Cyber crimes


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber crimes

  1. 1. Group Members • • • • • • Muhammad NASIR Waqas AHMAD Maryam BATOOL M.Tahir SHAH Sarfraz AHMAD Javaad AHMAD MB-12-04 MB-12-05 MB-12-06 MB-12-64 MB-12-65 MB-12-66
  3. 3. What are cyber crimes • Offences that are committed against individuals or groups of individuals (by using computer) with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly.
  4. 4. Historical Perspective • 1960s and 1970s: Hacker: a positive term A Hacker: An expert, knowledgeable about programming and operating systems • 1970s onwards: Hacker: a term, which progressively became more negative. A Hacker: Someone using computers without authorization
  5. 5. Why we study about cyber crimes • Almost every one is using computer From white collar criminals to terrorist organizations and from teenagers to adults • Conventional crimes like Forgery , extortion, and kidnapping etc. are being committed with the help of computer • New generation is growing up with computers • MOST IMPORTANT business transactions are carried out through internet.
  6. 6. Profile of cyber criminals • • • • • • • Disgruntled employee. Teenagers. Professional hackers. Business rivals. Political hacktivists. Ex-friends. Divorced husband etc.
  7. 7. Common cyber crime attacks • • • • • • • Hacking Cracking Script kiddies Vandals Spoofing Denial of services Snooping
  8. 8. Common cyber crimes attacks • • • • • • • Software privacy Net Extortion Virus dissemination Phishing Cyber Stalking Salami attacks Credit card fraud
  9. 9. Hacking Hacking is access of computer resource, without authorization Cracking A hacker who uses his or her skills to commit unlawful acts, or to deliberately create mischief
  10. 10. Script kiddies A hacker who downloads the scripts and uses them to commit unlawful acts, or to deliberately create mischief, without fully understanding the scripts Vandals A person who deliberately destroys or damages public or private property by using computer
  11. 11. Spoofing Spoofing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details etc. Denial of services Any problem that makes it difficult or impossible for the system to continue to perform productive work
  12. 12. Snooping • Snooping is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an email or watching what someone else is typing.
  13. 13. Software privacy • Theft of software through illegal copying of genuine programs. Retail revenue losses are ever increasing due to this crime. This can be done in various ways such as end user copying, hard disk loading and illegal download from the internet.
  14. 14. Net Extortion • Copying the company confidential data in order to extort said company for huge amount. Virus dissemination Malicious software that attaches itself to t other software. (virus, worms, Trojan horse. Time bomb, rabbit and bacterium are the malicious soft wares.
  15. 15. Credit card Frauds • You simply have to type your credit card number into www page off the vender for online transaction and if electronic transactions are not secured the credit card number can be stolen by the hacker who can misuse this credit card.
  16. 16. PHISHING • It is technique of pulling out confidential information from the bank or financial institutional account holders by deceptive means. Credit card writer
  17. 17. ATM as usual
  18. 18. Inside the box
  19. 19. Cyber Stalking • The cyber follows the victim by sending emails or entering the chat rooms frequently Threatening • The criminals sends threatening email or comes in contact in chat rooms with victims.
  20. 20. Salami Attack • In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such programs that deducts small amounts as 2.5 rupees from all the customers accounts of a bank and deposits in his own account. In such a case no customer will approach to bank for such small amount.
  21. 21. Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation. It is certainly not as if we don’t face that many cyber crimes here. In fact, Pakistan is currently facing the following types of it:
  22. 22. Cyber Crimes in Pakistan
  23. 23. • • • • • • • • Financial crimes Cyber pornography Sale of illegal articles Online gambling Intellectual property crimes Email spoofing Cyber stalking Forgery
  24. 24. • Unauthorized access to computer systemsnetworks • Theft of information contained in electronic form • Virus/worm attacks • Trojan attacks • Internet time theft • Password cracking
  25. 25. General Preventions
  26. 26. • Spam blocker Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages. • Firewall protection Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.
  27. 27. Anti-virus software Make sure you have adequate anti-virus software for your computer. You also need to make sure you regularly update your anti-virus software and that you do a oncea-week scan to locate and eliminate any malware, spyware, viruses and other problems.
  28. 28. Encryption software • Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.
  29. 29. Caution in providing personal information • Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.
  30. 30. Secure shopping • Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud
  31. 31. Monitoring activities • Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity