SlideShare a Scribd company logo
1 of 19
Cyber Crime
  Muhammad Irfan
    BT09015
Agenda

    Introduction & History
    Cyber Criminals
    Types of Cyber Crime
    Cyber Crime in Pakistan
    Protect Computers
    Conclusion
Cyber Crime

  Crime => Illegal activities

  Cyber => Characteristic of the
 culture of computers…

 Computer crime, or cybercrime,
 refers to any crime that involves a
 computer and a network


 It is a criminal activity committed on the Internet .
Cyber Crime
    Cyber crime offenses against the information technology
     infrastructure.
               Cyber Crime <=> Cyber Space <=> Net Crime

    Such conducts includes:
         • Illegal access
         • Illegal Transactions
         • System interference
         • Data interference
         • Misuse of devices
         • Fraud
History
  The first spam email took place in 1978 when it was sent out over
 the Arpanet.
  The first virus was installed on an Apple computer in 1982
  16-year-old student, nicknamed “Data Stream”, arrested by UK
 police(1994)
History
 Denial of Service (DoS) attacks by „Mafia Boy‟ on eBay, Yahoo!
 and other popular sites (2000)
  FBI's e-mail system is hacked (Feb,2005)
  Travelling documents of NATO forces were hacked in
 Afghanistan.
Who is Cyber Criminal
Those who are doing crimes by using the
computer as an target or object.

 i.   Children and adolescents b/w 6-18
 ii. Dissatisfied employees
 iii. Professional hackers
 iv. Crackers




  The Invisible Criminals Are Dangerous Than The Visible One…
Types of Cyber Crime

     Hacking
     Email bombing
     Data diddling
     Cyber Stalking
     Cyber Spoofing
     Denial of Service attack
     Malware attacks
     Web jacking …
Virus Attack
Types of Cyber Crime
Cyber Crime in Pakistan
 Cyber Crime Rises Rapidly in Pakistan

 The cyber crimes of multiple kinds in Pakistan have increased
 by five times over the past four years

  According to CCU a branch of FIA

  a.   62 cases were reported to the unit in 2007,
  b.   287 cases in 2008
  c.   Ratio dropped in 2009
  d.   In 2010 more than 312 cases were registered in different
       categories of cyber crimes.
Cyber Crime in Pakistan
 Pakistan‟s Cyber Crime Bill 2007
   Prevention of Electronic Crimes Bill 2007

    a) The bill deals with the electronic crimes included, cyber
       terrorism, criminal access, electronic fraud, electronic
       forgery, misuse of electronic system or electronic device,
       misuse of encryption etc.
    b) Most of the young generation is involved in this
       crime(CCU)
    c) It proposes seven years punishment on charges of
       electronic fraud and electronic forgery and would not
       have the right of bail.
    d) Hacking of ATM card numbers & bank accounts are on
       the rise in paksitan
Are you Protected?
Protect your Computers

 Use anti-virus software and firewalls - keep them up to date
 Keep your operating system up to date
 Don't open emails or attachments from unknown sources
 Use hard-to-guess passwords.
 Don't share access to your computers with strangers
 Back-up your computer data on disks or CDs often
 If you have a Wi-Fi network, password protect it
 Disconnect from the Internet when not in use
 Reevaluate your security on a regular basis
 Never send your credit card number to any site that is not secured.
 Avoid sending any photograph online particularly to strangers.
Conclusion
   User awareness is key to a secure computer/network
       Do not open suspicious files/emails
       Verify ActiveX/Java prompts
       Avoid using P2P programs
       Avoid downloading freeware
       If attacked, disconnect the network. Do not turn off the computer

 So we must pay attention to all those issues and protect the
  World from Cyber Crime
 “If you spend more on coffee than on IT security, you will
  be hacked. What’s more, you deserve to be hacked. —
  White House Cybersecurity Advisor”, Richard Clarke
Cyber Crime
Cyber Crime

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 

Viewers also liked

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber Crime - What is it?
Cyber Crime - What is it?Cyber Crime - What is it?
Cyber Crime - What is it?Sovan Sinha
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to PreventShamiul Lajib
 

Viewers also liked (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime - What is it?
Cyber Crime - What is it?Cyber Crime - What is it?
Cyber Crime - What is it?
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
 

Similar to Cyber Crime

cyber crime
cyber crimecyber crime
cyber crimeMukund10
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityVivek Gupta
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

Similar to Cyber Crime (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 

Recently uploaded

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Cyber Crime

  • 1. Cyber Crime Muhammad Irfan BT09015
  • 2. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers  Conclusion
  • 3. Cyber Crime  Crime => Illegal activities  Cyber => Characteristic of the culture of computers… Computer crime, or cybercrime, refers to any crime that involves a computer and a network It is a criminal activity committed on the Internet .
  • 4. Cyber Crime  Cyber crime offenses against the information technology infrastructure. Cyber Crime <=> Cyber Space <=> Net Crime  Such conducts includes: • Illegal access • Illegal Transactions • System interference • Data interference • Misuse of devices • Fraud
  • 5. History  The first spam email took place in 1978 when it was sent out over the Arpanet.  The first virus was installed on an Apple computer in 1982  16-year-old student, nicknamed “Data Stream”, arrested by UK police(1994)
  • 6. History Denial of Service (DoS) attacks by „Mafia Boy‟ on eBay, Yahoo! and other popular sites (2000)  FBI's e-mail system is hacked (Feb,2005)  Travelling documents of NATO forces were hacked in Afghanistan.
  • 7. Who is Cyber Criminal Those who are doing crimes by using the computer as an target or object. i. Children and adolescents b/w 6-18 ii. Dissatisfied employees iii. Professional hackers iv. Crackers The Invisible Criminals Are Dangerous Than The Visible One…
  • 8. Types of Cyber Crime  Hacking  Email bombing  Data diddling  Cyber Stalking  Cyber Spoofing  Denial of Service attack  Malware attacks  Web jacking …
  • 10. Types of Cyber Crime
  • 11. Cyber Crime in Pakistan Cyber Crime Rises Rapidly in Pakistan The cyber crimes of multiple kinds in Pakistan have increased by five times over the past four years According to CCU a branch of FIA a. 62 cases were reported to the unit in 2007, b. 287 cases in 2008 c. Ratio dropped in 2009 d. In 2010 more than 312 cases were registered in different categories of cyber crimes.
  • 12. Cyber Crime in Pakistan Pakistan‟s Cyber Crime Bill 2007 Prevention of Electronic Crimes Bill 2007 a) The bill deals with the electronic crimes included, cyber terrorism, criminal access, electronic fraud, electronic forgery, misuse of electronic system or electronic device, misuse of encryption etc. b) Most of the young generation is involved in this crime(CCU) c) It proposes seven years punishment on charges of electronic fraud and electronic forgery and would not have the right of bail. d) Hacking of ATM card numbers & bank accounts are on the rise in paksitan
  • 13.
  • 15.
  • 16. Protect your Computers  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords.  Don't share access to your computers with strangers  Back-up your computer data on disks or CDs often  If you have a Wi-Fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Never send your credit card number to any site that is not secured.  Avoid sending any photograph online particularly to strangers.
  • 17. Conclusion  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Verify ActiveX/Java prompts  Avoid using P2P programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  So we must pay attention to all those issues and protect the World from Cyber Crime  “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. — White House Cybersecurity Advisor”, Richard Clarke