GHOST ARE THEY REAL CYBER CRIMES
GHOST ARE THEY REAL CYBER CRIMES
•   M. ARSLAN MAQBOOL(10-ARID-210)•   DANYAL SHOUKAT(11-ARID-688)•   TABRAIZ IQBAL(11-ARID-774)•   FURQAN RASHID (11-ARID-...
   Introduction of Cyber crime   Types of cyber crime   Computer Viruses   Types of viruses   Cyber Threats   Cyber ...
Introduction to Cyber Crime Computer Crime, E-Crime, Hi-Tech  Crime or Electronic Crime is where a  computer is the targe...
Cyber crimes                                                Web jacking                                                Den...
TYPES OF CYBER                     CRIMESE-Mail Bombing: Email bombing refers to sending a large amount of e-mails tothe v...
Types of Cyber crimes(Contd.)   Credit card frauds   Sale of illegal articles-narcotics, weapons,    wildlife           ...
   CARDING:-     Carding is a serious threat to India,    as it does not require a high degree of    sophistication and i...
   What does Computer Virus mean ?   A computer virus is an executable program depend on the nature of a    virus. It ma...
   To distribute political message.   To attack the products of specific companies.   Some consider their creations to ...
Types of               viruses              Boot sector file virus                 Macro virus               virusTypes of...
Cyber Threats   Cyber threats to a control system refer to persons who attempt    unauthorized access to a control system...
Cyber Threat Evolution                    Malicious                                              Identity TheftVirus      ...
   All computers need internet security    Home users can lose valuable personal data with one click to the wrong    webs...
16CAN ANYTHING BE         DONE?
17There is no one solution,be it technological orotherwise, to addresscyber crime. It exists for amultitude of reasons and...
18A FEW WORDS ABOUT  SECURITY POLICIES
19•INDUSTRY POLICIESShould address acceptableusage, minimum securitystandards, andcommitments byorganisation to educateand...
20•GOVERNMENT POLICIESIdentify short and midterm security objectives,support to key players,investments in securitytechnol...
QUESTIONS  21
THANK YOU
Upcoming SlideShare
Loading in …5
×

Cyber crime

8,642 views

Published on

Down load this file and and give your opinions

Published in: Education, Technology
0 Comments
9 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
8,642
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
688
Comments
0
Likes
9
Embeds 0
No embeds

No notes for slide

Cyber crime

  1. 1. GHOST ARE THEY REAL CYBER CRIMES
  2. 2. GHOST ARE THEY REAL CYBER CRIMES
  3. 3. • M. ARSLAN MAQBOOL(10-ARID-210)• DANYAL SHOUKAT(11-ARID-688)• TABRAIZ IQBAL(11-ARID-774)• FURQAN RASHID (11-ARID-724)• UMAIR KHAN(11-ARID-758)GROUP MEMBERS
  4. 4.  Introduction of Cyber crime Types of cyber crime Computer Viruses Types of viruses Cyber Threats Cyber Threat Evolution New Internet Threats Security Policies Government PoliciesAgenda
  5. 5. Introduction to Cyber Crime Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet
  6. 6. Cyber crimes Web jacking Denial of Trojan Information E-mail Salami ServiceHacking Theft attacks attacks bombing attacksDifferent Types of Cybercrimes
  7. 7. TYPES OF CYBER CRIMESE-Mail Bombing: Email bombing refers to sending a large amount of e-mails tothe victim resulting in interruption in the victims’ e-mail account or mail servers.Data Diddling: This kind of an attack involves altering the raw data just before itis processed by a computer and then changing it back after the processing iscompleted.Salami Attacks: These attacks are used for the commission of financial crimes.A bank employee inserts a program into bank’s servers, that deducts a small amountfrom the account of every customer Denial of Service: This involves flooding computer resources with morerequests than it can handle. This causes the resources to crash thereby denyingauthorized users the service offered by the resources.
  8. 8. Types of Cyber crimes(Contd.) Credit card frauds Sale of illegal articles-narcotics, weapons, wildlife Crime against Government Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, Crime against property theft of computer source code Email bombing Cyber terrorism Crime against persons
  9. 9.  CARDING:- Carding is a serious threat to India, as it does not require a high degree of sophistication and is considered particularly pernicious by international financial institutions and e-commerce providers. BOTS:- Bots, compromised servers that may be launching cyber attacks or sending Spam.Cyber Crime Data In Regional Context
  10. 10.  What does Computer Virus mean ? A computer virus is an executable program depend on the nature of a virus. It may cause damage of your hard disk contents or interfere normal operation at your computer. A computer virus is a program that can copy itself and infect a computer without permission or knowledge of the user.Computer Viruses
  11. 11.  To distribute political message. To attack the products of specific companies. Some consider their creations to be works of art, and see as a creative hobby. Financial gain from identity theftWhy Do people Create These Viruses?
  12. 12. Types of viruses Boot sector file virus Macro virus virusTypes of Viruses
  13. 13. Cyber Threats Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and network using a data communications pathway. Main threats to cyber crime is Hacking. Hacking involves gaining unauthorized access to a computer.Cyber Threats
  14. 14. Cyber Threat Evolution Malicious Identity TheftVirus Code (Phishing) (Melissa) Breaking Advanced Worm / Organised Crime Web Sites Trojan (I LOVE Data Theft, DoS / YOU) DDoS1977 1995 2000 2003-04 2005-06 2007-08
  15. 15.  All computers need internet security Home users can lose valuable personal data with one click to the wrong website. Children trading games also exchange viruses unknowingly. You receive an email requesting an update to your payment details, and a hacker gains access to your bank account. A backdoor is installed on your machine, and your PC becomes a zombie, spewing out spam. New technologies - new anti-malware solutions As cyber threats have evolved, so has software to deflect such threats. Sophisticated antispyware and antivirus solutions capable of detecting the most complex new viruses are now available.New Internet Threats
  16. 16. 16CAN ANYTHING BE DONE?
  17. 17. 17There is no one solution,be it technological orotherwise, to addresscyber crime. It exists for amultitude of reasons andrequires a multifacetedapproach to fight against
  18. 18. 18A FEW WORDS ABOUT SECURITY POLICIES
  19. 19. 19•INDUSTRY POLICIESShould address acceptableusage, minimum securitystandards, andcommitments byorganisation to educateand support users
  20. 20. 20•GOVERNMENT POLICIESIdentify short and midterm security objectives,support to key players,investments in securitytechnology and training,and awareness initiatives
  21. 21. QUESTIONS 21
  22. 22. THANK YOU

×