SlideShare a Scribd company logo
1 of 16
Cyber Crime & Security
TECHNICAL WRITING & PRESENTATION SKILLS
PREPARED BY :- SOHAIL AKBAR
Introduction: .[1]
 Cybercrime, or computer-oriented crime, is crime that involves a computer
and a network.
 We can categorized the cyber crime in two ways;
 The computer as a target :- using a computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos attack etc.
 The computer as a weapon :- using a computer to commit real world
crime e.g. cyber terrorism, credit card fraud and pornography etc.
1
History [4]
 The first recorded cybercrime took place in 1820.
 The first spam E-mail took place in 1976, when it was sent out over the
ARPANET.
 The first virus was installed on Apple computer in 1982 when a high school
student Rich Skrenta developed a EIK Cloner.
 DOS attacked by “Mafia Boy”, Yahoo & other popular sites in 2000.
 FBI’s system was hacked in Feb-2005.
 Travelling documents of NATO (North Atlantic Treaty
Organization) forces were hacked in Afghanistan.
2
CYBER CRIME IN PAKISTAN [3]
Cyber Crime Rises Rapidly in Pakistan
 The cyber crimes of multiple kinds in Pakistan have
increased by five times over the past four years
 According to FIA ;
a. 641 cases were reported to the unit in 2014,
b. Ratio dropped in 2015
c. 1309 cases were reported in 2016
d. In 2017 more than 2324 cases were registered in different categories of
cyber crimes.
Some Cases in Pakistan [5]
 Habib Bank was hacked on October-28 2018.
 A gang was arrested from Sargodha, which was involved in hacking the Banks
and Nadra data.
Some common Cyber Crimes [4]
 Hacking
Identifying weakness in computer systems and/or
networks and exploiting weaknesses to gain access.
 CYBER TERRORISM
Cyber terrorism occurs when terrorists cause virtual destruction in online computer system.
 SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the original.
Continue…
 CHILD PORNOGRAPHY
Internet is highly used by its abuse to reach and abuse of children sexually,
worldwide. And more homes have access to internet, more children would be
using the internet and more of chances of falling victim the aggressions
of pedophiles.
 Spoofing :
Spoofing is the creation of IP packets using somebody else's IP address.
 Espionage:
Espionage occurs when perpetrators back into online systems or individual
PCs to obtain confidential information for the purpose of selling it to other parties.
A article from DAWN News: [3]
 Three online child pornography cases unearthed in Punjab
 LAHORE: Even as the FIA has been able to track down three men who are
allegedly involved in uploading and selling child pornographic content online,
the agency has proposed the setting up of a fully equipped ‘cyber patrol wing’ at
its headquarters to unearth other such cases in the country.
 A man from Sargodha has become the first person from Pakistan to receive
a conviction in a child pornography case. Saadat Amin has been sentenced to 7
years in jail and Rs 1.2 million.
 The agency also found more than 650,00 child pornography videos in Saadat Amin’s
possession.
Motive of Cyber Criminals: [1]
 Desire for entertainment
 Profit
 Infuriation or revenge
 Political agenda
 Sexual motivations
 Psychiatric illness
Cyber Laws in Pakistan [3]
 Up to three years imprisonment, Rs5 million fine or both for obtaining,
selling, possessing, transmitting or using another person’s identity
information without authorization.
 Up to three years imprisonment, Rs1 million fine or both for
unauthorized access to critical infrastructure information system or
data.
 If your identity information is used without authorization, you may
apply to the authorities to secure, destroy or prevent transmission of
your information
Security [2]
 Use ant various software's.
 Insert firewalls.
 Uninstall unnecessary software's.
 Maintain backup.
 Check security settings.
 Stay anonymous-chose a genderless name.
 Never give you full name or address to stranger.
 Learn more about internet privacy.
Conclusions:
 User awareness is key to a secure computer/network
 Don’t open suspicious files
 Avoid using P2P programs.
 If attacked, disconnect the network. Do not turn off computer.
So we may pay attention to those issues & protect the World from Cyber Crime.
 “If you spent more on coffee than on IT security, you will be hacked. What’s more ,
you deserve to be hacked”.----
White House Cybersecurity Advisor, Richard Clark .
References:
1. WWW.Google.com
2. WWW.Wikipedia.com
3. WWW.DAWNNEWS.com
4. WWW.Slideshear.com
5. WWW.Youtube.com
Cyber crime & security
Cyber crime & security

More Related Content

What's hot

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & SecurityAnchit Rajawat
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And SecurityShaheda Afreen
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 

What's hot (20)

Ppt
PptPpt
Ppt
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 

Similar to Cyber crime & security

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxAnecitaLCalamohoy
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptraffy ursulum
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxBenjieBarlaan
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxAnecitaLCalamohoy
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxLeah Condina
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptxReminPasion1
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDixsonCaluag2
 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
 

Similar to Cyber crime & security (20)

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptxThe disadvantages of ICT.pptx-final [Autosaved].pptx
The disadvantages of ICT.pptx-final [Autosaved].pptx
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
L15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.pptL15 The Disadvantages of ICT.ppt
L15 The Disadvantages of ICT.ppt
 
L15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptxL15 The Disadvantages of ICT.pptx
L15 The Disadvantages of ICT.pptx
 
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptxThe disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx
 
E-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptxE-Tech L15 The Disadvantages of ICT.pptx
E-Tech L15 The Disadvantages of ICT.pptx
 
15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx15_The_Disadvantages_of_ICT.pptx
15_The_Disadvantages_of_ICT.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
cyber crime
cyber crimecyber crime
cyber crime
 

More from SohailAkbar14

Vehicle steering Mechanism.pptx
Vehicle steering Mechanism.pptxVehicle steering Mechanism.pptx
Vehicle steering Mechanism.pptxSohailAkbar14
 
Genetics of bacteria PPT.pptx
Genetics of bacteria PPT.pptxGenetics of bacteria PPT.pptx
Genetics of bacteria PPT.pptxSohailAkbar14
 
PLM Strategy for Developing Specific Medical Devices
PLM Strategy for Developing Specific Medical DevicesPLM Strategy for Developing Specific Medical Devices
PLM Strategy for Developing Specific Medical DevicesSohailAkbar14
 
Quality Improvement in Product design and Development with Kano Model
Quality Improvement in Product design and Development with Kano ModelQuality Improvement in Product design and Development with Kano Model
Quality Improvement in Product design and Development with Kano ModelSohailAkbar14
 
Advance manufacturing report
Advance manufacturing reportAdvance manufacturing report
Advance manufacturing reportSohailAkbar14
 
Women of pakistan and their rights
Women of pakistan and their rightsWomen of pakistan and their rights
Women of pakistan and their rightsSohailAkbar14
 
Complex integration its uses and types
Complex integration its uses and typesComplex integration its uses and types
Complex integration its uses and typesSohailAkbar14
 

More from SohailAkbar14 (8)

Vehicle steering Mechanism.pptx
Vehicle steering Mechanism.pptxVehicle steering Mechanism.pptx
Vehicle steering Mechanism.pptx
 
Genetics of bacteria PPT.pptx
Genetics of bacteria PPT.pptxGenetics of bacteria PPT.pptx
Genetics of bacteria PPT.pptx
 
PLM Strategy for Developing Specific Medical Devices
PLM Strategy for Developing Specific Medical DevicesPLM Strategy for Developing Specific Medical Devices
PLM Strategy for Developing Specific Medical Devices
 
Quality Improvement in Product design and Development with Kano Model
Quality Improvement in Product design and Development with Kano ModelQuality Improvement in Product design and Development with Kano Model
Quality Improvement in Product design and Development with Kano Model
 
Prototyping.pptx
Prototyping.pptxPrototyping.pptx
Prototyping.pptx
 
Advance manufacturing report
Advance manufacturing reportAdvance manufacturing report
Advance manufacturing report
 
Women of pakistan and their rights
Women of pakistan and their rightsWomen of pakistan and their rights
Women of pakistan and their rights
 
Complex integration its uses and types
Complex integration its uses and typesComplex integration its uses and types
Complex integration its uses and types
 

Recently uploaded

Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaignanjanibaddipudi1
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfauroraaudrey4826
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 

Recently uploaded (15)

Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election CampaignN Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
N Chandrababu Naidu Launches 'Praja Galam' As Part of TDP’s Election Campaign
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Chandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdfChandrayaan 3 Successful Moon Landing Mission.pdf
Chandrayaan 3 Successful Moon Landing Mission.pdf
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 

Cyber crime & security

  • 1.
  • 2. Cyber Crime & Security TECHNICAL WRITING & PRESENTATION SKILLS PREPARED BY :- SOHAIL AKBAR
  • 3. Introduction: .[1]  Cybercrime, or computer-oriented crime, is crime that involves a computer and a network.  We can categorized the cyber crime in two ways;  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc. 1
  • 4. History [4]  The first recorded cybercrime took place in 1820.  The first spam E-mail took place in 1976, when it was sent out over the ARPANET.  The first virus was installed on Apple computer in 1982 when a high school student Rich Skrenta developed a EIK Cloner.  DOS attacked by “Mafia Boy”, Yahoo & other popular sites in 2000.  FBI’s system was hacked in Feb-2005.  Travelling documents of NATO (North Atlantic Treaty Organization) forces were hacked in Afghanistan. 2
  • 5. CYBER CRIME IN PAKISTAN [3] Cyber Crime Rises Rapidly in Pakistan  The cyber crimes of multiple kinds in Pakistan have increased by five times over the past four years  According to FIA ; a. 641 cases were reported to the unit in 2014, b. Ratio dropped in 2015 c. 1309 cases were reported in 2016 d. In 2017 more than 2324 cases were registered in different categories of cyber crimes.
  • 6. Some Cases in Pakistan [5]  Habib Bank was hacked on October-28 2018.  A gang was arrested from Sargodha, which was involved in hacking the Banks and Nadra data.
  • 7. Some common Cyber Crimes [4]  Hacking Identifying weakness in computer systems and/or networks and exploiting weaknesses to gain access.  CYBER TERRORISM Cyber terrorism occurs when terrorists cause virtual destruction in online computer system.  SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • 8. Continue…  CHILD PORNOGRAPHY Internet is highly used by its abuse to reach and abuse of children sexually, worldwide. And more homes have access to internet, more children would be using the internet and more of chances of falling victim the aggressions of pedophiles.  Spoofing : Spoofing is the creation of IP packets using somebody else's IP address.  Espionage: Espionage occurs when perpetrators back into online systems or individual PCs to obtain confidential information for the purpose of selling it to other parties.
  • 9. A article from DAWN News: [3]  Three online child pornography cases unearthed in Punjab  LAHORE: Even as the FIA has been able to track down three men who are allegedly involved in uploading and selling child pornographic content online, the agency has proposed the setting up of a fully equipped ‘cyber patrol wing’ at its headquarters to unearth other such cases in the country.  A man from Sargodha has become the first person from Pakistan to receive a conviction in a child pornography case. Saadat Amin has been sentenced to 7 years in jail and Rs 1.2 million.  The agency also found more than 650,00 child pornography videos in Saadat Amin’s possession.
  • 10. Motive of Cyber Criminals: [1]  Desire for entertainment  Profit  Infuriation or revenge  Political agenda  Sexual motivations  Psychiatric illness
  • 11. Cyber Laws in Pakistan [3]  Up to three years imprisonment, Rs5 million fine or both for obtaining, selling, possessing, transmitting or using another person’s identity information without authorization.  Up to three years imprisonment, Rs1 million fine or both for unauthorized access to critical infrastructure information system or data.  If your identity information is used without authorization, you may apply to the authorities to secure, destroy or prevent transmission of your information
  • 12. Security [2]  Use ant various software's.  Insert firewalls.  Uninstall unnecessary software's.  Maintain backup.  Check security settings.  Stay anonymous-chose a genderless name.  Never give you full name or address to stranger.  Learn more about internet privacy.
  • 13. Conclusions:  User awareness is key to a secure computer/network  Don’t open suspicious files  Avoid using P2P programs.  If attacked, disconnect the network. Do not turn off computer. So we may pay attention to those issues & protect the World from Cyber Crime.  “If you spent more on coffee than on IT security, you will be hacked. What’s more , you deserve to be hacked”.---- White House Cybersecurity Advisor, Richard Clark .
  • 14. References: 1. WWW.Google.com 2. WWW.Wikipedia.com 3. WWW.DAWNNEWS.com 4. WWW.Slideshear.com 5. WWW.Youtube.com