Top Banner
35
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime.pptx
Page 2: Cyber crime.pptx
Page 3: Cyber crime.pptx

BSCS

Dawood Faheem Abbasi (05)Umar Ali (36)Zohaib Maqbool (51)

•GROUP 01

Page 4: Cyber crime.pptx

Crimes are not to be measured by the issue of events, but by the bad intensions of men.

The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves

and an over indulgence in our own desire.

Page 5: Cyber crime.pptx

CYBER CRIME

Page 6: Cyber crime.pptx

Content list Introduction

History

Evolution

Percentage of cyber crimes

Categories

Types

Cyber criminals

Cyber threats

Cyber security

Safety

Cyber laws in Pakistan

Page 7: Cyber crime.pptx

CYBER CRIME

Crimes committed using a computer.

Illegal activity committed on the internet.

Page 8: Cyber crime.pptx

DEFINING

•Unlawful act wherein computer is either a tool or a target or both.

• Acts that are punishable by the information technology act.

Page 9: Cyber crime.pptx

HISTORY

First recorded in 1820

In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.

Page 10: Cyber crime.pptx

evolution

• 1977 viruses

• 1995 breaking websites

Page 11: Cyber crime.pptx

CYBER CRIMES PERCENTAGEFinancial fraud. 11%

Sabotage of data 17%

Information theft 20%

System penetration from outside 25%

Denial of service 27%

Unauthorized access by insiders 71%

Employee abuse of internet privileges 79%

Viruses 85%

Page 12: Cyber crime.pptx

CATEGORIES

•Two:

•Computer as a tool.

•Computer as a target.

Page 13: Cyber crime.pptx

TYPES

•Financial crimes

•Sale of illegal articles

•Online gambling

•Email spoofing

•Forgery

•Cyber stalking

•Denial of service attacks

Page 14: Cyber crime.pptx

• Information theft

• Email bombing

• Vendalism

•Malware

• Software piracy

• Password cracking

• Viruses

• Physically damaging a system

Page 15: Cyber crime.pptx

CRIMINALS

• Kids

•Organized hacktivists

•Disgruntled employees

• Professional hackers

Page 16: Cyber crime.pptx

CYBER THREATS• Cyber Extortion:

Where criminal gangs threat to close down internet based business if protection money was not paid.

• Information Theft:

When a computer is infiltrated with purpose of obtaining information relating user.

• Fraud:

Fraud has many guises on internet, from famous e-mails promising millions in advance fees to sale of quality goods.

Page 17: Cyber crime.pptx

CYBER THREATS

• Phishing :

Obtaining of financial information from victim such as a bank

record or credit card details by sending what look like

authentic messages.

•Vishing:

It is also the obtaining financial information but through voice

messages telling the victim to comply immediately.

Page 18: Cyber crime.pptx

CYBER THREATS IN PAKISTAN

According to report of “The Express Tribune”.

• Cyber Stalking:

The repeated use of electronic communication to frighten someone for example sending threatening e-mails.

• Forgery(Fraud):

The process of making or creating an alteration of genuine documents with the intent to defraud.

• Internet Time Theft:

The use by an unauthorized person of the internet hours paid by another person.

• Logic Bomb:

A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.

Page 19: Cyber crime.pptx

Cyber Threats in Pakistan

• Piracy:

Illegal use or reproduction or distribution of another’s software.

• Identity Theft :

Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.

Page 20: Cyber crime.pptx

• Cyber security

Page 21: Cyber crime.pptx

INTRODUCTION

• The term cyber security is used to refer to the security offered through online service to protect your online information.

• Security problems almost always stem from a mix of technical,human and organizational causes.

Page 22: Cyber crime.pptx

WHAT TO UNDERSTAND???

What is the meaning of word “cyber”?

Why there is need of cyber security?

What are the security problems in cyber field?

How to implement and maintain security of a cyber field around us?

Page 23: Cyber crime.pptx

CYBER

• Combining form relating to information technology, the internet and virtual reality.

Page 24: Cyber crime.pptx

NEED

• It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.

Page 25: Cyber crime.pptx

PROBLEMS

Viruses

Hackers

Malware

Password cracking

Page 26: Cyber crime.pptx

ADVENTAGES

I. Defend from critical attacks

II. Help in browse safe websites

III.Defend from hacks and viruses

IV.It processes all the incoming and outgoing data on computer

Page 27: Cyber crime.pptx

OBJECTIVE OF CYBER SECURITY

• To establish rules and measures to use against attacks over the internet

Page 28: Cyber crime.pptx

CYBER CRIME LAW IN PAKISTAN

Page 29: Cyber crime.pptx

•Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.

Page 30: Cyber crime.pptx

National Response Center for Cyber Crime (NR3C)

• Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism. To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.

Page 31: Cyber crime.pptx

PECO(Prevention of Electronic Crimes Ordinance)

•On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in 2010. The new PECO 2012 is still under debate in the National Assembly and is being tweaked / redrafted by the Standing Committee.

• The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.

Page 32: Cyber crime.pptx
Page 33: Cyber crime.pptx

•Use antivirus software

• Insert firewalls

•Uninstall unnecessary software

•Maintain backup

• Check security settings

•Never give your full name or address to strangers

• Learn more about privacy

Page 34: Cyber crime.pptx
Page 35: Cyber crime.pptx

CONCLUSION

• Its need of time to spread awareness of cyber security.

• I hope that our presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.