By
Syed abdul basit
 Introduction
 Definition
 History
 Cyber crime in Pakistan
 Categories of Cyber crime
 Types of Cyber crime
 Safety tips for cyber crimes
 Cyber security
 Advantages of cyber security
 The Internet in world is growing rapidly. It
has given rise to new opportunities in every
field such as entertainment , business ,
education or sports.
 There are two sides to a coin. INTERNET also
has its disadvantages like CYBER CRIME –
Illegal activity committed on the Internet.
 DEFINITION :
 Crime committed using a Computer and the
Internet to steal Data or Information.
 Illegal imports
 Malicious programs
 Cybercrime is nothing
but where the computer
used as an object or
subject of crime.
 Most of these crimes
are not new. Criminals
simply devise different
ways to undertake
standard criminal
activities such as fraud ,
theft , blackmail and
forgery using the new
medium , often
involving the Internet .
 The software tools used in cybercrime is
sometimes referred to as Crime ware.
 Crime ware is software that is used in the
commission of the criminal act.
 Not generally regarded as a desirable
software or hardware application.
 The first SPAM email took place in 1978 when
it was sent out over ARPANET.
 ARPANET : Advanced Research Projects
Agency Network
 Computers
 Cell Phones
 PDA’s
 Game Consoles
 The Computer as a Target : using a computer
to attack other computers.
 The computer as a weapon : using a
computer to commit real world crimes.
 Hacking
 Identity theft
 Malicious software
 Computer vandalism
 Cyber terrorism
 Software piracy
 Hacking in simple terms
means an illegal intrusion
into a computer system
or network.
 In many organizations
they have to check their
Internet security
protection. If not the
hacking criminal uses a
variety of software to
enter a person’s
computer and the person
may not be aware that his
computer is being
accessed from a remote
location.
 This has become a
major problem with
people using the
Internet for cash
transactions and
banking services.
 It can result in major
financial losses for
the victim and even
spoil the victim’s
credit history.
 Malicious software
that attaches itself
to other software.
(Virus, worms,
Trojan Horse , web-
jacking, email
bombing etc)
 Damaging or destroying the data rather than
stealing or misusing.
 Transmitting virus.
 Use of internet based attacks in terrorists
activities against computers/networks with
the intension of causing harm.
 Cyber terrorism can also include attacks on
Internet business, but when this is done for
economic motivations rather than ideological.
 Software piracy is the
unauthorized or illegal
copying, distribution, or use
of software. It is such a
profitable “Business" that it
has caught the attention of
organized crime groups in a
number of countries.
 Use Anti-virus software.
 Insert Firewalls.
 Uninstall unnecessary software
 Maintain Backup
 Check security settings
 Stay Anonymous - choose a genderless
screen name.
 Never give your full name or address to
strangers.
 Learn more about Internet Privacy.
Types of Cyber attacks, by percentage (source-
FBI) Financial fraud 11%
Sabotage of
data/networks
17%
Theft of proprietary
information
20%
System penetration from
the outside
25%
Denial of service 27%
Unauthorized access by
insiders
71%
Employee abuse of
internet privileges
79%
Viruses 85%
 The term cyber security is used to refer to the
security offered through on-line services to
protect your online information.
 With an increasing amount of people getting
connected to Internet, the security threats
that cause massive harm are increasing also.
 The cyber security will defend us from critical
attacks.
 It helps us to browse the safe website.
 Internet security process all the incoming and
outgoing data on our computer.
 security will defend from hacks and virus.
 The application of cyber security used in our
PC needs update every week.
 The security developers will update their
database every week once. Hence the new
virus also deleted
Cyber crime and security

Cyber crime and security

  • 1.
  • 2.
     Introduction  Definition History  Cyber crime in Pakistan  Categories of Cyber crime  Types of Cyber crime  Safety tips for cyber crimes  Cyber security  Advantages of cyber security
  • 4.
     The Internetin world is growing rapidly. It has given rise to new opportunities in every field such as entertainment , business , education or sports.  There are two sides to a coin. INTERNET also has its disadvantages like CYBER CRIME – Illegal activity committed on the Internet.
  • 5.
     DEFINITION : Crime committed using a Computer and the Internet to steal Data or Information.  Illegal imports  Malicious programs
  • 6.
     Cybercrime isnothing but where the computer used as an object or subject of crime.  Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud , theft , blackmail and forgery using the new medium , often involving the Internet .
  • 7.
     The softwaretools used in cybercrime is sometimes referred to as Crime ware.  Crime ware is software that is used in the commission of the criminal act.  Not generally regarded as a desirable software or hardware application.
  • 8.
     The firstSPAM email took place in 1978 when it was sent out over ARPANET.  ARPANET : Advanced Research Projects Agency Network
  • 12.
     Computers  CellPhones  PDA’s  Game Consoles
  • 13.
     The Computeras a Target : using a computer to attack other computers.  The computer as a weapon : using a computer to commit real world crimes.
  • 14.
     Hacking  Identitytheft  Malicious software  Computer vandalism  Cyber terrorism  Software piracy
  • 15.
     Hacking insimple terms means an illegal intrusion into a computer system or network.  In many organizations they have to check their Internet security protection. If not the hacking criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 16.
     This hasbecome a major problem with people using the Internet for cash transactions and banking services.  It can result in major financial losses for the victim and even spoil the victim’s credit history.
  • 17.
     Malicious software thatattaches itself to other software. (Virus, worms, Trojan Horse , web- jacking, email bombing etc)
  • 18.
     Damaging ordestroying the data rather than stealing or misusing.  Transmitting virus.
  • 19.
     Use ofinternet based attacks in terrorists activities against computers/networks with the intension of causing harm.  Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological.
  • 20.
     Software piracyis the unauthorized or illegal copying, distribution, or use of software. It is such a profitable “Business" that it has caught the attention of organized crime groups in a number of countries.
  • 21.
     Use Anti-virussoftware.  Insert Firewalls.  Uninstall unnecessary software  Maintain Backup  Check security settings  Stay Anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about Internet Privacy.
  • 22.
    Types of Cyberattacks, by percentage (source- FBI) Financial fraud 11% Sabotage of data/networks 17% Theft of proprietary information 20% System penetration from the outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 24.
     The termcyber security is used to refer to the security offered through on-line services to protect your online information.  With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.
  • 25.
     The cybersecurity will defend us from critical attacks.  It helps us to browse the safe website.  Internet security process all the incoming and outgoing data on our computer.  security will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted