Cyber crime(presentation) by Ahtasham Ali

1,345 views

Published on

Published in: Education, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,345
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
67
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Cyber crime(presentation) by Ahtasham Ali

  1. 1. CYBER CRIME Prepared by: Ahtasham Ali
  2. 2. CONTENT:  What is CYBERCRIME?  Forms of Cybercrime  Report about cybercrime  Implications of Cybercrime  Conclusion
  3. 3. WHAT IS CYBERCRIME ? Cybercrime is defined as: Criminal activity done using computer and internet. this include anything from downloading illegal files to stealing millions of dollars from online banking account.
  4. 4. BACK GROUND HISTORY  1988 first national bank of Chicago is the victim of $70 million dollars.  1987 computer emergency response team created.
  5. 5.  Therefore there are many crimes which are done through internet…
  6. 6. FORMS OF CYBERCRIME Piracy – copying protected software without authorisation
  7. 7. FORMS OF CYBERCRIME Cracking – accessing computer systems without authority to commit a crime.
  8. 8. HACKER Hacker are the programmer they should have the knowledge of advance technology of operating system and program languages.
  9. 9. FORMS OF CYBERCRIME Phreaking – manipulating a phone system using a computer or other device to obtain free telephone calls or charge calls to another account
  10. 10. FORMS OF CYBERCRIME Cyber stalking. The criminal follows the victim by sending emails, entering the chat rooms frequently.
  11. 11. FORMS OF CYBERCRIME Cyber terrorism – is the use of internet based attacks in terrorist activities.
  12. 12. FORMS OF CYBERCRIME Cyber pornography – producing and/or distributing pornography using a computer
  13. 13. FORMS OF CYBERCRIME FINANCIAL CRIMES Includes credit card frauds, money laundering, forgery e.t.c MONEY LAUNDERING Is the process by which large amount of illegally obtain money is given the appearance of having originated form a legimate source
  14. 14. EMAIL BOMBING  Refers to sending a large number of emails to victims resulting in the victims email account crashing.  It is a type of Denial-of-service attacks.
  15. 15. H OW T O R E P O RT A B O U T CYBER CRIME
  16. 16. I M P L I C AT I O N S O F C Y B E RC R I M E In 2008, security vendor AVG conducted a survey into global cybercrime and found that Australia has the highest incidence of cyber crime in the world with more than 39 per cent of Australian’s having been the victim of cyber crime
  17. 17. I M P L I C AT I O N S O F C Y B E RC R I M E A recent report by the Australian Institute of Criminology found that cybercrime is costing Australian businesses more than $600 million annually
  18. 18. CONCLUSION Cyber crime refers to illegal activities that take place online, including fraud, identity theft, computer viruses and worms, cyber stalking, drug trafficking and the like. Most people become victims of these at one time or another.
  19. 19. REFERENCE LIST:  http://poahttp://www.fbi.gov/wanted/cyber  http://propakistani.pk/2011/01/10/a-country-without-cyber-lawpakistan/  http://www.pakistanlaw.net/law-articles/important-aspects-cybercrime-law-pakistan/  http://www.nr3c.gov.pk/contact.html

×