2. Cyber Crime & Security
TECHNICAL WRITING & PRESENTATION SKILLS
PREPARED BY :- SOHAIL AKBAR
3. Introduction: .[1]
Cybercrime, or computer-oriented crime, is crime that involves a computer
and a network.
We can categorized the cyber crime in two ways;
The computer as a target :- using a computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos attack etc.
The computer as a weapon :- using a computer to commit real world
crime e.g. cyber terrorism, credit card fraud and pornography etc.
1
4. History [4]
The first recorded cybercrime took place in 1820.
The first spam E-mail took place in 1976, when it was sent out over the
ARPANET.
The first virus was installed on Apple computer in 1982 when a high school
student Rich Skrenta developed a EIK Cloner.
DOS attacked by “Mafia Boy”, Yahoo & other popular sites in 2000.
FBI’s system was hacked in Feb-2005.
Travelling documents of NATO (North Atlantic Treaty
Organization) forces were hacked in Afghanistan.
2
5. CYBER CRIME IN PAKISTAN [3]
Cyber Crime Rises Rapidly in Pakistan
The cyber crimes of multiple kinds in Pakistan have
increased by five times over the past four years
According to FIA ;
a. 641 cases were reported to the unit in 2014,
b. Ratio dropped in 2015
c. 1309 cases were reported in 2016
d. In 2017 more than 2324 cases were registered in different categories of
cyber crimes.
6. Some Cases in Pakistan [5]
Habib Bank was hacked on October-28 2018.
A gang was arrested from Sargodha, which was involved in hacking the Banks
and Nadra data.
7. Some common Cyber Crimes [4]
Hacking
Identifying weakness in computer systems and/or
networks and exploiting weaknesses to gain access.
CYBER TERRORISM
Cyber terrorism occurs when terrorists cause virtual destruction in online computer system.
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the original.
8. Continue…
CHILD PORNOGRAPHY
Internet is highly used by its abuse to reach and abuse of children sexually,
worldwide. And more homes have access to internet, more children would be
using the internet and more of chances of falling victim the aggressions
of pedophiles.
Spoofing :
Spoofing is the creation of IP packets using somebody else's IP address.
Espionage:
Espionage occurs when perpetrators back into online systems or individual
PCs to obtain confidential information for the purpose of selling it to other parties.
9. A article from DAWN News: [3]
Three online child pornography cases unearthed in Punjab
LAHORE: Even as the FIA has been able to track down three men who are
allegedly involved in uploading and selling child pornographic content online,
the agency has proposed the setting up of a fully equipped ‘cyber patrol wing’ at
its headquarters to unearth other such cases in the country.
A man from Sargodha has become the first person from Pakistan to receive
a conviction in a child pornography case. Saadat Amin has been sentenced to 7
years in jail and Rs 1.2 million.
The agency also found more than 650,00 child pornography videos in Saadat Amin’s
possession.
10. Motive of Cyber Criminals: [1]
Desire for entertainment
Profit
Infuriation or revenge
Political agenda
Sexual motivations
Psychiatric illness
11. Cyber Laws in Pakistan [3]
Up to three years imprisonment, Rs5 million fine or both for obtaining,
selling, possessing, transmitting or using another person’s identity
information without authorization.
Up to three years imprisonment, Rs1 million fine or both for
unauthorized access to critical infrastructure information system or
data.
If your identity information is used without authorization, you may
apply to the authorities to secure, destroy or prevent transmission of
your information
12. Security [2]
Use ant various software's.
Insert firewalls.
Uninstall unnecessary software's.
Maintain backup.
Check security settings.
Stay anonymous-chose a genderless name.
Never give you full name or address to stranger.
Learn more about internet privacy.
13. Conclusions:
User awareness is key to a secure computer/network
Don’t open suspicious files
Avoid using P2P programs.
If attacked, disconnect the network. Do not turn off computer.
So we may pay attention to those issues & protect the World from Cyber Crime.
“If you spent more on coffee than on IT security, you will be hacked. What’s more ,
you deserve to be hacked”.----
White House Cybersecurity Advisor, Richard Clark .