SlideShare a Scribd company logo
1 of 21
Cyber Crime
Presenters:
Muhammmad Osama Khalid
BSCS
2nd
Semester
Content
• Introduction
• History of Cyber Crime
• What is Attack?
• Flow of Attacks
• Categories of Cyber Crime
• Types of Cyber Crime
• Cyber Security
• Advantages of Cyber Security
• Safety Tips of Cyber Crime
• Cyber Law of Pakistan
• Cyber Crimes and Punishments
• Relation of Cyber Crime with Psychology
• Conclusion
Introduction
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein
the computer either a tool or target or both.
Crime committed using a computer and the internet to
steal data or information.
Illegal imports.
Malicious programs
History of Cyber Crime
• The first recorded cyber crime took place in 1820.
• The first spam email took place in 1976 when it was
sent out over the ARPANT.
• The first virus was installed on an Apple computer in
1982 when a high school student, Rich skrenta,
developed the EIK Cloner.
What is Attack?
Attacks are the actions that compromises the security of
information owned by an organization.
There are two types of attacks:
•Passive Attack
•Active Attack
Passive Attack
Active Attack
Flow of Attacks
Categories of Cyber Crime
We can categorize cyber crime in two ways.
•The computer as a target:
Using the computer to attack other computer, e.g.
Hacking, Virus/Worms attack, Dos attack etc.
•The computer as a weapon:
Using the computer to commit real world crime, e.g.
Cyber Terrorism, Credit Card fraud etc.
Types of Cyber Crime
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
Types of Cyber Crime
• Hacking:
Hacking in simple terms means an illegal intrusion
into a computer system and/or network. It is also
known as Cracking.
• Denial of service attack:
This is an act by the criminals who floods the
bandwidth of the victims network or fills his E-mail
box with spam mail. Many DOS attacks, such as the
ping of death and Tear drop attacks.
Types of Cyber Crime
• VIRUS DISSMINITION :
Malicious software that attaches itself to other
software. VIRUS , WORMS, TROJAN
HORSE,WEB JACKING, E-MAIL BOMBING etc.
• Software Piracy:
Theft of software through the illegal copying of
genuine programs and distribution of products
intended to pass for the original.
Cyber Security
• Cyber Security :
Cyber Security involves protection of sensitive personal and
business information through detection and response to different
online attacks.
• Privacy Policy :
Before submitting your name , e-mail address, on a website look for
the sites privacy policy.
• DISABLE REMOTE CONNECTIVITY:
Some PDA’s and phones are equipped with wireless technologies,
such as Bluetooth, that can be used to connect to other devices or
computers. You should disable these features when they are not in
use.
ADVANTAGES OF CYBER SECURITY
• The cyber security will defend us from critical
attacks.
• It helps us to browse the safe, website.
• Internet Security process all the incoming and
outgoing data on your computer.
• It will defend us from hacks and virus.
SAFETY TIPS TO CYBER CRIME
• Use antivirus software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Update software's as updates are available.
Cyber Law of Pakistan
• Law says that person/individual either directly or
though an automated information system or
automated mechanism or self-executing, adaptive or
autonomous device and whether having temporary or
permanent impact.(page#1-Definations)
Offences and Punishment
• Unauthorized access to information system or data:
Whoever with dishonest intention gains unauthorized
access to any information system or data shall be
punished with imprisonment for a term which may
extend to three months or with fine which may extend
to fifty thousand rupees or with both.
Cyber Crimes and Punishments
Relation of Cyber Crime with Psychology
Criminal Psychology:
Study of criminal mind and what leads a person to
engage in illegal or socially deviant behavior.
How can we relate cyber crime with psychology?
All the cyber advancements are made to make the logic
and technology better but negative minds use it harming
others or use it as crime.
Conclusion
• The key to protecting yourself is being aware.
• Not all hackers are cyber criminals.
• There is a whole other world that exists in
cyberspace… make sure that your information
travels safely.
• Stay Secure, Stay Happy
Cyber crime

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber crime

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
E secuity
E secuityE secuity
E secuity
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber
CyberCyber
Cyber
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 

Recently uploaded

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 

Cyber crime

  • 1. Cyber Crime Presenters: Muhammmad Osama Khalid BSCS 2nd Semester
  • 2. Content • Introduction • History of Cyber Crime • What is Attack? • Flow of Attacks • Categories of Cyber Crime • Types of Cyber Crime • Cyber Security • Advantages of Cyber Security • Safety Tips of Cyber Crime • Cyber Law of Pakistan • Cyber Crimes and Punishments • Relation of Cyber Crime with Psychology • Conclusion
  • 3. Introduction Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both. Crime committed using a computer and the internet to steal data or information. Illegal imports. Malicious programs
  • 4. History of Cyber Crime • The first recorded cyber crime took place in 1820. • The first spam email took place in 1976 when it was sent out over the ARPANT. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 5. What is Attack? Attacks are the actions that compromises the security of information owned by an organization. There are two types of attacks: •Passive Attack •Active Attack
  • 9. Categories of Cyber Crime We can categorize cyber crime in two ways. •The computer as a target: Using the computer to attack other computer, e.g. Hacking, Virus/Worms attack, Dos attack etc. •The computer as a weapon: Using the computer to commit real world crime, e.g. Cyber Terrorism, Credit Card fraud etc.
  • 10. Types of Cyber Crime • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Software Piracy
  • 11. Types of Cyber Crime • Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as Cracking. • Denial of service attack: This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail. Many DOS attacks, such as the ping of death and Tear drop attacks.
  • 12. Types of Cyber Crime • VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE,WEB JACKING, E-MAIL BOMBING etc. • Software Piracy: Theft of software through the illegal copying of genuine programs and distribution of products intended to pass for the original.
  • 13. Cyber Security • Cyber Security : Cyber Security involves protection of sensitive personal and business information through detection and response to different online attacks. • Privacy Policy : Before submitting your name , e-mail address, on a website look for the sites privacy policy. • DISABLE REMOTE CONNECTIVITY: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 14. ADVANTAGES OF CYBER SECURITY • The cyber security will defend us from critical attacks. • It helps us to browse the safe, website. • Internet Security process all the incoming and outgoing data on your computer. • It will defend us from hacks and virus.
  • 15. SAFETY TIPS TO CYBER CRIME • Use antivirus software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings • Update software's as updates are available.
  • 16. Cyber Law of Pakistan • Law says that person/individual either directly or though an automated information system or automated mechanism or self-executing, adaptive or autonomous device and whether having temporary or permanent impact.(page#1-Definations)
  • 17. Offences and Punishment • Unauthorized access to information system or data: Whoever with dishonest intention gains unauthorized access to any information system or data shall be punished with imprisonment for a term which may extend to three months or with fine which may extend to fifty thousand rupees or with both.
  • 18. Cyber Crimes and Punishments
  • 19. Relation of Cyber Crime with Psychology Criminal Psychology: Study of criminal mind and what leads a person to engage in illegal or socially deviant behavior. How can we relate cyber crime with psychology? All the cyber advancements are made to make the logic and technology better but negative minds use it harming others or use it as crime.
  • 20. Conclusion • The key to protecting yourself is being aware. • Not all hackers are cyber criminals. • There is a whole other world that exists in cyberspace… make sure that your information travels safely. • Stay Secure, Stay Happy