SlideShare a Scribd company logo
1 of 29
•Danish Munir
•Muhammad Soban
•Tayyab Raza
•Muhammad Ali
•Ali Raza
•Muhammad Waqas
•Muhammad Nabeel
•Hamza Khalid
•Introduction & History
•Types of Cyber Crime
•Types of viruses
•Protect Computers
•Cyber Crime in Pakistan
•Cyber War
•Conclusion
Cyber :

Crime:

The term is defined as
computers connected to
internet.

Illegal activities

Computer crime, or
cybercrime, refers to any crime that
involves a computer and a network

It is a criminal activity committed on
the Internet
offenses
against the information
technology infrastructure

Such conducts includes:
• Illegal access
• Illegal Transactions
• System interference
• Data interference
• Misuse of devices
• Fraud
The first spam email took place in 1978
when it was sent out over the Arpanet.
The first virus was installed on an Apple
computer in 1982

16-year-old student, nicknamed “Data
Stream”, arrested by UK police(1994)
Travelling documents of NATO forces were
hacked in Afghanistan.

FBI's e-mail system was hacked (Feb,2005)
•
•
•
•
•
•

Hacking
Email bombing
Data diddling
Denial of Service attack
Malware attacks
Identity Theft
hacking refers to finding out
weaknesses in an established
system and exploiting them. It
could involve the power of the
internet and specialized
programming skills to bypass
sophisticated security
systems.
E-Mail Bombing:
Email bombing refers to sending a large
amount of e-mails to the victim resulting
in interruption in the victims‟ e-mail
account or mail servers.

Data Diddling:
This kind of an attack involves
altering the raw data just before it is
processed by a computer and then
changing it back after the processing
is completed.
Denial of Service:
This involves flooding computer
resources with more requests than it
can handle. This causes the
resources to crash thereby denying
authorized users the service offered
by the resources.

Malware Attacks:
malicious attacks are did through
malicious programs , such as a
virus, which is specifically designed
to disrupt or damage a computer
system.
Identity Theft:
This has become a major problem with
people using the Internet for cash
transactions and banking services. In this
cyber crime, a criminal accesses data
about a person‟s bank account, credit
cards, Social Security, debit card and other
sensitive information to siphon money or to
buy things online in the victim‟s name. It
can result in major financial losses for the
victim and even spoil the victim‟s credit
history.
•

Use anti-virus software
and firewalls – keep
them up to date.
• Keep your operating
system up to date.
• Don't open emails or
attachments from
unknown sources.
• Use hard-to-guess
passwords.
• Don't share access to
your computers with
strangers.
Back-up your computer data on
disks or CDs often.
If you have a Wi-Fi network,
password protect it.
Do not open suspicious
files/emails .
Verify ActiveX/Java prompts .
Avoid using P2P programs .
Avoid downloading freeware.
If attacked, disconnect the
network
VS
For the Indian and
Pakistani kids, cyber
space is the new war
front and August
presumably the
appropriate time for
their reign of cyber
terror.

Pakistani Hackers
hack Indian
websites and in
return they hack
some of Pakistan‟s.
The cyber war between India and
Pakistan started in May 1998, when
Pakistani hackers attacked Bhabha
Atomic Research Center‟s website to
somehow proclaim their technological
supremacy. In November 2010, a group
called „The Indian cyber army defaced a
number of important Pakistani national
websites, including that of the Pakistan
Army in their efforts to avenge the
Mumbai attacks.

And throughout the year
these geniuses continue to
hack websites in the name of
national pride.
It seems evident that the cyber
war between Pakistan and India
is not state-sponsored, but state
agencies have emerged as
constant victims of cyber-attacks
over the years. cybercrime is
now being considered as an
effective way of expressing
patriotism.
Youth of both countries should try
to use their efforts in positive
sense.
Cyber crime presentation by HuNnY ButT

More Related Content

What's hot

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

What's hot (20)

Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 

Similar to Cyber crime presentation by HuNnY ButT

cyber crime
cyber crimecyber crime
cyber crime
Mukund10
 

Similar to Cyber crime presentation by HuNnY ButT (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Cyber crime presentation by HuNnY ButT

  • 1.
  • 2.
  • 3. •Danish Munir •Muhammad Soban •Tayyab Raza •Muhammad Ali •Ali Raza •Muhammad Waqas •Muhammad Nabeel •Hamza Khalid
  • 4. •Introduction & History •Types of Cyber Crime •Types of viruses •Protect Computers •Cyber Crime in Pakistan •Cyber War •Conclusion
  • 5. Cyber : Crime: The term is defined as computers connected to internet. Illegal activities Computer crime, or cybercrime, refers to any crime that involves a computer and a network It is a criminal activity committed on the Internet
  • 6. offenses against the information technology infrastructure Such conducts includes: • Illegal access • Illegal Transactions • System interference • Data interference • Misuse of devices • Fraud
  • 7. The first spam email took place in 1978 when it was sent out over the Arpanet. The first virus was installed on an Apple computer in 1982 16-year-old student, nicknamed “Data Stream”, arrested by UK police(1994) Travelling documents of NATO forces were hacked in Afghanistan. FBI's e-mail system was hacked (Feb,2005)
  • 8. • • • • • • Hacking Email bombing Data diddling Denial of Service attack Malware attacks Identity Theft
  • 9. hacking refers to finding out weaknesses in an established system and exploiting them. It could involve the power of the internet and specialized programming skills to bypass sophisticated security systems.
  • 10. E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims‟ e-mail account or mail servers. Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 11. Denial of Service: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources. Malware Attacks: malicious attacks are did through malicious programs , such as a virus, which is specifically designed to disrupt or damage a computer system.
  • 12. Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person‟s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim‟s name. It can result in major financial losses for the victim and even spoil the victim‟s credit history.
  • 13. • Use anti-virus software and firewalls – keep them up to date. • Keep your operating system up to date. • Don't open emails or attachments from unknown sources. • Use hard-to-guess passwords. • Don't share access to your computers with strangers.
  • 14. Back-up your computer data on disks or CDs often. If you have a Wi-Fi network, password protect it. Do not open suspicious files/emails . Verify ActiveX/Java prompts . Avoid using P2P programs . Avoid downloading freeware. If attacked, disconnect the network
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. VS
  • 25.
  • 26. For the Indian and Pakistani kids, cyber space is the new war front and August presumably the appropriate time for their reign of cyber terror. Pakistani Hackers hack Indian websites and in return they hack some of Pakistan‟s.
  • 27. The cyber war between India and Pakistan started in May 1998, when Pakistani hackers attacked Bhabha Atomic Research Center‟s website to somehow proclaim their technological supremacy. In November 2010, a group called „The Indian cyber army defaced a number of important Pakistani national websites, including that of the Pakistan Army in their efforts to avenge the Mumbai attacks. And throughout the year these geniuses continue to hack websites in the name of national pride.
  • 28. It seems evident that the cyber war between Pakistan and India is not state-sponsored, but state agencies have emerged as constant victims of cyber-attacks over the years. cybercrime is now being considered as an effective way of expressing patriotism. Youth of both countries should try to use their efforts in positive sense.