Cyber crime presentation by HuNnY ButT
Upcoming SlideShare
Loading in...5
×
 

Cyber crime presentation by HuNnY ButT

on

  • 249 views

www.facebook.com/hunnybutt9t6

www.facebook.com/hunnybutt9t6

Statistics

Views

Total Views
249
Views on SlideShare
249
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
2

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cyber crime presentation by HuNnY ButT Cyber crime presentation by HuNnY ButT Presentation Transcript

    • •Danish Munir •Muhammad Soban •Tayyab Raza •Muhammad Ali •Ali Raza •Muhammad Waqas •Muhammad Nabeel •Hamza Khalid
    • •Introduction & History •Types of Cyber Crime •Types of viruses •Protect Computers •Cyber Crime in Pakistan •Cyber War •Conclusion
    • Cyber : Crime: The term is defined as computers connected to internet. Illegal activities Computer crime, or cybercrime, refers to any crime that involves a computer and a network It is a criminal activity committed on the Internet
    • offenses against the information technology infrastructure Such conducts includes: • Illegal access • Illegal Transactions • System interference • Data interference • Misuse of devices • Fraud
    • The first spam email took place in 1978 when it was sent out over the Arpanet. The first virus was installed on an Apple computer in 1982 16-year-old student, nicknamed “Data Stream”, arrested by UK police(1994) Travelling documents of NATO forces were hacked in Afghanistan. FBI's e-mail system was hacked (Feb,2005)
    • • • • • • • Hacking Email bombing Data diddling Denial of Service attack Malware attacks Identity Theft
    • hacking refers to finding out weaknesses in an established system and exploiting them. It could involve the power of the internet and specialized programming skills to bypass sophisticated security systems.
    • E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims‟ e-mail account or mail servers. Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.
    • Denial of Service: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources. Malware Attacks: malicious attacks are did through malicious programs , such as a virus, which is specifically designed to disrupt or damage a computer system.
    • Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person‟s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim‟s name. It can result in major financial losses for the victim and even spoil the victim‟s credit history.
    • • Use anti-virus software and firewalls – keep them up to date. • Keep your operating system up to date. • Don't open emails or attachments from unknown sources. • Use hard-to-guess passwords. • Don't share access to your computers with strangers.
    • Back-up your computer data on disks or CDs often. If you have a Wi-Fi network, password protect it. Do not open suspicious files/emails . Verify ActiveX/Java prompts . Avoid using P2P programs . Avoid downloading freeware. If attacked, disconnect the network
    • VS
    • For the Indian and Pakistani kids, cyber space is the new war front and August presumably the appropriate time for their reign of cyber terror. Pakistani Hackers hack Indian websites and in return they hack some of Pakistan‟s.
    • The cyber war between India and Pakistan started in May 1998, when Pakistani hackers attacked Bhabha Atomic Research Center‟s website to somehow proclaim their technological supremacy. In November 2010, a group called „The Indian cyber army defaced a number of important Pakistani national websites, including that of the Pakistan Army in their efforts to avenge the Mumbai attacks. And throughout the year these geniuses continue to hack websites in the name of national pride.
    • It seems evident that the cyber war between Pakistan and India is not state-sponsored, but state agencies have emerged as constant victims of cyber-attacks over the years. cybercrime is now being considered as an effective way of expressing patriotism. Youth of both countries should try to use their efforts in positive sense.