SlideShare a Scribd company logo
1 of 28
Cyber Crime.
Presented By :
Cyber Crime
Cyber Crime : Types
:
:
Cyber Crime : History
CYBER CRIME CATEGORIES
HACKING
• Trying to get into computer systems in order to steal, corrupt, or
illegitimately view data.
WEBSITE DEFACEMENT
CYBER BULLYING
CYBER STALKING
CHILD PORNOGRAPHY
SOCIAL ENGINEERING
DATA THEFT
FINANCIAL FRAUD
COMPUTER VIRUSES AND WORMS
INTELLECTUAL PROPERTY RIGHTS
Intellectual property rights is concerned with any act that allows
access to patent, trade secrets, customer data, sales trends, and
any confidential information.
DENIAL OF SERVICE ATTACK
A Denial-of-Service (DoS) attack is
mounted with the objective of causing a
negative impact on the performance of a
computer or network. It is also known as
a network saturation attack or bandwidth
consumption attack. Attackers perform
DoS attacks by sending a large number
of protocol packets to the network
MAJOR ONLINE ACTIVITIES
• In Pakistan, internet users range from 10% to 16% of the overall
population
• Social networking
• Online banking
• Internet surfing
• Audio & video communication
• Entertainment
• Online shopping
MAJOR ONLINE ACTIVITIES
• Map directions / GPS
• Online education
• Online auction
• Information sharing
• Medical assistance
• Online games
Cyber Crime : Disadvantages
CYBER CRIME
PREVENTION TIPS
SECURE YOUR SMART PHONES
• Always secure your Smartphone with a
strong password
• Ensure that your device locks itself
automatically
• Install security software
• Only download apps from approved
sources
• Check your apps permissions
• Don't miss operating system updates
SECURE YOUR SMART PHONES
• Be wary of any links you receive via email or text message
• Turn off automatic Wi-Fi connection
• When browsing or shopping on your phone (or computer), always
look for "https" in the url instead of "http"
SECURE YOUR ONLINE BANKING
• Never use same PIN CODE for multiple bank accounts
• Never use unprotected PCs at cybercafés for internet banking
• Never keep your pin code and cards together
• Never leave the PC unattended when using internet banking in a
public place
• Register for Mobile SMS, Email Transaction Alerts
• Never reply to emails asking for your password or pin code
SECURE YOUR ONLINE BANKING
• Visit banks website by typing the URL in the address bar
• Log off and close your browser when you are done using internet
banking
• When using ATM always conceal keypad before entering pin code
• Before using ATM, make sure that there is no extra device installed
in the surroundings
SECURE YOUR FACEBOOK
• Use extra security features to access account (security code, Login
alert etc)
• Use login notification alert
• Allow specific individuals to view your contents (Videos, Photos and
Friends etc.)
• Control who can contact you
• Block your profile from search engines
SECURE YOUR WI-FI
• Change Default Administrator Passwords and Usernames of the Wi-
Fi Router
• Use complex password and change Password after regular
intervals
• Position the Router or Access Point Safely
• Turn off the Network / Wi-Fi routers if it is not in use
SECURE YOUR BROWSING
• What you put online will always remain there
• Never trust any free online content
• Don't provide personal information online to get something free
• Don’t click on links inside e-mails or messages

More Related Content

Similar to Cyber Crime..pptx

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Thefthotspotshield
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy ARYAS87
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessShwetaSingh713663
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 

Similar to Cyber Crime..pptx (20)

Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
ICT Security is Everyone's Business
ICT Security is Everyone's BusinessICT Security is Everyone's Business
ICT Security is Everyone's Business
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Browser security
Browser securityBrowser security
Browser security
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Cyber Crime..pptx

  • 3.
  • 4. Cyber Crime : Types : :
  • 5. Cyber Crime : History
  • 7. HACKING • Trying to get into computer systems in order to steal, corrupt, or illegitimately view data.
  • 16. INTELLECTUAL PROPERTY RIGHTS Intellectual property rights is concerned with any act that allows access to patent, trade secrets, customer data, sales trends, and any confidential information.
  • 17. DENIAL OF SERVICE ATTACK A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network
  • 18. MAJOR ONLINE ACTIVITIES • In Pakistan, internet users range from 10% to 16% of the overall population • Social networking • Online banking • Internet surfing • Audio & video communication • Entertainment • Online shopping
  • 19. MAJOR ONLINE ACTIVITIES • Map directions / GPS • Online education • Online auction • Information sharing • Medical assistance • Online games
  • 20. Cyber Crime : Disadvantages
  • 22. SECURE YOUR SMART PHONES • Always secure your Smartphone with a strong password • Ensure that your device locks itself automatically • Install security software • Only download apps from approved sources • Check your apps permissions • Don't miss operating system updates
  • 23. SECURE YOUR SMART PHONES • Be wary of any links you receive via email or text message • Turn off automatic Wi-Fi connection • When browsing or shopping on your phone (or computer), always look for "https" in the url instead of "http"
  • 24. SECURE YOUR ONLINE BANKING • Never use same PIN CODE for multiple bank accounts • Never use unprotected PCs at cybercafés for internet banking • Never keep your pin code and cards together • Never leave the PC unattended when using internet banking in a public place • Register for Mobile SMS, Email Transaction Alerts • Never reply to emails asking for your password or pin code
  • 25. SECURE YOUR ONLINE BANKING • Visit banks website by typing the URL in the address bar • Log off and close your browser when you are done using internet banking • When using ATM always conceal keypad before entering pin code • Before using ATM, make sure that there is no extra device installed in the surroundings
  • 26. SECURE YOUR FACEBOOK • Use extra security features to access account (security code, Login alert etc) • Use login notification alert • Allow specific individuals to view your contents (Videos, Photos and Friends etc.) • Control who can contact you • Block your profile from search engines
  • 27. SECURE YOUR WI-FI • Change Default Administrator Passwords and Usernames of the Wi- Fi Router • Use complex password and change Password after regular intervals • Position the Router or Access Point Safely • Turn off the Network / Wi-Fi routers if it is not in use
  • 28. SECURE YOUR BROWSING • What you put online will always remain there • Never trust any free online content • Don't provide personal information online to get something free • Don’t click on links inside e-mails or messages