•Introduction & History
•Types of Cyber Crime
•Types of viruses
•Cyber Crime in Pakistan
The term is defined as
computers connected to
Computer crime, or
cybercrime, refers to any crime that
involves a computer and a network
It is a criminal activity committed on
against the information
Such conducts includes:
• Illegal access
• Illegal Transactions
• System interference
• Data interference
• Misuse of devices
The first spam email took place in 1978
when it was sent out over the Arpanet.
The first virus was installed on an Apple
computer in 1982
16-year-old student, nicknamed “Data
Stream”, arrested by UK police(1994)
Travelling documents of NATO forces were
hacked in Afghanistan.
FBI's e-mail system was hacked (Feb,2005)
Denial of Service attack
hacking refers to finding out
weaknesses in an established
system and exploiting them. It
could involve the power of the
internet and specialized
programming skills to bypass
Email bombing refers to sending a large
amount of e-mails to the victim resulting
in interruption in the victims‟ e-mail
account or mail servers.
This kind of an attack involves
altering the raw data just before it is
processed by a computer and then
changing it back after the processing
Denial of Service:
This involves flooding computer
resources with more requests than it
can handle. This causes the
resources to crash thereby denying
authorized users the service offered
by the resources.
malicious attacks are did through
malicious programs , such as a
virus, which is specifically designed
to disrupt or damage a computer
This has become a major problem with
people using the Internet for cash
transactions and banking services. In this
cyber crime, a criminal accesses data
about a person‟s bank account, credit
cards, Social Security, debit card and other
sensitive information to siphon money or to
buy things online in the victim‟s name. It
can result in major financial losses for the
victim and even spoil the victim‟s credit
Use anti-virus software
and firewalls – keep
them up to date.
• Keep your operating
system up to date.
• Don't open emails or
• Use hard-to-guess
• Don't share access to
your computers with
Back-up your computer data on
disks or CDs often.
If you have a Wi-Fi network,
password protect it.
Do not open suspicious
Verify ActiveX/Java prompts .
Avoid using P2P programs .
Avoid downloading freeware.
If attacked, disconnect the
For the Indian and
Pakistani kids, cyber
space is the new war
front and August
appropriate time for
their reign of cyber
websites and in
return they hack
some of Pakistan‟s.
The cyber war between India and
Pakistan started in May 1998, when
Pakistani hackers attacked Bhabha
Atomic Research Center‟s website to
somehow proclaim their technological
supremacy. In November 2010, a group
called „The Indian cyber army defaced a
number of important Pakistani national
websites, including that of the Pakistan
Army in their efforts to avenge the
And throughout the year
these geniuses continue to
hack websites in the name of
It seems evident that the cyber
war between Pakistan and India
is not state-sponsored, but state
agencies have emerged as
constant victims of cyber-attacks
over the years. cybercrime is
now being considered as an
effective way of expressing
Youth of both countries should try
to use their efforts in positive
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.