SlideShare a Scribd company logo
1 of 35
BSCS
Dawood Faheem Abbasi (05)
Umar Ali (36)
Zohaib Maqbool (51)
•GROUP 01
Crimes are not to be measured by the issue of events,
but by the bad intensions of men.
The greatest crime do not arise from a want of feeling
for others but from an over sensibility for ourselves
and an over indulgence in our own desire.
CYBER CRIME
Content list
 Introduction
 History
 Evolution
 Percentage of cyber crimes
 Categories
 Types
 Cyber criminals
 Cyber threats
 Cyber security
 Safety
 Cyber laws in Pakistan
CYBER CRIME
 Crimes committed using a computer.
 Illegal activity committed on the internet.
DEFINING
•Unlawful act wherein computer is either a tool or a target
or both.
•Acts that are punishable by the information technology
act.
HISTORY
First recorded in 1820
In 1820 Joseph-Marie Jacquard, a textile manufacturer
in France produced the loom.
evolution
• 1977 viruses
• 1995 breaking websites
CYBER CRIMES PERCENTAGE
Financial fraud. 11%
Sabotage of data 17%
Information theft 20%
System penetration from outside 25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet privileges 79%
Viruses 85%
CATEGORIES
•Two:
•Computer as a tool.
•Computer as a target.
TYPES
•Financial crimes
•Sale of illegal articles
•Online gambling
•Email spoofing
•Forgery
•Cyber stalking
•Denial of service attacks
•Information theft
•Email bombing
•Vendalism
•Malware
•Software piracy
•Password cracking
•Viruses
•Physically damaging a system
CRIMINALS
•Kids
•Organized hacktivists
•Disgruntled employees
•Professional hackers
CYBERTHREATS
• Cyber Extortion:
Where criminal gangs threat to close down internet based
business if protection money was not paid.
• InformationTheft:
When a computer is infiltrated with purpose of obtaining
information relating user.
• Fraud:
Fraud has many guises on internet, from famous e-mails
promising millions in advance fees to sale of quality goods.
CYBER THREATS
•Phishing :
Obtaining of financial information from victim such as a bank
record or credit card details by sending what look like
authentic messages.
•Vishing:
It is also the obtaining financial information but through voice
messages telling the victim to comply immediately.
CYBER THREATS IN PAKISTAN
According to report of “The Express Tribune”.
• Cyber Stalking:
The repeated use of electronic communication to frighten someone for example
sending threatening e-mails.
• Forgery(Fraud):
The process of making or creating an alteration of genuine documents with the intent
to defraud.
• Internet Time Theft:
The use by an unauthorized person of the internet hours paid by another person.
• Logic Bomb:
A piece of code intentionally inserted into a program that will set off malicious
function when specified conditions are met.
Cyber Threats in Pakistan
• Piracy:
Illegal use or reproduction or distribution of another’s software.
• IdentityTheft :
Identity theft is where cyber criminal steals their victim’s identity and then
transacts usually via internet in name of victim.
• Cyber security
INTRODUCTION
•The term cyber security is used to refer to the security offered
through online service to protect your online information.
•Security problems almost always stem from a mix of technical,
human and organizational causes.
WHATTO UNDERSTAND???
 What is the meaning of word “cyber”?
 Why there is need of cyber security?
 What are the security problems in
cyber field?
 How to implement and maintain security of
a cyber field around us?
CYBER
•Combining form relating to information technology, the
internet and virtual reality.
NEED
•It is necessary since it helps in security data from thefts
such as theft or misuse, it also safeguards from viruses.
PROBLEMS
Viruses
Hackers
Malware
Password cracking
ADVENTAGES
I. Defend from critical attacks
II.Help in browse safe websites
III.Defend from hacks and viruses
IV.It processes all the incoming and outgoing data on
computer
OBJECTIVE OF CYBER SECURITY
•To establish rules and measures to use against attacks
over the internet
CYBER CRIME LAW IN PAKISTAN
•Unfortunately Pakistan is one of the few countries where
cyber crime laws are still in the pipeline waiting for
implementation.
National Response Center for Cyber Crime
(NR3C)
•Cyber crime in Pakistan is growing rapidly with the
exponential growth in usage of mobile phones and
penetration of internet. It is also observed that criminals
are using latest technology to execute their crimes.
These criminals are involved in financial matters,
information stealing and at times even in terrorism.To
counter their activities National Response Center for
Cyber Crime (NR3C) was formed which is able to monitor,
track and catch all such criminals.
PECO(Prevention of Electronic Crimes Ordinance)
•On December 31, 2007, the then president Pervez
Musharraf promulgated a law called The Prevention of
Electronic Crimes Ordinance (PECO) 2007 which lapsed
in 2010.The new PECO 2012 is still under debate in the
NationalAssembly and is being tweaked / redrafted by
the Standing Committee.
•The complaint of fake Facebook profiles is the most
rampant complaint where people created fake a profile
of any person.
•Use antivirus software
•Insert firewalls
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Never give your full name or address to strangers
•Learn more about privacy
CONCLUSION
•Its need of time to spread awareness of cyber security.
•I hope that our presentation will be helpful for our
audience to improve their knowledge about cyber
security and to overcome several security issues on their
computer operations.

More Related Content

What's hot (20)

Ppt
PptPpt
Ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cyber security
Cyber securityCyber security
Cyber security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 

Similar to Cyber crime.pptx

Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxeasy web solution
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 

Similar to Cyber crime.pptx (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

More from Dawood Faheem Abbasi (11)

First and follow set
First and follow setFirst and follow set
First and follow set
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Report writing
Report writingReport writing
Report writing
 
UML constructs
UML constructs UML constructs
UML constructs
 
Mathematical induction and divisibility rules
Mathematical induction and divisibility rulesMathematical induction and divisibility rules
Mathematical induction and divisibility rules
 
Hashing
HashingHashing
Hashing
 
Features of-RC-quad-copter
Features of-RC-quad-copter Features of-RC-quad-copter
Features of-RC-quad-copter
 
7 cs of communication
7 cs of communication7 cs of communication
7 cs of communication
 
Geography of pakistan
Geography of pakistanGeography of pakistan
Geography of pakistan
 
FET (Field Effect Transistors)
FET (Field Effect Transistors)FET (Field Effect Transistors)
FET (Field Effect Transistors)
 
BJT’s (bipolar junction transistor)
BJT’s (bipolar junction transistor)BJT’s (bipolar junction transistor)
BJT’s (bipolar junction transistor)
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Cyber crime.pptx

  • 1.
  • 2.
  • 3. BSCS Dawood Faheem Abbasi (05) Umar Ali (36) Zohaib Maqbool (51) •GROUP 01
  • 4. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desire.
  • 6. Content list  Introduction  History  Evolution  Percentage of cyber crimes  Categories  Types  Cyber criminals  Cyber threats  Cyber security  Safety  Cyber laws in Pakistan
  • 7. CYBER CRIME  Crimes committed using a computer.  Illegal activity committed on the internet.
  • 8. DEFINING •Unlawful act wherein computer is either a tool or a target or both. •Acts that are punishable by the information technology act.
  • 9. HISTORY First recorded in 1820 In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.
  • 10. evolution • 1977 viruses • 1995 breaking websites
  • 11. CYBER CRIMES PERCENTAGE Financial fraud. 11% Sabotage of data 17% Information theft 20% System penetration from outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 12. CATEGORIES •Two: •Computer as a tool. •Computer as a target.
  • 13. TYPES •Financial crimes •Sale of illegal articles •Online gambling •Email spoofing •Forgery •Cyber stalking •Denial of service attacks
  • 14. •Information theft •Email bombing •Vendalism •Malware •Software piracy •Password cracking •Viruses •Physically damaging a system
  • 16. CYBERTHREATS • Cyber Extortion: Where criminal gangs threat to close down internet based business if protection money was not paid. • InformationTheft: When a computer is infiltrated with purpose of obtaining information relating user. • Fraud: Fraud has many guises on internet, from famous e-mails promising millions in advance fees to sale of quality goods.
  • 17. CYBER THREATS •Phishing : Obtaining of financial information from victim such as a bank record or credit card details by sending what look like authentic messages. •Vishing: It is also the obtaining financial information but through voice messages telling the victim to comply immediately.
  • 18. CYBER THREATS IN PAKISTAN According to report of “The Express Tribune”. • Cyber Stalking: The repeated use of electronic communication to frighten someone for example sending threatening e-mails. • Forgery(Fraud): The process of making or creating an alteration of genuine documents with the intent to defraud. • Internet Time Theft: The use by an unauthorized person of the internet hours paid by another person. • Logic Bomb: A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.
  • 19. Cyber Threats in Pakistan • Piracy: Illegal use or reproduction or distribution of another’s software. • IdentityTheft : Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.
  • 21. INTRODUCTION •The term cyber security is used to refer to the security offered through online service to protect your online information. •Security problems almost always stem from a mix of technical, human and organizational causes.
  • 22. WHATTO UNDERSTAND???  What is the meaning of word “cyber”?  Why there is need of cyber security?  What are the security problems in cyber field?  How to implement and maintain security of a cyber field around us?
  • 23. CYBER •Combining form relating to information technology, the internet and virtual reality.
  • 24. NEED •It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.
  • 26. ADVENTAGES I. Defend from critical attacks II.Help in browse safe websites III.Defend from hacks and viruses IV.It processes all the incoming and outgoing data on computer
  • 27. OBJECTIVE OF CYBER SECURITY •To establish rules and measures to use against attacks over the internet
  • 28. CYBER CRIME LAW IN PAKISTAN
  • 29. •Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.
  • 30. National Response Center for Cyber Crime (NR3C) •Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism.To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.
  • 31. PECO(Prevention of Electronic Crimes Ordinance) •On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in 2010.The new PECO 2012 is still under debate in the NationalAssembly and is being tweaked / redrafted by the Standing Committee. •The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.
  • 32.
  • 33. •Use antivirus software •Insert firewalls •Uninstall unnecessary software •Maintain backup •Check security settings •Never give your full name or address to strangers •Learn more about privacy
  • 34.
  • 35. CONCLUSION •Its need of time to spread awareness of cyber security. •I hope that our presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.