SlideShare a Scribd company logo
CYBER CRIME
INTRODUCTION
• CYBER CRIME ALSO CALLED
COMPUTER CRIME IS ANY ILLEGAL
ACTIVITY THAT INVOLVES A
COMPUTER OR NETWORK
CONNECTED DEVICE.
HISTORY
• FIRST SPAM EMAIL TOOK PLACE IN
1976. IT WAS THE BEGINNING OF
CYBER CRIME.
• FIRST VIRUS WAS INSTALLED ON AN
APPLE COMPUTER IN 1982 BY A HIGH
SCHOOL STUDENT.
CATEGORIES
• HACKING
• IDENTITY THEFT
• FINANACIAL FRAUD
• VIRUSES
• MONEY LAUNDERING
• DENIAL OF SERVICE ATTACK
• SOCIAL TERRORISM
HACKING
• HACKING IS AN ATTEMPT TO EXPLOIT
A COMPUTER SYSTEM OR A PRIVATE
NETWORK INSIDE A COMPUTER.
• IT IS UNAUTHORIZED ACCESS TO OR
CONTROL OVER COMPUTER
SECURITY SYSTEM FOR SOME
PURPOSE.
IDENTITY THEFT
• THE FRAUDULENT PRACTICE OF
USING ANOTHER PERSON’S NAME
AND PERSONAL INFORMATION IN
ORDER TO OBTAIN CREDITS, LOANS
ETC.
FINANCIAL FRAUD
• FINANCIAL FRUAD CAN BE BROADLY
DEFINED AS AN INTENTIONAL ACT OF
DECEPTION INVOVING FINANCIAL
TRANSACTIONS FOR PURPOSE OF
PERSONAL GAIN.
VIRUSES
• A VIRUSE IS A TYPE OF MALICIOUS
SOFTWARE THAT, WHEN EXECUTED,
REPLICATES ITSELF BY MODIFYING
OTHER COMPUTER PROGRAMS AND
INSERTING ITS OWN CODE.
MONEY LAUNDERING
• MONEY LAUNDERING IS THE
PROCESS OF MAKING ILLEGALY
GAINED PROCEEDS(I.E. “DIRTY
MONEY”) APPEAR LEGAL (I.E.
“CLEAN”)
DENIAL OF SERVICE ATTACK
• IT IS A CYBER ATTACK WHERE THE
PREPETRATOR SEEKS TO MAKE A
MACHINE OR NETWORK RESOURCE
UNAVAILABLE TO ITS INTENDED
USERS BY TEMPORARILY OR
INDEFINITELY DISRUPTING SERVICE
OF A HOST CONNECTED TO THE
INTERNET.
SOCIAL TERRORISM
• SOCIAL TERRORISM IS A PROCESS
OF ORGANIZED PHYSICAL AND
MENTAL VIOLENCE DIRECTED
AGAINST THE CITIZEN, SOCIETY AND
THE STATE WHICH AIMS TO CREATE
FEAR AND ATTEMPTS TO ENFORCE A
DIFFERENT RELEGIOUS OR POLITICAL
IDEOLOGY.
PREVENTION
TIPS
SECURE YOUR SMART
PHONE
• ALWAYS USE A STRONG PASSWORD.
• INSTALL SECURITY SOFTWARE.
• DOWNLOAD APPS FROM APPROVED
SOURCES.
• CHECK APPS PERMISSION.
• BE WARY OF LINKS YOU RECEIVE VIA
EMAIL OR TEXT MESSAGES.
SECURE ONLINE BANKING
• NEVER USE SAME PIN FOR MULTIPLE
ACCOUNT.
• NEVER USE CYBER CAFES OR
INTERNET BANKING.
• REGISTER FOR MOBILE ALERTS.
• USING ATM CONCEAL KEYPAD
BEFORE ENTERING PIN CODE.
SECURE FACEBOOK
• USE EXTRA SECURITY FEATURES.
• USE LOGIN NOTIFICATION ALERT.
• ALLOW SPECIFIC INDIVIDUALLS TO
VIEW YOUR CONTENTS.
• CONTROL WHO CAN CONTACT YOU.
• BLOCK YOUR PROFILE FROM SEARCH
ENGINES.
SECURE YOUR BROWSING
• WHAT YOU PUT ONLINE WILL ALWAYS
REMAIN THERE.
• NEVER TRUST ANY FREE ONLINE
CONTENT.
• DON’T PROVIDE PERSONAL
INFORMATION ONLINE TO GET
SOMETHING FREE.
• DON’T CLICK ON LINKS INSIDE EMAILS
CYBER CRIME AND
PAKISTAN
• (SEPT. 21, 2016) ON AUGUST 11, 2016,
PAKISTAN’S LOWER HOUSE, THE
NATIONAL ASSEMBLY, PASSED
A CONTROVERSIAL CYBERCRIME LAW
CALLED THE PREVENTION OF
ELECTRONIC CRIMES ACT, 2016. THE
SENATE HAD UNANIMOUSLY PASSED
THE LAW.
•HOW TO REPORT
AGAINST CYBER
CRIME IN PAKISTAN
• IN PAKISTAN WE CAN REPORT
AGAINST ANY ACTIVITY OF CYBER
CRIME TO “FIA”.
• FOR REPORTING WE CAN VISIT THIS
LINK
HTTP://WWW.NR3C.GOV.PK
• OR CANCALL AT 9911
• HOPE THAT ALL OF YOU
UNDERSTANDS IT VERY
WELL.
•ANY QUESTION?
•OK!
THANKS
•FI AMAN ALLAH

More Related Content

What's hot

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Ansar Gill
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Priyankush salouria
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
Mumbai University
 
Cyber crime
Cyber crimeCyber crime
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 

What's hot (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Cyber Crime and Prevention Tips

SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
pratikshapatil62556
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
ARYAS87
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
Apurv Singh Gautam
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
KhushiLodhi1
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
ARYAS87
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
Apurv Singh Gautam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber Crime..pptx
Cyber Crime..pptxCyber Crime..pptx
Cyber Crime..pptx
JunaidNaseem8
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
Siphamandla Benedict
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 

Similar to Cyber Crime and Prevention Tips (20)

SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime..pptx
Cyber Crime..pptxCyber Crime..pptx
Cyber Crime..pptx
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

Cyber Crime and Prevention Tips

  • 2. INTRODUCTION • CYBER CRIME ALSO CALLED COMPUTER CRIME IS ANY ILLEGAL ACTIVITY THAT INVOLVES A COMPUTER OR NETWORK CONNECTED DEVICE.
  • 3. HISTORY • FIRST SPAM EMAIL TOOK PLACE IN 1976. IT WAS THE BEGINNING OF CYBER CRIME. • FIRST VIRUS WAS INSTALLED ON AN APPLE COMPUTER IN 1982 BY A HIGH SCHOOL STUDENT.
  • 4. CATEGORIES • HACKING • IDENTITY THEFT • FINANACIAL FRAUD • VIRUSES • MONEY LAUNDERING • DENIAL OF SERVICE ATTACK • SOCIAL TERRORISM
  • 6. • HACKING IS AN ATTEMPT TO EXPLOIT A COMPUTER SYSTEM OR A PRIVATE NETWORK INSIDE A COMPUTER. • IT IS UNAUTHORIZED ACCESS TO OR CONTROL OVER COMPUTER SECURITY SYSTEM FOR SOME PURPOSE.
  • 8. • THE FRAUDULENT PRACTICE OF USING ANOTHER PERSON’S NAME AND PERSONAL INFORMATION IN ORDER TO OBTAIN CREDITS, LOANS ETC.
  • 10. • FINANCIAL FRUAD CAN BE BROADLY DEFINED AS AN INTENTIONAL ACT OF DECEPTION INVOVING FINANCIAL TRANSACTIONS FOR PURPOSE OF PERSONAL GAIN.
  • 12. • A VIRUSE IS A TYPE OF MALICIOUS SOFTWARE THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  • 14. • MONEY LAUNDERING IS THE PROCESS OF MAKING ILLEGALY GAINED PROCEEDS(I.E. “DIRTY MONEY”) APPEAR LEGAL (I.E. “CLEAN”)
  • 16. • IT IS A CYBER ATTACK WHERE THE PREPETRATOR SEEKS TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE TO ITS INTENDED USERS BY TEMPORARILY OR INDEFINITELY DISRUPTING SERVICE OF A HOST CONNECTED TO THE INTERNET.
  • 18. • SOCIAL TERRORISM IS A PROCESS OF ORGANIZED PHYSICAL AND MENTAL VIOLENCE DIRECTED AGAINST THE CITIZEN, SOCIETY AND THE STATE WHICH AIMS TO CREATE FEAR AND ATTEMPTS TO ENFORCE A DIFFERENT RELEGIOUS OR POLITICAL IDEOLOGY.
  • 20. SECURE YOUR SMART PHONE • ALWAYS USE A STRONG PASSWORD. • INSTALL SECURITY SOFTWARE. • DOWNLOAD APPS FROM APPROVED SOURCES. • CHECK APPS PERMISSION. • BE WARY OF LINKS YOU RECEIVE VIA EMAIL OR TEXT MESSAGES.
  • 21. SECURE ONLINE BANKING • NEVER USE SAME PIN FOR MULTIPLE ACCOUNT. • NEVER USE CYBER CAFES OR INTERNET BANKING. • REGISTER FOR MOBILE ALERTS. • USING ATM CONCEAL KEYPAD BEFORE ENTERING PIN CODE.
  • 22. SECURE FACEBOOK • USE EXTRA SECURITY FEATURES. • USE LOGIN NOTIFICATION ALERT. • ALLOW SPECIFIC INDIVIDUALLS TO VIEW YOUR CONTENTS. • CONTROL WHO CAN CONTACT YOU. • BLOCK YOUR PROFILE FROM SEARCH ENGINES.
  • 23. SECURE YOUR BROWSING • WHAT YOU PUT ONLINE WILL ALWAYS REMAIN THERE. • NEVER TRUST ANY FREE ONLINE CONTENT. • DON’T PROVIDE PERSONAL INFORMATION ONLINE TO GET SOMETHING FREE. • DON’T CLICK ON LINKS INSIDE EMAILS
  • 24. CYBER CRIME AND PAKISTAN • (SEPT. 21, 2016) ON AUGUST 11, 2016, PAKISTAN’S LOWER HOUSE, THE NATIONAL ASSEMBLY, PASSED A CONTROVERSIAL CYBERCRIME LAW CALLED THE PREVENTION OF ELECTRONIC CRIMES ACT, 2016. THE SENATE HAD UNANIMOUSLY PASSED THE LAW.
  • 25. •HOW TO REPORT AGAINST CYBER CRIME IN PAKISTAN
  • 26. • IN PAKISTAN WE CAN REPORT AGAINST ANY ACTIVITY OF CYBER CRIME TO “FIA”. • FOR REPORTING WE CAN VISIT THIS LINK HTTP://WWW.NR3C.GOV.PK • OR CANCALL AT 9911
  • 27. • HOPE THAT ALL OF YOU UNDERSTANDS IT VERY WELL.