SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Cyber Crime
Presenters:
Muhammmad Osama Khalid
BSCS
2nd
Semester
Content
• Introduction
• History of Cyber Crime
• What is Attack?
• Flow of Attacks
• Categories of Cyber Crime
• Types of Cyber Crime
• Cyber Security
• Advantages of Cyber Security
• Safety Tips of Cyber Crime
• Cyber Law of Pakistan
• Cyber Crimes and Punishments
• Relation of Cyber Crime with Psychology
• Conclusion
Introduction
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein
the computer either a tool or target or both.
Crime committed using a computer and the internet to
steal data or information.
Illegal imports.
Malicious programs
History of Cyber Crime
• The first recorded cyber crime took place in 1820.
• The first spam email took place in 1976 when it was
sent out over the ARPANT.
• The first virus was installed on an Apple computer in
1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
What is Attack?
Attacks are the actions that compromises the security of
information owned by an organization.
There are two types of attacks:
•Passive Attack
•Active Attack
Passive Attack
Active Attack
Flow of Attacks
Categories of Cyber Crime
We can categorize cyber crime in two ways.
•The computer as a target:
Using the computer to attack other computer, e.g.
Hacking, Virus/Worms attack, Dos attack etc.
•The computer as a weapon:
Using the computer to commit real world crime, e.g.
Cyber Terrorism, Credit Card fraud etc.
Types of Cyber Crime
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
Types of Cyber Crime
• Hacking:
Hacking in simple terms means an illegal intrusion
into a computer system and/or network. It is also
known as Cracking.
• Denial of service attack:
This is an act by the criminals who floods the
bandwidth of the victims network or fills his E-mail
box with spam mail. Many DOS attacks, such as the
ping of death and Tear drop attacks.
Types of Cyber Crime
• VIRUS DISSMINITION :
Malicious software that attaches itself to other
software. VIRUS , WORMS, TROJAN
HORSE,WEB JACKING, E-MAIL BOMBING etc.
• Software Piracy:
Theft of software through the illegal copying of
genuine programs and distribution of products
intended to pass for the original.
Cyber Security
• Cyber Security :
Cyber Security involves protection of sensitive personal and
business information through detection and response to different
online attacks.
• Privacy Policy :
Before submitting your name , e-mail address, on a website look for
the sites privacy policy.
• DISABLE REMOTE CONNECTIVITY:
Some PDA’s and phones are equipped with wireless technologies,
such as Bluetooth, that can be used to connect to other devices or
computers. You should disable these features when they are not in
use.
ADVANTAGES OF CYBER SECURITY
• The cyber security will defend us from critical
attacks.
• It helps us to browse the safe, website.
• Internet Security process all the incoming and
outgoing data on your computer.
• It will defend us from hacks and virus.
SAFETY TIPS TO CYBER CRIME
• Use antivirus software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Update software's as updates are available.
Cyber Law of Pakistan
• Law says that person/individual either directly or
though an automated information system or
automated mechanism or self-executing, adaptive or
autonomous device and whether having temporary or
permanent impact.(page#1-Definations)
Offences and Punishment
• Unauthorized access to information system or data:
Whoever with dishonest intention gains unauthorized
access to any information system or data shall be
punished with imprisonment for a term which may
extend to three months or with fine which may extend
to fifty thousand rupees or with both.
Cyber Crimes and Punishments
Relation of Cyber Crime with Psychology
Criminal Psychology:
Study of criminal mind and what leads a person to
engage in illegal or socially deviant behavior.
How can we relate cyber crime with psychology?
All the cyber advancements are made to make the logic
and technology better but negative minds use it harming
others or use it as crime.
Conclusion
• The key to protecting yourself is being aware.
• Not all hackers are cyber criminals.
• There is a whole other world that exists in
cyberspace… make sure that your information
travels safely.
• Stay Secure, Stay Happy
Cyber crime

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 

Was ist angesagt? (20)

Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie Cyber crime

Ähnlich wie Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
E secuity
E secuityE secuity
E secuity
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber
CyberCyber
Cyber
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

Kürzlich hochgeladen

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Kürzlich hochgeladen (20)

Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 

Cyber crime

  • 1. Cyber Crime Presenters: Muhammmad Osama Khalid BSCS 2nd Semester
  • 2. Content • Introduction • History of Cyber Crime • What is Attack? • Flow of Attacks • Categories of Cyber Crime • Types of Cyber Crime • Cyber Security • Advantages of Cyber Security • Safety Tips of Cyber Crime • Cyber Law of Pakistan • Cyber Crimes and Punishments • Relation of Cyber Crime with Psychology • Conclusion
  • 3. Introduction Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. Crime committed using a computer and the internet to steal data or information. Illegal imports. Malicious programs
  • 4. History of Cyber Crime • The first recorded cyber crime took place in 1820. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. What is Attack? Attacks are the actions that compromises the security of information owned by an organization. There are two types of attacks: •Passive Attack •Active Attack
  • 9. Categories of Cyber Crime We can categorize cyber crime in two ways. •The computer as a target: Using the computer to attack other computer, e.g. Hacking, Virus/Worms attack, Dos attack etc. •The computer as a weapon: Using the computer to commit real world crime, e.g. Cyber Terrorism, Credit Card fraud etc.
  • 10. Types of Cyber Crime • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 11. Types of Cyber Crime • Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as Cracking. • Denial of service attack: This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail. Many DOS attacks, such as the ping of death and Tear drop attacks.
  • 12. Types of Cyber Crime • VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE,WEB JACKING, E-MAIL BOMBING etc. • Software Piracy: Theft of software through the illegal copying of genuine programs and distribution of products intended to pass for the original.
  • 13. Cyber Security • Cyber Security : Cyber Security involves protection of sensitive personal and business information through detection and response to different online attacks. • Privacy Policy : Before submitting your name , e-mail address, on a website look for the sites privacy policy. • DISABLE REMOTE CONNECTIVITY: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 14. ADVANTAGES OF CYBER SECURITY • The cyber security will defend us from critical attacks. • It helps us to browse the safe, website. • Internet Security process all the incoming and outgoing data on your computer. • It will defend us from hacks and virus.
  • 15. SAFETY TIPS TO CYBER CRIME • Use antivirus software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings • Update software's as updates are available.
  • 16. Cyber Law of Pakistan • Law says that person/individual either directly or though an automated information system or automated mechanism or self-executing, adaptive or autonomous device and whether having temporary or permanent impact.(page#1-Definations)
  • 17. Offences and Punishment • Unauthorized access to information system or data: Whoever with dishonest intention gains unauthorized access to any information system or data shall be punished with imprisonment for a term which may extend to three months or with fine which may extend to fifty thousand rupees or with both.
  • 18. Cyber Crimes and Punishments
  • 19. Relation of Cyber Crime with Psychology Criminal Psychology: Study of criminal mind and what leads a person to engage in illegal or socially deviant behavior. How can we relate cyber crime with psychology? All the cyber advancements are made to make the logic and technology better but negative minds use it harming others or use it as crime.
  • 20. Conclusion • The key to protecting yourself is being aware. • Not all hackers are cyber criminals. • There is a whole other world that exists in cyberspace… make sure that your information travels safely. • Stay Secure, Stay Happy