Cyber crime and security in pakistan

1,755 views
1,066 views

Published on

Published in: Education
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,755
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
99
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Cyber crime and security in pakistan

  1. 1. By: FAHD ABBASI
  2. 2. INTRODUCTION TO CYBER CRIME
  3. 3. HISTORY OF CYBER CRIME  The first spam email took place in 1978 when it was sent out over the Arpanet. Advanced Research Projects Agency Network (ARPANET)  The first virus was installed on an Apple computer in 1982  16-year-old student, nicknamed “Data Stream”, arrested by UK police(1994)
  4. 4. HISTORY  FBI's e-mail system is hacked (Feb,2005)  Travelling documents of NATO forces were hacked in Afghanistan.  Denial of Service (DoS) attacks by ‘Mafia Boy’ on eBay, Yahoo! and other popular sites (2000)
  5. 5. HISTORY • Swedish bank Nordea was hit with possibly the biggest internet fraud in history • £600 000 (1 million USD) was stolen in three months from 250 customer accounts • They obtained the account information through a anti- spam software sent by emails
  6. 6. CYBER CRIME IN PAKISTAN Cyber Crime Rises Rapidly in Pakistan The cyber crimes of multiple kinds in Pakistan have increased by five times over the past four years According to CCU a branch of FIA a. 62 cases were reported to the unit in 2007, b. 287 cases in 2008 c. Ratio dropped in 2009 d. In 2010 more than 312 cases were registered in different categories of cyber crimes.
  7. 7. Pakistan’s Cyber Crime Bill 2007 Prevention of Electronic Crimes Bill 2007
  8. 8. DAWN NEWS Survay REPORT
  9. 9. TYPE OF INTERNET CRIME Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking
  10. 10. TYPE OF CYBER CRIME E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers. Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed. Salami Attacks: These attacks are used for the commission of financial crimes. A bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer Denial of Service: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.
  11. 11. CYBER CRIME Crime against persons Crime against Government Crime against property
  12. 12. TIPS FOR CYBER CRIME
  13. 13. CONCLUSION

×