SlideShare a Scribd company logo
Computer
Science
Presented by:
OLYMPIA
 KENZA JAMIL
 FARWA ZAHEER
 ALI ARSHAD
1
2
OBJECTIVE
OVERVIEWS
 Introduction.
 Definition.
 History.
 Categories of cyber crime.
 Computer as target.
 Computer as a weapon.
 Types of cyber crime.
 Security.
 Conclusion.
3
INTRODUCTION
4
• The internet in Pakistan is growing rapidly. It has given
rise to new opportunities in every field i.e ;
entertainment, business, sports or education.
• There are two sides to a coin. Internet also has it’s
own disadvantages such as Cyber crime; illegal
activity committed on the internet.
DEFINING CYBER CRIME
5
• Crime committed using a computer and
the internet to steal data or information.
• Illegal import or export.
Cyber crime
is nothing but where
the computer used as an object
or subject of crime..
6
HISTORY
7
• The first recorded cyber crime took
place in the year 1981.
• By captain Zap.
1st cyber crime in Pakistan
The 1st ever cyber crime in Pakistan was
reported in 2003 at Karachi.
8
CATEGORIZATION OF
CYBER CRIME
9
• Computer as a target
• Computer as a weapon
Computer as a target
• Computers can be the target of a criminal
activity, a storage place of data for criminal
activities
• One of the most publicized crimes
targeting computers involves unleashing a
virus through email.
10
Computer as a weapon
• Use of a computer as a weapon for
committing crimes such as committing fraud,
identities theft or breaching privacy.
11
Ransom ware
• Ransom ware is an example in which
computer is used as weapon.
• Ransom ware enables cyber extortion for
financial gain. Once activated, Ransom ware
prevents users from interacting with their files.
12
TYPES OF CYBER CRIME
13
• Hacking.
• Denial of service attack(DoS).
• Credit card fraud.
• Virus Dispersal.
• Computer Vandalism
• Cyber Terrorism.
• Software Piracy.
1:
HACKIN
G
14
• Hacking in simple terms means an
illegal intrusion into a computer
system and/or network.
2: DENIAL OF SERVICEATTACK
15
• A Denial-of-Service(DoS)attack is
an attack meant to shut down a machine
or network, making it inaccessible to
users.
3: Credit card Fraud
16
• Credit card fraud is the unauthorized
use of a credit or debitcard to
fraudulently obtain money or property.
4: VIRUS DISPERSAL
17
• Malicious software that attaches itself
to other software. (virus and e-mail
bombing etc.)
5: COMPUTER
VANDALISM
18
• Damaging or destroying data rather
than stealing.
• Transmitting virus.
6: CYBER
TERRORISM
19
• The politically motivated use of
computers and information technology to
cause severe disruption or widespread
fear in society.
7: SOFTWARE
PIRACY
20
• Software piracy is the act of
stealing software that is legally
protected. This stealing includes
copying, modifying or selling
the software.
TYPES OF CYBER ATTACK
BY PERCENTAGE
21
• Financial fraud:
• Destruction of data/networks:
• Theft of proprietary information:
• System penetration from the outside:
• Denial of service:
• Employee abuse of internet privileges
• Viruses
11%
17%
20%
25%
27%
79%
85%
SAFETY TIPS FOR CYBER
CRIME
22
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless
screen name.
• Never give your full name or address to
strangers.
• Learn more about Internet privacy.
SECURITY.
..
23
CYBER SECURITY
24
• Internet security is a branch of computer
security specifically related to the Internet.
• It's objective is to establish rules and measures
to use against attacks over the Internet.
ADVANTAGES OF CYBER
SECURITY
25
• Defend us from critical cyber attacks.
• Browse the safe website.
• Internet security processes all the incoming
and outgoing data on our computer.
CONCLUS
ION
• The key to protecting yourself is being aware.
• Not all cybercriminals are hackers.
• Make sure , your information travels safely.
• Stay safe , stay secure.
26
Stay safe, Stay secure…
27
28

More Related Content

What's hot

Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
Risk Crew
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
jordan67370
 
ICT ICA3
ICT ICA3ICT ICA3
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
Jisc
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
Shreedeep Rayamajhi
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014
Jacqueline Fick
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
n|u - The Open Security Community
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethic
Syed Ali Hassan
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
Kristian Alisasis Pura
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
Pierluigi Paganini
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
Charles Mok
 

What's hot (20)

Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethic
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 

Similar to cyber crime it presentation

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Shreyash Patel
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
Arshad Khan
 
cyber crime
 cyber crime cyber crime
cyber crime
sonalpandey11
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber security
Cyber security        Cyber security
Cyber security
Shubhamlohiya
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
 
My presentation
My presentationMy presentation
My presentation
sa12chindra
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
BigBoss647822
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Nur Athirah
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
gtxgeforce67
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
Raaz Shukla
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
cyber crime
cyber crimecyber crime
cyber crime
Mukund10
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Andrea Rossetti
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
RitamaJana
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Similar to cyber crime it presentation (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
My presentation
My presentationMy presentation
My presentation
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Recently uploaded

Ahmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In Ahmedabad
Ahmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In AhmedabadAhmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In Ahmedabad
Ahmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In Ahmedabad
babesbookhot
 
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
lopezkatherina914
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
fyguxu
 
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
bttak
 
The Future of Wearable Technology in Healthcare: Innovations and Trends to Watch
The Future of Wearable Technology in Healthcare: Innovations and Trends to WatchThe Future of Wearable Technology in Healthcare: Innovations and Trends to Watch
The Future of Wearable Technology in Healthcare: Innovations and Trends to Watch
bluetroyvictorVinay
 
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
hanniaarias53
 
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
bttak
 
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkataℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
nhero3888
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
bttak
 
一比一原版办理(Caltech毕业证)加州理工学院毕业证
一比一原版办理(Caltech毕业证)加州理工学院毕业证一比一原版办理(Caltech毕业证)加州理工学院毕业证
一比一原版办理(Caltech毕业证)加州理工学院毕业证
kboqz
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
uwoso
 
Company Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In IndiaCompany Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In India
soumotempcon
 
世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】
世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】
世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】
bljeremy734
 
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
akrooshsaleem36
 
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER""IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
Emmanuel Onwumere
 
一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理
一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理
一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理
mbawufebxi
 
We’re Underestimating the Damage Extreme Weather Does to Rooftop Solar Panels
We’re Underestimating the Damage Extreme Weather Does to Rooftop Solar PanelsWe’re Underestimating the Damage Extreme Weather Does to Rooftop Solar Panels
We’re Underestimating the Damage Extreme Weather Does to Rooftop Solar Panels
Grid Freedom Inc.
 
Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...
Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...
Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...
rosankumar564363
 

Recently uploaded (19)

Ahmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In Ahmedabad
Ahmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In AhmedabadAhmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In Ahmedabad
Ahmedabad ℂall Girl Book 🤑 7488326553 🤑 ℂall Girl Service In Ahmedabad
 
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
欧洲杯体彩-欧洲杯体彩比赛投注-欧洲杯体彩比赛投注官网|【​网址​🎉ac99.net🎉​】
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
 
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版不列颠哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
The Future of Wearable Technology in Healthcare: Innovations and Trends to Watch
The Future of Wearable Technology in Healthcare: Innovations and Trends to WatchThe Future of Wearable Technology in Healthcare: Innovations and Trends to Watch
The Future of Wearable Technology in Healthcare: Innovations and Trends to Watch
 
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
欧洲杯赌钱-欧洲杯赌钱冠军-欧洲杯赌钱冠军赔率|【​网址​🎉ac10.net🎉​】
 
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
一比一原版西三一大学毕业证(TWU毕业证书)学历如何办理
 
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkataℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
 
一比一原版办理(Caltech毕业证)加州理工学院毕业证
一比一原版办理(Caltech毕业证)加州理工学院毕业证一比一原版办理(Caltech毕业证)加州理工学院毕业证
一比一原版办理(Caltech毕业证)加州理工学院毕业证
 
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
按照学校原版(UPenn文凭证书)宾夕法尼亚大学毕业证快速办理
 
Company Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In IndiaCompany Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In India
 
世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】
世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】
世预赛投注-世预赛投注投注官网app-世预赛投注官网app下载|【​网址​🎉ac123.net🎉​】
 
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
欧洲杯投注-欧洲杯投注押注app-欧洲杯投注押注app官网|【​网址​🎉ac10.net🎉​】
 
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER""IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
"IOS 18 CONTROL CENTRE REVAMP STREAMLINED IPHONE SHUTDOWN MADE EASIER"
 
一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理
一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理
一比一原版(SBU毕业证书)肯特州立大学毕业证如何办理
 
We’re Underestimating the Damage Extreme Weather Does to Rooftop Solar Panels
We’re Underestimating the Damage Extreme Weather Does to Rooftop Solar PanelsWe’re Underestimating the Damage Extreme Weather Does to Rooftop Solar Panels
We’re Underestimating the Damage Extreme Weather Does to Rooftop Solar Panels
 
Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...
Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...
Call Girls in Noida (Uttar Pradesh ) call me [🔝9899900591🔝] Escort In Noida s...
 

cyber crime it presentation

  • 1. Computer Science Presented by: OLYMPIA  KENZA JAMIL  FARWA ZAHEER  ALI ARSHAD 1
  • 2. 2
  • 3. OBJECTIVE OVERVIEWS  Introduction.  Definition.  History.  Categories of cyber crime.  Computer as target.  Computer as a weapon.  Types of cyber crime.  Security.  Conclusion. 3
  • 4. INTRODUCTION 4 • The internet in Pakistan is growing rapidly. It has given rise to new opportunities in every field i.e ; entertainment, business, sports or education. • There are two sides to a coin. Internet also has it’s own disadvantages such as Cyber crime; illegal activity committed on the internet.
  • 5. DEFINING CYBER CRIME 5 • Crime committed using a computer and the internet to steal data or information. • Illegal import or export.
  • 6. Cyber crime is nothing but where the computer used as an object or subject of crime.. 6
  • 7. HISTORY 7 • The first recorded cyber crime took place in the year 1981. • By captain Zap.
  • 8. 1st cyber crime in Pakistan The 1st ever cyber crime in Pakistan was reported in 2003 at Karachi. 8
  • 9. CATEGORIZATION OF CYBER CRIME 9 • Computer as a target • Computer as a weapon
  • 10. Computer as a target • Computers can be the target of a criminal activity, a storage place of data for criminal activities • One of the most publicized crimes targeting computers involves unleashing a virus through email. 10
  • 11. Computer as a weapon • Use of a computer as a weapon for committing crimes such as committing fraud, identities theft or breaching privacy. 11
  • 12. Ransom ware • Ransom ware is an example in which computer is used as weapon. • Ransom ware enables cyber extortion for financial gain. Once activated, Ransom ware prevents users from interacting with their files. 12
  • 13. TYPES OF CYBER CRIME 13 • Hacking. • Denial of service attack(DoS). • Credit card fraud. • Virus Dispersal. • Computer Vandalism • Cyber Terrorism. • Software Piracy.
  • 14. 1: HACKIN G 14 • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 15. 2: DENIAL OF SERVICEATTACK 15 • A Denial-of-Service(DoS)attack is an attack meant to shut down a machine or network, making it inaccessible to users.
  • 16. 3: Credit card Fraud 16 • Credit card fraud is the unauthorized use of a credit or debitcard to fraudulently obtain money or property.
  • 17. 4: VIRUS DISPERSAL 17 • Malicious software that attaches itself to other software. (virus and e-mail bombing etc.)
  • 18. 5: COMPUTER VANDALISM 18 • Damaging or destroying data rather than stealing. • Transmitting virus.
  • 19. 6: CYBER TERRORISM 19 • The politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.
  • 20. 7: SOFTWARE PIRACY 20 • Software piracy is the act of stealing software that is legally protected. This stealing includes copying, modifying or selling the software.
  • 21. TYPES OF CYBER ATTACK BY PERCENTAGE 21 • Financial fraud: • Destruction of data/networks: • Theft of proprietary information: • System penetration from the outside: • Denial of service: • Employee abuse of internet privileges • Viruses 11% 17% 20% 25% 27% 79% 85%
  • 22. SAFETY TIPS FOR CYBER CRIME 22 • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy.
  • 24. CYBER SECURITY 24 • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measures to use against attacks over the Internet.
  • 25. ADVANTAGES OF CYBER SECURITY 25 • Defend us from critical cyber attacks. • Browse the safe website. • Internet security processes all the incoming and outgoing data on our computer.
  • 26. CONCLUS ION • The key to protecting yourself is being aware. • Not all cybercriminals are hackers. • Make sure , your information travels safely. • Stay safe , stay secure. 26
  • 27. Stay safe, Stay secure… 27
  • 28. 28