4. Crimes are not to be measured by the issue of events,
but by the bad intensions of men.
The greatest crime do not arise from a want of feeling
for others but from an over sensibility for ourselves
and an over indulgence in our own desire.
11. CYBER CRIMES PERCENTAGE
Financial fraud. 11%
Sabotage of data 17%
Information theft 20%
System penetration from outside 25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet privileges 79%
Viruses 85%
16. CYBERTHREATS
• Cyber Extortion:
Where criminal gangs threat to close down internet based
business if protection money was not paid.
• InformationTheft:
When a computer is infiltrated with purpose of obtaining
information relating user.
• Fraud:
Fraud has many guises on internet, from famous e-mails
promising millions in advance fees to sale of quality goods.
17. CYBER THREATS
•Phishing :
Obtaining of financial information from victim such as a bank
record or credit card details by sending what look like
authentic messages.
•Vishing:
It is also the obtaining financial information but through voice
messages telling the victim to comply immediately.
18. CYBER THREATS IN PAKISTAN
According to report of “The Express Tribune”.
• Cyber Stalking:
The repeated use of electronic communication to frighten someone for example
sending threatening e-mails.
• Forgery(Fraud):
The process of making or creating an alteration of genuine documents with the intent
to defraud.
• Internet Time Theft:
The use by an unauthorized person of the internet hours paid by another person.
• Logic Bomb:
A piece of code intentionally inserted into a program that will set off malicious
function when specified conditions are met.
19. Cyber Threats in Pakistan
• Piracy:
Illegal use or reproduction or distribution of another’s software.
• IdentityTheft :
Identity theft is where cyber criminal steals their victim’s identity and then
transacts usually via internet in name of victim.
21. INTRODUCTION
•The term cyber security is used to refer to the security offered
through online service to protect your online information.
•Security problems almost always stem from a mix of technical,
human and organizational causes.
22. WHATTO UNDERSTAND???
What is the meaning of word “cyber”?
Why there is need of cyber security?
What are the security problems in
cyber field?
How to implement and maintain security of
a cyber field around us?
26. ADVENTAGES
I. Defend from critical attacks
II.Help in browse safe websites
III.Defend from hacks and viruses
IV.It processes all the incoming and outgoing data on
computer
27. OBJECTIVE OF CYBER SECURITY
•To establish rules and measures to use against attacks
over the internet
29. •Unfortunately Pakistan is one of the few countries where
cyber crime laws are still in the pipeline waiting for
implementation.
30. National Response Center for Cyber Crime
(NR3C)
•Cyber crime in Pakistan is growing rapidly with the
exponential growth in usage of mobile phones and
penetration of internet. It is also observed that criminals
are using latest technology to execute their crimes.
These criminals are involved in financial matters,
information stealing and at times even in terrorism.To
counter their activities National Response Center for
Cyber Crime (NR3C) was formed which is able to monitor,
track and catch all such criminals.
31. PECO(Prevention of Electronic Crimes Ordinance)
•On December 31, 2007, the then president Pervez
Musharraf promulgated a law called The Prevention of
Electronic Crimes Ordinance (PECO) 2007 which lapsed
in 2010.The new PECO 2012 is still under debate in the
NationalAssembly and is being tweaked / redrafted by
the Standing Committee.
•The complaint of fake Facebook profiles is the most
rampant complaint where people created fake a profile
of any person.
32.
33. •Use antivirus software
•Insert firewalls
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Never give your full name or address to strangers
•Learn more about privacy
34.
35. CONCLUSION
•Its need of time to spread awareness of cyber security.
•I hope that our presentation will be helpful for our
audience to improve their knowledge about cyber
security and to overcome several security issues on their
computer operations.