SlideShare ist ein Scribd-Unternehmen logo
1 von 29
CYBER CRIME
INTRODUCTION
• CYBER CRIME ALSO CALLED
COMPUTER CRIME IS ANY ILLEGAL
ACTIVITY THAT INVOLVES A
COMPUTER OR NETWORK
CONNECTED DEVICE.
HISTORY
• FIRST SPAM EMAIL TOOK PLACE IN
1976. IT WAS THE BEGINNING OF
CYBER CRIME.
• FIRST VIRUS WAS INSTALLED ON AN
APPLE COMPUTER IN 1982 BY A HIGH
SCHOOL STUDENT.
CATEGORIES
• HACKING
• IDENTITY THEFT
• FINANACIAL FRAUD
• VIRUSES
• MONEY LAUNDERING
• DENIAL OF SERVICE ATTACK
• SOCIAL TERRORISM
HACKING
• HACKING IS AN ATTEMPT TO EXPLOIT
A COMPUTER SYSTEM OR A PRIVATE
NETWORK INSIDE A COMPUTER.
• IT IS UNAUTHORIZED ACCESS TO OR
CONTROL OVER COMPUTER
SECURITY SYSTEM FOR SOME
PURPOSE.
IDENTITY THEFT
• THE FRAUDULENT PRACTICE OF
USING ANOTHER PERSON’S NAME
AND PERSONAL INFORMATION IN
ORDER TO OBTAIN CREDITS, LOANS
ETC.
FINANCIAL FRAUD
• FINANCIAL FRUAD CAN BE BROADLY
DEFINED AS AN INTENTIONAL ACT OF
DECEPTION INVOVING FINANCIAL
TRANSACTIONS FOR PURPOSE OF
PERSONAL GAIN.
VIRUSES
• A VIRUSE IS A TYPE OF MALICIOUS
SOFTWARE THAT, WHEN EXECUTED,
REPLICATES ITSELF BY MODIFYING
OTHER COMPUTER PROGRAMS AND
INSERTING ITS OWN CODE.
MONEY LAUNDERING
• MONEY LAUNDERING IS THE
PROCESS OF MAKING ILLEGALY
GAINED PROCEEDS(I.E. “DIRTY
MONEY”) APPEAR LEGAL (I.E.
“CLEAN”)
DENIAL OF SERVICE ATTACK
• IT IS A CYBER ATTACK WHERE THE
PREPETRATOR SEEKS TO MAKE A
MACHINE OR NETWORK RESOURCE
UNAVAILABLE TO ITS INTENDED
USERS BY TEMPORARILY OR
INDEFINITELY DISRUPTING SERVICE
OF A HOST CONNECTED TO THE
INTERNET.
SOCIAL TERRORISM
• SOCIAL TERRORISM IS A PROCESS
OF ORGANIZED PHYSICAL AND
MENTAL VIOLENCE DIRECTED
AGAINST THE CITIZEN, SOCIETY AND
THE STATE WHICH AIMS TO CREATE
FEAR AND ATTEMPTS TO ENFORCE A
DIFFERENT RELEGIOUS OR POLITICAL
IDEOLOGY.
PREVENTION
TIPS
SECURE YOUR SMART
PHONE
• ALWAYS USE A STRONG PASSWORD.
• INSTALL SECURITY SOFTWARE.
• DOWNLOAD APPS FROM APPROVED
SOURCES.
• CHECK APPS PERMISSION.
• BE WARY OF LINKS YOU RECEIVE VIA
EMAIL OR TEXT MESSAGES.
SECURE ONLINE BANKING
• NEVER USE SAME PIN FOR MULTIPLE
ACCOUNT.
• NEVER USE CYBER CAFES OR
INTERNET BANKING.
• REGISTER FOR MOBILE ALERTS.
• USING ATM CONCEAL KEYPAD
BEFORE ENTERING PIN CODE.
SECURE FACEBOOK
• USE EXTRA SECURITY FEATURES.
• USE LOGIN NOTIFICATION ALERT.
• ALLOW SPECIFIC INDIVIDUALLS TO
VIEW YOUR CONTENTS.
• CONTROL WHO CAN CONTACT YOU.
• BLOCK YOUR PROFILE FROM SEARCH
ENGINES.
SECURE YOUR BROWSING
• WHAT YOU PUT ONLINE WILL ALWAYS
REMAIN THERE.
• NEVER TRUST ANY FREE ONLINE
CONTENT.
• DON’T PROVIDE PERSONAL
INFORMATION ONLINE TO GET
SOMETHING FREE.
• DON’T CLICK ON LINKS INSIDE EMAILS
CYBER CRIME AND
PAKISTAN
• (SEPT. 21, 2016) ON AUGUST 11, 2016,
PAKISTAN’S LOWER HOUSE, THE
NATIONAL ASSEMBLY, PASSED
A CONTROVERSIAL CYBERCRIME LAW
CALLED THE PREVENTION OF
ELECTRONIC CRIMES ACT, 2016. THE
SENATE HAD UNANIMOUSLY PASSED
THE LAW.
•HOW TO REPORT
AGAINST CYBER
CRIME IN PAKISTAN
• IN PAKISTAN WE CAN REPORT
AGAINST ANY ACTIVITY OF CYBER
CRIME TO “FIA”.
• FOR REPORTING WE CAN VISIT THIS
LINK
HTTP://WWW.NR3C.GOV.PK
• OR CANCALL AT 9911
• HOPE THAT ALL OF YOU
UNDERSTANDS IT VERY
WELL.
•ANY QUESTION?
•OK!
THANKS
•FI AMAN ALLAH

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

Was ist angesagt? (20)

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 

Ähnlich wie Cyber Crime and Prevention Tips

Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
geneveve_
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 

Ähnlich wie Cyber Crime and Prevention Tips (20)

SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime..pptx
Cyber Crime..pptxCyber Crime..pptx
Cyber Crime..pptx
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 

Kürzlich hochgeladen

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Kürzlich hochgeladen (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Cyber Crime and Prevention Tips

  • 2. INTRODUCTION • CYBER CRIME ALSO CALLED COMPUTER CRIME IS ANY ILLEGAL ACTIVITY THAT INVOLVES A COMPUTER OR NETWORK CONNECTED DEVICE.
  • 3. HISTORY • FIRST SPAM EMAIL TOOK PLACE IN 1976. IT WAS THE BEGINNING OF CYBER CRIME. • FIRST VIRUS WAS INSTALLED ON AN APPLE COMPUTER IN 1982 BY A HIGH SCHOOL STUDENT.
  • 4. CATEGORIES • HACKING • IDENTITY THEFT • FINANACIAL FRAUD • VIRUSES • MONEY LAUNDERING • DENIAL OF SERVICE ATTACK • SOCIAL TERRORISM
  • 6. • HACKING IS AN ATTEMPT TO EXPLOIT A COMPUTER SYSTEM OR A PRIVATE NETWORK INSIDE A COMPUTER. • IT IS UNAUTHORIZED ACCESS TO OR CONTROL OVER COMPUTER SECURITY SYSTEM FOR SOME PURPOSE.
  • 8. • THE FRAUDULENT PRACTICE OF USING ANOTHER PERSON’S NAME AND PERSONAL INFORMATION IN ORDER TO OBTAIN CREDITS, LOANS ETC.
  • 10. • FINANCIAL FRUAD CAN BE BROADLY DEFINED AS AN INTENTIONAL ACT OF DECEPTION INVOVING FINANCIAL TRANSACTIONS FOR PURPOSE OF PERSONAL GAIN.
  • 12. • A VIRUSE IS A TYPE OF MALICIOUS SOFTWARE THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  • 14. • MONEY LAUNDERING IS THE PROCESS OF MAKING ILLEGALY GAINED PROCEEDS(I.E. “DIRTY MONEY”) APPEAR LEGAL (I.E. “CLEAN”)
  • 16. • IT IS A CYBER ATTACK WHERE THE PREPETRATOR SEEKS TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE TO ITS INTENDED USERS BY TEMPORARILY OR INDEFINITELY DISRUPTING SERVICE OF A HOST CONNECTED TO THE INTERNET.
  • 18. • SOCIAL TERRORISM IS A PROCESS OF ORGANIZED PHYSICAL AND MENTAL VIOLENCE DIRECTED AGAINST THE CITIZEN, SOCIETY AND THE STATE WHICH AIMS TO CREATE FEAR AND ATTEMPTS TO ENFORCE A DIFFERENT RELEGIOUS OR POLITICAL IDEOLOGY.
  • 20. SECURE YOUR SMART PHONE • ALWAYS USE A STRONG PASSWORD. • INSTALL SECURITY SOFTWARE. • DOWNLOAD APPS FROM APPROVED SOURCES. • CHECK APPS PERMISSION. • BE WARY OF LINKS YOU RECEIVE VIA EMAIL OR TEXT MESSAGES.
  • 21. SECURE ONLINE BANKING • NEVER USE SAME PIN FOR MULTIPLE ACCOUNT. • NEVER USE CYBER CAFES OR INTERNET BANKING. • REGISTER FOR MOBILE ALERTS. • USING ATM CONCEAL KEYPAD BEFORE ENTERING PIN CODE.
  • 22. SECURE FACEBOOK • USE EXTRA SECURITY FEATURES. • USE LOGIN NOTIFICATION ALERT. • ALLOW SPECIFIC INDIVIDUALLS TO VIEW YOUR CONTENTS. • CONTROL WHO CAN CONTACT YOU. • BLOCK YOUR PROFILE FROM SEARCH ENGINES.
  • 23. SECURE YOUR BROWSING • WHAT YOU PUT ONLINE WILL ALWAYS REMAIN THERE. • NEVER TRUST ANY FREE ONLINE CONTENT. • DON’T PROVIDE PERSONAL INFORMATION ONLINE TO GET SOMETHING FREE. • DON’T CLICK ON LINKS INSIDE EMAILS
  • 24. CYBER CRIME AND PAKISTAN • (SEPT. 21, 2016) ON AUGUST 11, 2016, PAKISTAN’S LOWER HOUSE, THE NATIONAL ASSEMBLY, PASSED A CONTROVERSIAL CYBERCRIME LAW CALLED THE PREVENTION OF ELECTRONIC CRIMES ACT, 2016. THE SENATE HAD UNANIMOUSLY PASSED THE LAW.
  • 25. •HOW TO REPORT AGAINST CYBER CRIME IN PAKISTAN
  • 26. • IN PAKISTAN WE CAN REPORT AGAINST ANY ACTIVITY OF CYBER CRIME TO “FIA”. • FOR REPORTING WE CAN VISIT THIS LINK HTTP://WWW.NR3C.GOV.PK • OR CANCALL AT 9911
  • 27. • HOPE THAT ALL OF YOU UNDERSTANDS IT VERY WELL.