2. Introduction
Definition
History
Cyber crime in Pakistan
Categories of Cyber crime
Types of Cyber crime
Safety tips for cyber crimes
Cyber security
Advantages of cyber security
3.
4. The Internet in world is growing rapidly. It
has given rise to new opportunities in every
field such as entertainment , business ,
education or sports.
There are two sides to a coin. INTERNET also
has its disadvantages like CYBER CRIME –
Illegal activity committed on the Internet.
5. DEFINITION :
Crime committed using a Computer and the
Internet to steal Data or Information.
Illegal imports
Malicious programs
6. Cybercrime is nothing
but where the computer
used as an object or
subject of crime.
Most of these crimes
are not new. Criminals
simply devise different
ways to undertake
standard criminal
activities such as fraud ,
theft , blackmail and
forgery using the new
medium , often
involving the Internet .
7. The software tools used in cybercrime is
sometimes referred to as Crime ware.
Crime ware is software that is used in the
commission of the criminal act.
Not generally regarded as a desirable
software or hardware application.
8. The first SPAM email took place in 1978 when
it was sent out over ARPANET.
ARPANET : Advanced Research Projects
Agency Network
13. The Computer as a Target : using a computer
to attack other computers.
The computer as a weapon : using a
computer to commit real world crimes.
15. Hacking in simple terms
means an illegal intrusion
into a computer system
or network.
In many organizations
they have to check their
Internet security
protection. If not the
hacking criminal uses a
variety of software to
enter a person’s
computer and the person
may not be aware that his
computer is being
accessed from a remote
location.
16. This has become a
major problem with
people using the
Internet for cash
transactions and
banking services.
It can result in major
financial losses for
the victim and even
spoil the victim’s
credit history.
17. Malicious software
that attaches itself
to other software.
(Virus, worms,
Trojan Horse , web-
jacking, email
bombing etc)
18. Damaging or destroying the data rather than
stealing or misusing.
Transmitting virus.
19. Use of internet based attacks in terrorists
activities against computers/networks with
the intension of causing harm.
Cyber terrorism can also include attacks on
Internet business, but when this is done for
economic motivations rather than ideological.
20. Software piracy is the
unauthorized or illegal
copying, distribution, or use
of software. It is such a
profitable “Business" that it
has caught the attention of
organized crime groups in a
number of countries.
21. Use Anti-virus software.
Insert Firewalls.
Uninstall unnecessary software
Maintain Backup
Check security settings
Stay Anonymous - choose a genderless
screen name.
Never give your full name or address to
strangers.
Learn more about Internet Privacy.
22. Types of Cyber attacks, by percentage (source-
FBI) Financial fraud 11%
Sabotage of
data/networks
17%
Theft of proprietary
information
20%
System penetration from
the outside
25%
Denial of service 27%
Unauthorized access by
insiders
71%
Employee abuse of
internet privileges
79%
Viruses 85%
23.
24. The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
With an increasing amount of people getting
connected to Internet, the security threats
that cause massive harm are increasing also.
25. The cyber security will defend us from critical
attacks.
It helps us to browse the safe website.
Internet security process all the incoming and
outgoing data on our computer.
security will defend from hacks and virus.
The application of cyber security used in our
PC needs update every week.
The security developers will update their
database every week once. Hence the new
virus also deleted