listid-1596420936 }{\list \listtemplateid-1303319034 \
listsimple {\listlevel \levelnfc23 \levelnfcn23 \leveljc0 \leveljcn0 \levelstartat1
\levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
leveltext \'01{\uc1 \u61548 ?};}{\levelnumbers ;}\rtlch \ltrch \dbch \af2 \hich \
af3 \loch \f3 \li2040 \lin2040 \fi-360 \jclisttab \tx2040 }{\listname ;}\listid-
1303319034 }{\list \listtemplateid-1121032483 \listsimple {\listlevel \levelnfc0 \
levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \
levelindent0 \levellegal0 \levelnorestart0 {\leveltext \'02\'00.;}{\
levelnumbers \'01;}\li1620 \lin1620 \fi-360 \jclisttab \tx1620 }{\listname ;}\
listid-1121032483 }{\list \listtemplateid-749352516 \listsimple {\listlevel \
levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \levelfollow0 \
levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\leveltext \'02\'00.;}{\
levelnumbers \'01;}\li780 \lin780 \fi-360 \jclisttab \tx780 }{\listname ;}\listid-
749352516 }{\list \listtemplateid-629808907 \listsimple {\listlevel \levelnfc23 \
levelnfcn23 \leveljc0 \leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \
levelindent0 \levellegal0 \levelnorestart0 {\leveltext \'01{\uc1 \u61548 ?};}{\
levelnumbers ;}\rtlch \ltrch \dbch \af2 \hich \af3 \loch \f3 \li360 \lin360 \fi-360
\jclisttab \tx360 }{\listname ;}\listid-629808907 }{\list \listtemplateid43621036 \
listhybrid {\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \
levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
leveltext \'02\'00.;}{\levelnumbers \'01;}\rtlch \ltrch \ulc0 }{\listlevel \
levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \levelfollow0 \
levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\levelnumbers ;}}{\
listlevel \levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \
levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
levelnumbers ;}}{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \
levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \levellegal0 \
levelnorestart0 {\levelnumbers ;}}{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \
leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \levellegal0 \
levelnorestart0 {\levelnumbers ;}}{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \
leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \levellegal0 \
levelnorestart0 {\levelnumbers ;}}{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \
leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \levellegal0 \
levelnorestart0 {\levelnumbers ;}}{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \
leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \levellegal0 \
levelnorestart0 {\levelnumbers ;}}{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \
leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \levellegal0 \
levelnorestart0 {\levelnumbers ;}}{\listname ;}\listid43621036 }{\list \
listtemplateid785407569 \listsimple {\listlevel \levelnfc23 \levelnfcn23 \
leveljc0 \leveljcn0 \levelstartat1 \levelfollow0 \levelspace0 \levelindent0 \
levellegal0 \levelnorestart0 {\leveltext \'01{\uc1 \u61548 ?};}{\levelnumbers ;}\
rtlch \ltrch \dbch \af2 \hich \af3 \loch \f3 \li1200 \lin1200 \fi-360 \jclisttab \
tx1200 }{\listname ;}\listid785407569 }{\list \listtemplateid1339783143 \listsimple
{\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \
levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
leveltext \'02\'00.;}{\levelnumbers \'01;}\li2040 \lin2040 \fi-360 \jclisttab \
tx2040 }{\listname ;}\listid1339783143 }{\list \listtemplateid1465958523 \
listsimple {\listlevel \levelnfc0 \levelnfcn0 \leveljc0 \leveljcn0 \levelstartat1 \
levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
leveltext \'02\'00.;}{\levelnumbers \'01;}\li360 \lin360 \fi-360 \jclisttab \
tx360 }{\listname ;}\listid1465958523 }{\list \listtemplateid1749850961 \listsimple
{\listlevel \levelnfc23 \levelnfcn23 \leveljc0 \leveljcn0 \levelstartat1 \
levelfollow0 \levelspace0 \levelindent0 \levellegal0 \levelnorestart0 {\
leveltext \'01{\uc1 \u61548 ?};}{\levelnumbers ;}\rtlch \ltrch \dbch \af2 \hich \
af3 \loch \f3 \li780 \lin780 \fi-360 \jclisttab \tx780 }{\listname ;}\
listid1749850961 }}{\*\listoverridetable {\listoverride \listid43621036 \
listoverridecount0 \ls1 }}{\*\generator WPS Office}{\info {\author USER}{\operator
USER}{\creatim \yr2021 \mo3 \dy19 \hr8 \min58 }{\revtim \yr2021 \mo3 \dy19 \hr10 \
min7 }{\version1 }{\nofpages7 }{\nofwords1978 }{\nofchars11114 }}\paperw12240 \
paperh15840
\margl1080 \margr1080 \margt1440 \margb1440 \gutter0 \ftnbj \aenddoc \jcompress1 \
viewkind1 \viewscale70 \viewscale70 {\*\fchars !),.:;?]\'7d{\uc1 \u168 ?}{\uc1 \
u183 ?}{\uc1 \u711 ?}{\uc1 \u713 ?}{\uc1 \u8213 ?}{\uc1 \u8214 ?}{\uc1 \u8217 ?}{\
uc1 \u8221 ?}{\uc1 \u8230 ?}{\uc1 \u8758 ?}{\uc1 \u12289 ?}{\uc1 \u12290 ?}{\uc1 \
u12291 ?}{\uc1 \u12293 ?}{\uc1 \u12297 ?}{\uc1 \u12299 ?}{\uc1 \u12301 ?}{\uc1 \
u12303 ?}{\uc1 \u12305 ?}{\uc1 \u12309 ?}{\uc1 \u12311 ?}{\uc1 \u65281 ?}{\uc1 \
u65282 ?}{\uc1 \u65287 ?}{\uc1 \u65289 ?}{\uc1 \u65292 ?}{\uc1 \u65294 ?}{\uc1 \
u65306 ?}{\uc1 \u65307 ?}{\uc1 \u65311 ?}{\uc1 \u65341 ?}{\uc1 \u65344 ?}{\uc1 \
u65372 ?}{\uc1 \u65373 ?}{\uc1 \u65374 ?}{\uc1 \u65504 ?}}{\*\lchars ([\'7b{\uc1 \
u183 ?}{\uc1 \u8216 ?}{\uc1 \u8220 ?}{\uc1 \u12296 ?}{\uc1 \u12298 ?}{\uc1 \
u12300 ?}{\uc1 \u12302 ?}{\uc1 \u12304 ?}{\uc1 \u12308 ?}{\uc1 \u12310 ?}{\uc1 \
u65288 ?}{\uc1 \u65294 ?}{\uc1 \u65339 ?}{\uc1 \u65371 ?}{\uc1 \u65505 ?}{\uc1 \
u65509 ?}}\fet2 {\*\ftnsep \pard \plain {\insrsid \chftnsep \par }}{\*\ftnsepc \
pard \plain {\insrsid \chftnsepc \par }}{\*\aftnsep \pard \plain {\insrsid \
chftnsep \par }}{\*\aftnsepc \pard \plain {\insrsid \chftnsepc \par }}\sectd \
sbkpage \pgwsxn12240 \pghsxn15840 \marglsxn1080 \margrsxn1080 \margtsxn1440 \
margbsxn1440 \guttersxn0 \headery720 \footery720 \pgbrdropt0 \sectdefaultcl \
endnhere {\footer \pard \plain \s15 \ql \li0 \ri0 \lisb0 \lisa0 \nosnaplinegrid \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \tqc \tx4153 \tqr \tx8306 \
itap0 \fs18 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs18 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\shp {\*\shpinst \shpleft0
\shptop0 \shpright2880 \shpbottom2880 \shpfhdr0 \shpbxmargin \shpbxignore \
shpbypara \shpbyignore \shpwr3 \shpwrk0 \shpfblwtxt0 \shpz0 \shplid2049 {\sp {\sn
shapeType}{\sv 202}}{\sp {\sn fFlipH}{\sv 0}}{\sp {\sn fFlipV}{\sv 0}}{\sp {\sn
fLockAspectRatio}{\sv 0}}{\sp {\sn dxTextLeft}{\sv 0}}{\sp {\sn dyTextTop}{\sv 0}}
{\sp {\sn dxTextRight}{\sv 0}}{\sp {\sn dyTextBottom}{\sv 0}}{\sp {\sn WrapText}{\
sv 2}}{\sp {\sn anchorText}{\sv 0}}{\sp {\sn txflTextFlow}{\sv 0}}{\sp {\sn
fFitShapeToText}{\sv 1}}{\sp {\sn fLineOK}{\sv 1}}{\sp {\sn fShadowOK}{\sv 1}}{\sp
{\sn fNoFillHitTest}{\sv 1}}{\sp {\sn fFilled}{\sv 0}}{\sp {\sn fLine}{\sv 0}}{\sp
{\sn wzName}{\sv Text Box 1}}{\sp {\sn posh}{\sv 2}}{\sp {\sn posrelh}{\sv 0}}{\sp
{\sn fLayoutInCell}{\sv 1}}{\sp {\sn @unknown\id8405 }{\sv 1}}{\shptxt \pard \plain
\s15 \ql \li0 \ri0 \lisb0 \lisa0 \nosnaplinegrid \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \tqc \tx4153 \tqr \tx8306 \itap0 \fs18 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af0 \loch \af0 {\field {\*\fldinst {\fs18 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 }{\fs18 \kerning2 \rtlch \ltrch \dbch
\af2 \hich \af0 \loch \f0 PAGE \'5c* MERGEFORMAT }}{\fldrslt {\fs18 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 }{\fs18 \kerning2 \rtlch \ltrch \dbch
\af2 \hich \af0 \loch \f0 1}}}{\fs18 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 }{\fs18 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \f0 \par
}}}{\shprslt {\pict }}}}{\fs18 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \
loch \f0 \par }}\pard \plain \qj \li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \
aspnum \adjustright \lin730 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \af0 {\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4
\cf8 Cyber Crime and Cyber Security : An overview}{\fs40 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \qj \li730 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\b0 \fs21 \kerning2 \rtlch
\ltrch \dbch \af5 \hich \af4 \loch \f4 \cf10 By}{\b0 \fs21 \kerning2 \rtlch \
ltrch \dbch \af5 \hich \af4 \loch \f4 \cf1 Diva Rai}{\b0 \fs21 \kerning2 \rtlch \
ltrch \dbch \af5 \hich \af4 \loch \f4 \cf10 - November 13, 2019}{\b0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af5 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj
\li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af5 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj
\li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af5 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj
\li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\i1 \fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 The article deals with
the relation and differences between cyber crime and cybersecurity, elements of
cyber security and different categories of cyber crimes.}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \li894 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin894 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li894 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin894 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \af4 {\shp {\*\shpinst \shpleft465 \shptop90 \
shpright6892 \shpbottom5619 \shpfhdr0 \shpbxcolumn \shpbxignore \shpbypara \
shpbyignore \shpwr3 \shpwrk0 \shpfblwtxt0 \shpz0 \shplid1026 {\sp {\sn shapeType}{\
sv 1}}{\sp {\sn fFlipH}{\sv 0}}{\sp {\sn fFlipV}{\sv 0}}{\sp {\sn fLockAspectRatio}
{\sv 0}}{\sp {\sn WrapText}{\sv 0}}{\sp {\sn anchorText}{\sv 0}}{\sp {\sn
txflTextFlow}{\sv 0}}{\sp {\sn fLineOK}{\sv 1}}{\sp {\sn fShadowOK}{\sv 1}}{\sp {\
sn fillColor}{\sv 16051931}}{\sp {\sn fFilled}{\sv 1}}{\sp {\sn lineStyle}{\sv 0}}
{\sp {\sn fLine}{\sv 0}}{\sp {\sn wzName}{\sv Rectangles 86}}{\sp {\sn
fBehindDocument}{\sv 1}}{\sp {\sn fLayoutInCell}{\sv 1}}}{\shprslt {\pict }}}}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li894 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \
lin894 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Table of
Contents}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \
par }\pard \plain \qj \li894 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin894 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li894 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \
aspalpha \aspnum \adjustright \lin894 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf10 Introduction}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf10 \par }\pard \plain \qj \li894 \ri0 \lisb0 \lisa0 \sl360 \
slmult1 \widctlpar \aspalpha \aspnum \adjustright \lin894 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 2. Relation between Cyber Crime and
Cyber Security}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10
\par }\pard \plain \qj \li1215 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \
aspalpha \aspnum \adjustright \lin1215 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf10 2.1. Cyber Crime}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj \li1215 \ri0 \lisb0 \lisa0 \
sl360 \slmult1 \widctlpar \aspalpha \aspnum \adjustright \lin1215 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 2.2. Cyber Security}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj
\li894 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \aspalpha \aspnum \adjustright
\lin894 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 3. Differences
between Cyber Security and Cyber Crime}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj \li894 \ri0 \lisb0 \lisa0 \sl360 \
slmult1 \widctlpar \aspalpha \aspnum \adjustright \lin894 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 4. Various elements of cyber security}
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 \par }\pard \
plain \qj \li894 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \aspalpha \aspnum \
adjustright \lin894 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10
5. Different Categories of Cyber Crimes}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj \li1520 \ri0 \lisb0 \lisa0 \
sl360 \slmult1 \widctlpar \aspalpha \aspnum \adjustright \lin1520 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 5.0.1. Crime against the
Individuals}{\fs24
\kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \
qj \li1520 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \aspalpha \aspnum \
adjustright \lin1520 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10
5.0.2. Crime against Property}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf10 \par }\pard \plain \qj \li1520 \ri0 \lisb0 \lisa0 \sl360 \
slmult1 \widctlpar \aspalpha \aspnum \adjustright \lin1520 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 5.0.3. Crime against Governments or
Organizations}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf10 \par }\pard \plain \qj \li1520 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \
aspalpha \aspnum \adjustright \lin1520 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf10 5.0.4. Crime against Society}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj \li894 \ri0 \lisb0 \
lisa0 \sl360 \slmult1 \widctlpar \aspalpha \aspnum \adjustright \lin894 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 6. Conclusion}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 \par }\pard \plain \qj
\li894 \ri0 \lisb0 \lisa0 \sl360 \slmult1 \widctlpar \aspalpha \aspnum \adjustright
\lin894 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 7. References}
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf10 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \
li775 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin775 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs40 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Introduction}{\fs40 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \
qj \li11399 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \
lin11399 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \
af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf1 21}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf1 \par }\pard \plain \
qj \li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Cyber crimes are
increasingly becoming social engineering, where cyber criminals invest}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 resources
and time to gain knowledge about technical and scientific aspects of cyber
security}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 and because of that the term \uc1 \u8220 ?cybercrime\uc1 \u8221 ? is often
confused with the term \uc1 \u8220 ?cyber security\uc1 \u8221 ?.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Even though the two are
extremely different and belong to different areas of expertise, yet}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 they are
interrelated with each other. The two are discussed below.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \li730 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning0 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \qj \li730 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning0 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs40 \kerning0 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Relation between Cyber Crime and Cyber}
{\fs40 \kerning0 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf8 }{\fs40 \kerning0 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
expnd3 \expndtw3 \cf8 Securit}{\fs40 \kerning0 \rtlch \ltrch \dbch \af2 \hich \
af4 \loch \f4 \cf8 y}{\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4
\charscalex150 \cf8 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af4 \loch \f4 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \
aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \af0 {\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4
\cf8 Cyber Crime}{\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
cf8 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
Cyber crime is a crime that involves the use of computer devices and the Internet.
It can be}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 committed against an individual, a group of people, government and
private organizations.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 Usually it is intended to harm someone\uc1 \u8217 ?s reputation,
cause physical or mental harm or to}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 benefit from it, for example, monetary benefits,
spreading hate and terror etc. As happened in}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch
\ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 1998, a group of Tamil guerrillas,
known as Tamil Tigers, sent over 800 e-mails to Sri Lankan}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 embassies. The mails
read \uc1 \u8220 ?We are the Internet Black Tigers and we\uc1 \u8217 ?re doing this
to disrupt}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033
\langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 your communications.\uc1 \u8221 ? Intelligence authorities identified it as the
first known attack by}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 terrorists against a country\uc1 \u8217 ?s computer systems.}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \
li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 The main principle of cyber crime
law is punishing unauthorized access or illegal use of}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 computer systems and the
internet with criminal intentions, so that damage and alteration of}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 systems
and data on it can be prevented. However, the largest threat of cybercrime is on
the}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 financial security of an individual as well as the government.}{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0
\lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright
\lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0
{\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs40 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Cyber Security}{\fs40 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \
li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Cyber security is a technique to
protect computers, networks, programs, personal data, etc.,from unauthorized access
and threats. It is an activity by which information and other}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 communication systems
are protected and defended against the unauthorized use or}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 modification or
exploitation of the device. Cyber security is also called information technology}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 security. It includes the techniques of protecting computers, networks,
programs and data}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 from unauthorized access or attacks that can cause damage to them or
exploit them in any}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 way. Basically cyber security is a technical approach to secure
systems from such attacks.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 Good cyber security recognizes all the vulnerabilities and
threats a computer system or}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 network contains. It then identifies the cause of such
vulnerabilities and fixes those}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 vulnerabilities and threats and secures the system.
Strong cyber security programs are based}{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 on a combination of technological and
human elements.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
\par }\pard \plain \qj \li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin730 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8
Differences between Cyber Security and Cyber}{\fs40 \kerning2 \rtlch \ltrch \dbch \
af2 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf8 }{\fs40 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Crime}{\fs40 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 There are certain aspects on which cyber
crime and cyber security can be differentiated upon,they are:}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li1045 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin1045 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\b1 \fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Types of crimes}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 : In cyber
security, the kinds of crimes are where a computer software or}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 hardware or computer
network, is the main target (ransomware, viruses, worms,}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 distributed denial of service
attacks etc).}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
In Cyber crimes, the crimes are where an individual or a group of individuals and
their data is}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 the main target. Governments and organizations can also be the
targets of cyber crimes}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 (cyber bullying, hate speech, child pornography
trafficking, trolling).}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 \par }\pard \plain \qj \li1045 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin1045 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \cf9 Victims}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 : Victims in these two fields are also different. In cyber security,
victims are}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 governments and corporations whereas, in cyber crimes, the range of
victims is rather}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 broad as victims can extend from individuals, families,
organizations, governments and}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4
\loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 corporations.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Area of Study: Both these fields are
studied in different areas. Cyber security is dealt with}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 under Computer science, computer
engineering, and information technology. Coding,}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch
\ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 networking and engineering strategies
are used for making networks more secure.On the other hand, cyber crimes are dealt
with under Criminology, psychology, sociology.}{\fs24 \kerning2 \rtlch \ltrch \dbch
\af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Basically, it is the theoretical
understanding of how and why crime is committed and how it}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6
\hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 can be prevented.}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs40 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Various elements of cyber security}{\
fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \
li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 For a strong cyber security
system certain elements are needed. The elements are as}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 following:}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li730 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\b1 \fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \ls1 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\
listtext \pard \plain \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \
af0 \f2 1.\tab }{\b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \cf9 Application security}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 : Applications play an essential role in business ventures; that is }
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 \tab }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \cf9 why}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 every firm needs to focus on web application security. Web
application security is }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch
\f4 \lang1033 \langnp1033 \cf9 \tab }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 important}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 in order to protect customers, their
information and interests. Application }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 \tab }{\fs24 \kerning2 \rtlch \ltrch
\dbch \af6 \hich \af4 \loch \f4 \cf9 security helps in}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 thwarting any attempts to
violate the authorization limits set by the }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 \tab }{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 security policies of the}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 computer
system or networks.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \cf9 \par }\pard \plain \qj \fi720 \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \ls1 \fs21 \kerning2 \rtlch \ltrch
\dbch \af2 \hich \af0 \loch \af0 {\listtext \pard \plain \fs21 \kerning2 \rtlch \
ltrch \dbch \af2 \hich \af0 \loch \af0 \f2 2.\tab }{\b1 \fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Information securit}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 y: Information includes business
records, personal data, customer\uc1 \u8217 ?s}{\fs24 \kerning2 \rtlch \ltrch \dbch
\af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 data, intellectual property etc; hence,
it is important for a corporation to have strong cyber}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 security for information to
prevent its leakage.Information security involves safeguarding sensitive
information from illegitimate access,usage, or any other kind of damage. This also
ensures that the important data does not get}{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 lost when any issue like natural
disasters, malfunction of system, theft or other potentially}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 damaging situation
arises. The characteristics defining information security are
confidentiality,integrity and availability. Information security also includes Data
Confidentiality, Data integrity,}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 Data availability, and Data authenticity.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li730 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin730 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \ls1 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\
listtext \pard \plain \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \
af0 \f2 3.\tab }{\b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \cf9 Network Security:}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 Network security consists of protecting the usability and
reliability of}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 network and data. A network penetration test is conducted to assess
the}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 vulnerabilities in a}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch
\f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 system and network.It refers to broad range security policies
for thwarting and monitoring unauthorized access,misuse, damage to a computer
system and other network systems. Network security extends}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 coverage to diverse
computer networks, surrounding private and public communication}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 systems among
corporations and organizations.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af4 \loch \f4 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \
aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4
\par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \ls1 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \af0 {\listtext \pard \plain \fs21 \kerning2 \rtlch \ltrch \dbch \
af2 \hich \af0 \loch \af0 \f2 4.\tab }{\b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6
\hich \af4 \loch \f4 \cf9 Disaster Recovery/ Business continuity planning:}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Business continuity
planning (BCP), also}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4
\lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 known as disaster recovery, is about being prepared for any kind of
interference}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 \tab }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6
\hich \af4 \loch \f4 \cf9 or cyber}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \lang1033 \langnp1033
\cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 threat
by identifying threats to the systems on time and analyzing how it may affect the}
{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 operations and methods to counter that threat.}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\b1 \fs24 \kerning2 \rtlch
\ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0
\lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \ls1 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\listtext \pard \plain \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 \f2 5.\tab }{\b1 \
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Operational
security (OPSEC)}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 : Operations security is used to protect organization functions.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 It
identifies important information and assets to track down threats and }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 \
tab }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
vulnerabilities that}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4
\lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 exist in the functional method.}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li1045 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin1045 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \ls1 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\listtext \pard \
plain \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 \f2 6.\tab }{\
b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 End-user
education}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 : It
is important for an organization to train their employees about cyber}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 security
because human error is one of the major causes of data breaches. Every employee}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 should be aware of the common cyber threats and should have the knowledge to
deal with}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 them.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 Training will allow management to accustom themselves with
system users and threats to it}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4
\loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 and user training will help in eliminating resistance to
change and advancements and lead to}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 user scrutiny on a closer level.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \ls0
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \ls1
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\listtext \pard \
plain \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 \f2 7.\tab }{\
b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Leadership
commitment}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 : It
is important to have leadership commitment in organization and}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 corporations in order
to have a strong cyber security program. Without having the leadership}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 in the
team it is complicated to develop, implement and }{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 \tab }{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 maintain the cyber security
processes.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par
}\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright
\lin0 \rin0 \itap0 \ls0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \
af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard
\plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \
lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\
fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Different
Categories of Cyber Crimes}{\fs40 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \
loch \f4 \cf8 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \
aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4
\par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
The cyber crimes may be broadly classified into four groups. They are:}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs32 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \
li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs32 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 Crime against the Individuals}{\
fs32 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \cf8 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \par }\pard \plain \qj \
li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0
\fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Crimes against the individual
refers to those criminal offences which are committed against}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 the will of an
individual to cause certain harm to them like physical or mental harm. Forexample
assault, harassment, kidnapping, and stalking etc. but in cyber crimes the nature
of}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 crimes against individual changes a little bit and takes the form of cyber
stalking,}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 pornography, cyber bulling, child abuse, fraud, cyber threats etc.
Such as cyber defamation is}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 committed to cause harm to the reputation of an individual
in the eyes of other individuals}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 through the cyberspace. A few cyber crimes against
individuals are:}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
1. Harassment via electronic mails.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar
\aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 2. Dissemination of obscene material.}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 3. Cyber-stalking.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 4. Defamation.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 5. Indecent exposure.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 6. Cheating.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 7. Unauthorized
control/access over computer system.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 8. Email spoofing.}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 9. Fraud.}{\fs24 \kerning2 \rtlch \ltrch
\dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0
\widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch
\ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs32 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Crime against Property}{\fs32 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 The second category of
cyber crime is that of cyber crimes against property. With the growth}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 of
international trade, businesses and consumers are increasingly using computer and
the}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 internet to create, transmit and store information in the electronic from
instead of traditional}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 form. This has ultimately lead to certain cyber offences which
affect a person\uc1 \u8217 ?s property. These}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch
\ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 types of cyber crimes include cyber
vandalism to steal information of other organizations or to}{\fs24 \kerning2 \rtlch
\ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 steal someone\uc1 \
u8217 ?s bank details, use software to gain access to an organization\uc1 \u8217 ?s
website etc.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
This is similar to instances of a criminal illegally possessing an individual\uc1 \
u8217 ?s bank or credit card}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 details. In cyber crime, the hacker steals a person\uc1 \
u8217 ?s bank details to gain access to funds, make}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 purchases online or run phishing
scams to get people to give away their information. They}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 could also use any kind of
malicious software to gain access to a web page with confidential}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
information. These types of crimes include vandalism of computers, intellectual
property}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 crimes (Copyright, patented, trademark etc), online threatening etc. Cyber
crimes against}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 property include:}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 1. Computer vandalism.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6
\hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar
\aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 2. Transmitting virus.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6
\hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar
\aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 3. Net-trespass.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 4. Unauthorized access / control over computer system.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 5. Internet thefts.}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 6. Intellectual
Property crimes:}{\fs24 \kerning2 \rtlch \ltrch
\dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \fi720 \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 -}{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Software piracy.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \fi720 \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9
-}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Copyright
infringement.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \
par }\pard \plain \qj \fi720 \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 -}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 Trademark infringement.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs32 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Crime against Governments or
Organizations}{\fs32 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
There are certain cyber crimes committed to threaten the international governments
or}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 organizations. These cyber crimes are mainly committed for the purpose of
spreading terror}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 among people of a particular country. The instigators or perpetrators
of such crimes can be}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 governments of enemy nations, terrorist groups or belligerents
etc. Cyber crimes against}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 Government include cyber attack on the government website,
military website or cyber}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 terrorism etc. In these kinds of cyber crime, cyber
criminals hack governments or}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 organization\uc1 \u8217 ?s websites, government firm,
and military websites and then circulate propaganda}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 or threats or rumors. These
cyber crimes are known as cybercrimes against Governments or}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Organizations.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
Following}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 are}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 the}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 few}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 examples}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 of}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 crime}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch
\f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 against}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 Governments}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 or}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 Organizations:}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 1. Unauthorized access / control over
computer system.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
2. Cyber terrorism against the government or organization.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 3. Possession of unauthorized
information.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
4. Distribution of Pirate software.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs32 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 Crime against Society}{\fs32 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \
widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \
rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \
lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Those cyber crimes which affect the
society at large are known as cyber crimes against}{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch
\ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 society. These unlawful acts are
committed with the intention of causing harm or such}{\fs24 \kerning2 \rtlch \ltrch
\dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 alterations to the cyberspace
which will automatically affect the large number of people of}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 society. The main
target of these types of crimes is public at large and societal interests. The}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 cyber crimes against society include the following
types of crimes:}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
1. Child pornography.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \
f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum
\adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0
\loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 2.
Indecent exposure of polluting the youth financial crimes.}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \
ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \
fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 3. Sale of illegal articles.}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 4. Trafficking.}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 5. Forgery.}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 6. Online gambling.}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 7. Web jacking.}{\
fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \
plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \
rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs32 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 Conclusion}{\fs32 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \
qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \
itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 In conclusion, cyber
security can be considered as a set of guidelines and actions intended and}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 needed to
prevent cyber}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 crime but cyber security is not only limited to that. The two types
of}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 problems differ considerably in terms of what happens and who the victims are,
as well as the}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 academic areas that study them. Therefore, the two, cyber security
and cyber crimes, must be}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 considered as separate issues, with different safeguards
designed to address the different}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 privacy and security issues of each.}{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0
\lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \
lisb0 \lisa0 \widctlpar \aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \
kerning2 \rtlch \ltrch \dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 All sorts of data whether it is
personal, governmental, or corporate need high security. Some}{\fs24 \kerning2 \
rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 of the data, which
belongs to the government defense system, scientific research and}{\fs24 \
kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \
cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9
developments, banks, defense research and development organization, etc. are
highly}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \
langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
cf9 confidential and even small amount of negligence to these data may cause great
damage to}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \
lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \cf9 the whole nation or society at large, therefore, such data need
security at a very high level.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4
\loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 Hence, cyber security is all about protecting government,
organizations and corporate}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \af4 \
loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4 \loch \f4 \cf9 networks, intending to make it difficult for hackers to
find weaknesses and exploit them or}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \dbch \
af6 \hich \af4 \loch \f4 \cf9 threaten them. Cybercrime, on the other hand, tends
to focus more on individuals and families}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6
\hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2 \rtlch \ltrch \
dbch \af6 \hich \af4 \loch \f4 \cf9 online. It is highly needed that the top
leaders of an organization or government should invest}{\fs24 \kerning2 \rtlch \
ltrch \dbch \af6 \hich \af4 \loch \f4 \lang1033 \langnp1033 \cf9 }{\fs24 \kerning2
\rtlch \ltrch \dbch \af6 \hich \af4 \loch \f4 \cf9 in the cyber security measures
to make it strong and impenetrable.}{\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich \
af4 \loch \f4 \cf9 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \hich
\af4 \loch \f4 \cf9 References}{\b1 \fs24 \kerning2 \rtlch \ltrch \dbch \af6 \
hich \af4
\loch \f4 \cf9 \par }\pard \plain \qj \li1045 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin1045 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af4 \loch \f4 \cf1 \par }\pard \plain \qj \li1045 \ri0 \lisb0 \lisa0 \widctlpar \
aspalpha \aspnum \adjustright \lin1045 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af4 \loch \f4 \cf1 \sect }\sectd \sbknone \pgwsxn12240 \pghsxn15840 \marglsxn0 \
margrsxn0 \margtsxn0 \margbsxn0 \guttersxn0 \headery720 \footery720 \pgbrdropt0 \
sectdefaultcl \cols2 \colsx10 \colno1 \colw4690 \colsr10 \colno2 \colw7540 \
endnhere \pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar
\aspalpha \aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \
dbch \af2 \hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af4 \loch \f4 \par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \
aspnum \adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \
hich \af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4
\par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }\pard \plain \qj \li0 \ri0 \lisb0 \lisa0 \widctlpar \aspalpha \aspnum \
adjustright \lin0 \rin0 \itap0 \fs21 \kerning2 \rtlch \ltrch \dbch \af2 \hich \
af0 \loch \af0 {\fs24 \kerning2 \rtlch \ltrch \dbch \af2 \hich \af4 \loch \f4 \
par }}

You might also like