Cyber crime.pptx


Published on

a precise presentation on cyber crime and the laws of cyber crimes in Pakistan..

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber crime.pptx

  1. 1. BSCS Dawood Faheem Abbasi (05) Umar Ali (36) Zohaib Maqbool (51) •GROUP 01
  2. 2. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desire.
  4. 4. Content list  Introduction  History  Evolution  Percentage of cyber crimes  Categories  Types  Cyber criminals  Cyber threats  Cyber security  Safety  Cyber laws in Pakistan
  5. 5. CYBER CRIME  Crimes committed using a computer.  Illegal activity committed on the internet.
  6. 6. DEFINING •Unlawful act wherein computer is either a tool or a target or both. •Acts that are punishable by the information technology act.
  7. 7. HISTORY First recorded in 1820 In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.
  8. 8. evolution • 1977 viruses • 1995 breaking websites
  9. 9. CYBER CRIMES PERCENTAGE Financial fraud. 11% Sabotage of data 17% Information theft 20% System penetration from outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  10. 10. CATEGORIES •Two: •Computer as a tool. •Computer as a target.
  11. 11. TYPES •Financial crimes •Sale of illegal articles •Online gambling •Email spoofing •Forgery •Cyber stalking •Denial of service attacks
  12. 12. •Information theft •Email bombing •Vendalism •Malware •Software piracy •Password cracking •Viruses •Physically damaging a system
  13. 13. CRIMINALS •Kids •Organized hacktivists •Disgruntled employees •Professional hackers
  14. 14. CYBERTHREATS • Cyber Extortion: Where criminal gangs threat to close down internet based business if protection money was not paid. • InformationTheft: When a computer is infiltrated with purpose of obtaining information relating user. • Fraud: Fraud has many guises on internet, from famous e-mails promising millions in advance fees to sale of quality goods.
  15. 15. CYBER THREATS •Phishing : Obtaining of financial information from victim such as a bank record or credit card details by sending what look like authentic messages. •Vishing: It is also the obtaining financial information but through voice messages telling the victim to comply immediately.
  16. 16. CYBER THREATS IN PAKISTAN According to report of “The Express Tribune”. • Cyber Stalking: The repeated use of electronic communication to frighten someone for example sending threatening e-mails. • Forgery(Fraud): The process of making or creating an alteration of genuine documents with the intent to defraud. • Internet Time Theft: The use by an unauthorized person of the internet hours paid by another person. • Logic Bomb: A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.
  17. 17. Cyber Threats in Pakistan • Piracy: Illegal use or reproduction or distribution of another’s software. • IdentityTheft : Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.
  18. 18. • Cyber security
  19. 19. INTRODUCTION •The term cyber security is used to refer to the security offered through online service to protect your online information. •Security problems almost always stem from a mix of technical, human and organizational causes.
  20. 20. WHATTO UNDERSTAND???  What is the meaning of word “cyber”?  Why there is need of cyber security?  What are the security problems in cyber field?  How to implement and maintain security of a cyber field around us?
  21. 21. CYBER •Combining form relating to information technology, the internet and virtual reality.
  22. 22. NEED •It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.
  23. 23. PROBLEMS Viruses Hackers Malware Password cracking
  24. 24. ADVENTAGES I. Defend from critical attacks II.Help in browse safe websites III.Defend from hacks and viruses IV.It processes all the incoming and outgoing data on computer
  25. 25. OBJECTIVE OF CYBER SECURITY •To establish rules and measures to use against attacks over the internet
  27. 27. •Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.
  28. 28. National Response Center for Cyber Crime (NR3C) •Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism.To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.
  29. 29. PECO(Prevention of Electronic Crimes Ordinance) •On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in 2010.The new PECO 2012 is still under debate in the NationalAssembly and is being tweaked / redrafted by the Standing Committee. •The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.
  30. 30. •Use antivirus software •Insert firewalls •Uninstall unnecessary software •Maintain backup •Check security settings •Never give your full name or address to strangers •Learn more about privacy
  31. 31. CONCLUSION •Its need of time to spread awareness of cyber security. •I hope that our presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.