Founder & CEO Profile
Syed Muhammad Irfan
PhD. Scholar Criminology
Cyber Criminologist & Cyber Security Professional
Computer, Cyber-Crime & Cyber-Security Literacy/Competency
Syed Irfan has intellectual knowledge and practical skills regarding all those deviant activities of cyber criminals that are aimed at breaking into a computer or computer network, crime on social media and computer assisted crimes. It gives him understandings of the threat to computer systems by assessment of weak points and vulnerabilities in the cyber world, some are as follows.
Key issues which are disastrous evil to the information security world.
- Essential elements of information security
- Hacking
- Types of Hacking
- Types of Hackers
- Types of Attacks
- Laws regarding Cyber Crimes.
- Methodology and tools of hackers and cyber criminals for gathering information regarding victims and computers.
- He has fair understanding of networks and how it is exploited by cybercriminals. The tools used by them and what countermeasures can be taken.
- He has fine knowledge of Cyber criminals’ methodology regarding their skills to extract network resources, services, users and shares from a system. Their techniques and what countermeasures can be taken.
- How criminals hack a system and its types, such as stenography, steganalysis, password cracking, password attacks and how they cover online tracks.
- Understanding of methodology by hackers to use Trojans, Viruses and worms. The working of virus and malware analysis procedures.
- One of the method used by cybercriminals is sniffing, its types, detecting and prevention.
- He has good knowledge of psychological tactics use by cyber criminals to manipulate people to obtain confidential information which is commonly known as “social engineering”. Effectiveness of social engineering, targets of social engineering, social engineering techniques and its countermeasures are few of its aspects.
- He has good understanding of working of a web server, types of web server attacks, types of web applications and attacks on web applications.
- Understanding of wireless network hacking, types of wireless networks, types of wireless encryption and wired equivalent privacy (WEP) issues.
- How cybercriminals evade IDS, Firewalls and Honeypots. Their issues and countermeasures.
- Learning about mobile attack vectors and hacking android, iOS, and Windows phone OS, and tools related to mobile security.
Specialty Regarding Social Media Forensics
- Investigation of Facebook attacks
- Investigation of Twitter Attacks
- Defamation
- Cyberstalking
- Cyberbullying
- Investigating Pornography
- Impersonation
- Other social media forensics
Specialty Regarding Computer Forensic
- Knowledge of setting up Forensic Laboratory
- Software tools for forensic
- Hardware tools for forensic
- Information gathering from local system
- Information gathering from Network
- Information gathering from search engines
- Information gathering from websites
- Information gathering through standard software
- Information Gathering from social media.
Understanding of Laws and Conventions
- Prevention of Electronic Crime Act (PECA)
- ITU guidelines
- US Government Initiatives to Combat Cybercrime
- China policies to mitigate cybercrimes
- World Intellectual Property Organization (WIPO)
- The Organization for Economic Cooperation and Development (OECD) guidelines
Theoretical background knowledge of Cyber crimes
- Social Learning Theory
- Low self-control Theory
- General Strain Theory
- Aggression Frustration Hypothesis Theory
- Routine Activity Theory
- Situation crime prevention theory
Major Areas of Criminological Studies and Research
Criminal Behavior
Understanding Crime and Criminal Behavior Knowledge help us understand criminality
Theoretical Perspectives on Crime and Criminals
Understanding of Criminological theories not only help in understanding crimes but also effective in mitigation of crimes.
Research Method in Criminology
The process used to collect information and data for the purpose of making critical decisions. Criminological methodology includes publication research, interviews, surveys and other research techniques, and could include both present and historical crime and criminal information
Cybercrimes Law
All countries have a legal foundation as well as Pakistan regarding crimes specially cybercrimes. It is important to understand the foundation such as constitution and the laws passed by the national legislature and other levels of law-making authority.
Organizational Problems and Security Management
In criminology, understanding of companies and organizations are very important. Usually crimes committed against corporation are sophisticatedly planned and executed.
Forensic, Genetics and Psychology
He has well enough knowledge regarding Genetic explanations which propose that offending behavior is inherited as one or more genes predispose people to commit crimes, along with criminal Psychology.
Terrorism, Violence and Control
He has delivered many lectures regarding cyber warfare, cyber terrorism and have initiated to write a research article for being published in Journal soon.
Criminal Investigation
It is his field of interest that teach to ensemble of methods by which crimes are studied and criminals apprehended. He as an investigator seeks to ascertain the methods, motives, and identities of criminals and the identity of victims.
Drug Abuse and Related Crimes
There is a close relationship between drug abuse and crime. Drug abusers and sellers commit crimes to pay for their drugs or promote their drugs business and this inflicts damages to the society.
Organized Crime and Money Laundering
Study of organized crime and money laundering helps him to alert and educate, common men, security professionals, the judiciary, law enforcement and policy makers of the significance and the extent of the use of virtual environments in cyberspace for criminal means, such as fraud and money laundering.
Penology
He has comprehensive study on penology which is a sub-component of criminology that educates the philosophy and practices of various societies in their attempts to mitigate or repress criminal activities, and satisfy public opinion via an appropriate treatment regime for persons convicted of criminal offenses.
Other Criminology Core Studies:
- Mental Health Issues
- Islamic Perspective on Crime and Punishment
- Policing and Security
- Procedure of Evidence in Criminal law
- Use of Statistics and Computer in Criminology
- Child Abuse and juvenile Justice.
- Correctional Institutions in A Social System
Research Project:
He has been employed on research on the subject matter “Cyber Crime varieties, Prevention and Laws”. It is in fact high caliber learning to research and to put efforts on this topic which is being encounter by almost every Law Enforcement Agency who cope with Cybercrime.
Certifications & Courses
- Professional Cyber Security Specialist (220 Hours, 9 months Extensive Course from Aptech, Karachi)
- International certification on Security and Risk assessment (PIM, Karachi)
- Forensic and Evidence collection. (Forensic department, Sindh police)
- Technology Entrepreneurship (IBA, Karachi)
- Marketing Innovation (IBA, Karachi)
- Strategic Time Management
- Strategic Vision Development (Malaysia)
- Bridging Differences and Art of Creating Agreement
- Stress Management
Volunteer Services
- Member Cyber-Security Association Pakistan (CSAP).
- Member Tech-Pakistan
- Member PIM SRM Professionals
- Member PISA, Karachi Chapter.
EDUCATION
PhD. Scholar Criminology
M.Phil in Criminology
Masters in Criminology
EXPERIENCE
- Teaching Associate, Department of Criminology, University of Karachi. Since Jan, 2022
- Running a cyber-security company by the name of INCORRUPTIBLE SOLUTIONS and providing the following services to public and private organizations and individuals as well, Since 2017.
- Cyber security management & consulting services
- Safety and Risk assessment services
- Penetration Testing services
- Physical security consulting services
- Workshops on cyber-crimes awareness to public and private organization
- 4-month course for Cybercrimes and cyber security
- Worked in Management/Partner in Hi-tech Innovative consumer products company from 2000 till now.
- Worked in pharmaceuticals industry since 1995 to 2000.
OTHER INTERESTS
- He has initiated to write his 2nd book on Cyber-Crime and its related topics
- Reading
- Sports
- Travelling
Website: www.incorruptiblesolutions.com
E-mail: contact@incorruptiblesolutions.com