Cyber crime has been on the rise in Pakistan over the past decade according to statistics from the country's Federal Investigation Agency (FIA). The number of reported cyber crime cases increased five-fold between 2007 and 2010. Common forms of cyber crime include hacking, data theft, email bombing, denial of service attacks, and financial crimes like salami attacks. The document outlines the history of some notable cyber crimes and provides an overview of different types of cyber crimes, their nature, and risks. It concludes with emphasizing the growing threat of cyber crimes in Pakistan.
3. HISTORY OF CYBER CRIME
The first spam email took place in
1978 when it was sent out over
the Arpanet. Advanced Research
Projects Agency Network
(ARPANET)
The first virus was installed on an
Apple computer in 1982
16-year-old student, nicknamed
“Data Stream”, arrested by UK
police(1994)
4. HISTORY
FBI's e-mail system is
hacked (Feb,2005)
Travelling documents of
NATO forces were hacked
in Afghanistan.
Denial of Service (DoS)
attacks by ‘Mafia Boy’ on
eBay, Yahoo! and other
popular sites (2000)
5. HISTORY
• Swedish bank Nordea was hit
with possibly the biggest
internet fraud in history
• £600 000 (1 million USD) was
stolen in three months from
250 customer accounts
• They obtained the account
information through a anti-
spam software sent by emails
6. CYBER CRIME IN PAKISTAN
Cyber Crime Rises Rapidly in Pakistan
The cyber crimes of multiple kinds in Pakistan have increased by five times over the
past four years
According to CCU a branch of FIA
a. 62 cases were reported to the unit in
2007,
b. 287 cases in 2008
c. Ratio dropped in 2009
d. In 2010 more than 312 cases were
registered in different categories of
cyber crimes.
11. TYPE OF INTERNET CRIME
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Denial of
Service
attacks
Trojan
attacks
Web jacking
12. TYPE OF CYBER CRIME
E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the
victim resulting in interruption in the victims’ e-mail account or mail servers.
Data Diddling: This kind of an attack involves altering the raw data just before it is
processed by a computer and then changing it back after the processing is completed.
Salami Attacks: These attacks are used for the commission of financial crimes. A
bank employee inserts a program into bank’s servers, that deducts a small amount
from the account of every customer
Denial of Service: This involves flooding computer resources with more requests
than it can handle. This causes the resources to crash thereby denying authorized
users the service offered by the resources.