SlideShare a Scribd company logo
1 of 35
BSCS
Dawood Faheem Abbasi (05)
Umar Ali (36)
Zohaib Maqbool (51)
•GROUP 01
Crimes are not to be measured by the issue of events,
but by the bad intensions of men.
The greatest crime do not arise from a want of feeling
for others but from an over sensibility for ourselves
and an over indulgence in our own desire.
CYBER CRIME
Content list
 Introduction
 History
 Evolution
 Percentage of cyber crimes
 Categories
 Types
 Cyber criminals
 Cyber threats
 Cyber security
 Safety
 Cyber laws in Pakistan
CYBER CRIME
 Crimes committed using a computer.
 Illegal activity committed on the internet.
DEFINING
•Unlawful act wherein computer is either a tool or a target
or both.
•Acts that are punishable by the information technology
act.
HISTORY
First recorded in 1820
In 1820 Joseph-Marie Jacquard, a textile manufacturer
in France produced the loom.
evolution
• 1977 viruses
• 1995 breaking websites
CYBER CRIMES PERCENTAGE
Financial fraud. 11%
Sabotage of data 17%
Information theft 20%
System penetration from outside 25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet privileges 79%
Viruses 85%
CATEGORIES
•Two:
•Computer as a tool.
•Computer as a target.
TYPES
•Financial crimes
•Sale of illegal articles
•Online gambling
•Email spoofing
•Forgery
•Cyber stalking
•Denial of service attacks
•Information theft
•Email bombing
•Vendalism
•Malware
•Software piracy
•Password cracking
•Viruses
•Physically damaging a system
CRIMINALS
•Kids
•Organized hacktivists
•Disgruntled employees
•Professional hackers
CYBERTHREATS
• Cyber Extortion:
Where criminal gangs threat to close down internet based
business if protection money was not paid.
• InformationTheft:
When a computer is infiltrated with purpose of obtaining
information relating user.
• Fraud:
Fraud has many guises on internet, from famous e-mails
promising millions in advance fees to sale of quality goods.
CYBER THREATS
•Phishing :
Obtaining of financial information from victim such as a bank
record or credit card details by sending what look like
authentic messages.
•Vishing:
It is also the obtaining financial information but through voice
messages telling the victim to comply immediately.
CYBER THREATS IN PAKISTAN
According to report of “The Express Tribune”.
• Cyber Stalking:
The repeated use of electronic communication to frighten someone for example
sending threatening e-mails.
• Forgery(Fraud):
The process of making or creating an alteration of genuine documents with the intent
to defraud.
• Internet Time Theft:
The use by an unauthorized person of the internet hours paid by another person.
• Logic Bomb:
A piece of code intentionally inserted into a program that will set off malicious
function when specified conditions are met.
Cyber Threats in Pakistan
• Piracy:
Illegal use or reproduction or distribution of another’s software.
• IdentityTheft :
Identity theft is where cyber criminal steals their victim’s identity and then
transacts usually via internet in name of victim.
• Cyber security
INTRODUCTION
•The term cyber security is used to refer to the security offered
through online service to protect your online information.
•Security problems almost always stem from a mix of technical,
human and organizational causes.
WHATTO UNDERSTAND???
 What is the meaning of word “cyber”?
 Why there is need of cyber security?
 What are the security problems in
cyber field?
 How to implement and maintain security of
a cyber field around us?
CYBER
•Combining form relating to information technology, the
internet and virtual reality.
NEED
•It is necessary since it helps in security data from thefts
such as theft or misuse, it also safeguards from viruses.
PROBLEMS
Viruses
Hackers
Malware
Password cracking
ADVENTAGES
I. Defend from critical attacks
II.Help in browse safe websites
III.Defend from hacks and viruses
IV.It processes all the incoming and outgoing data on
computer
OBJECTIVE OF CYBER SECURITY
•To establish rules and measures to use against attacks
over the internet
CYBER CRIME LAW IN PAKISTAN
•Unfortunately Pakistan is one of the few countries where
cyber crime laws are still in the pipeline waiting for
implementation.
National Response Center for Cyber Crime
(NR3C)
•Cyber crime in Pakistan is growing rapidly with the
exponential growth in usage of mobile phones and
penetration of internet. It is also observed that criminals
are using latest technology to execute their crimes.
These criminals are involved in financial matters,
information stealing and at times even in terrorism.To
counter their activities National Response Center for
Cyber Crime (NR3C) was formed which is able to monitor,
track and catch all such criminals.
PECO(Prevention of Electronic Crimes Ordinance)
•On December 31, 2007, the then president Pervez
Musharraf promulgated a law called The Prevention of
Electronic Crimes Ordinance (PECO) 2007 which lapsed
in 2010.The new PECO 2012 is still under debate in the
NationalAssembly and is being tweaked / redrafted by
the Standing Committee.
•The complaint of fake Facebook profiles is the most
rampant complaint where people created fake a profile
of any person.
•Use antivirus software
•Insert firewalls
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Never give your full name or address to strangers
•Learn more about privacy
CONCLUSION
•Its need of time to spread awareness of cyber security.
•I hope that our presentation will be helpful for our
audience to improve their knowledge about cyber
security and to overcome several security issues on their
computer operations.

More Related Content

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Ppt
PptPpt
Ppt
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 

Similar to Cyber crime.pptx

Similar to Cyber crime.pptx (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptx
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 

More from Dawood Faheem Abbasi (11)

First and follow set
First and follow setFirst and follow set
First and follow set
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Report writing
Report writingReport writing
Report writing
 
UML constructs
UML constructs UML constructs
UML constructs
 
Mathematical induction and divisibility rules
Mathematical induction and divisibility rulesMathematical induction and divisibility rules
Mathematical induction and divisibility rules
 
Hashing
HashingHashing
Hashing
 
Features of-RC-quad-copter
Features of-RC-quad-copter Features of-RC-quad-copter
Features of-RC-quad-copter
 
7 cs of communication
7 cs of communication7 cs of communication
7 cs of communication
 
Geography of pakistan
Geography of pakistanGeography of pakistan
Geography of pakistan
 
FET (Field Effect Transistors)
FET (Field Effect Transistors)FET (Field Effect Transistors)
FET (Field Effect Transistors)
 
BJT’s (bipolar junction transistor)
BJT’s (bipolar junction transistor)BJT’s (bipolar junction transistor)
BJT’s (bipolar junction transistor)
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Cyber crime.pptx

  • 1.
  • 2.
  • 3. BSCS Dawood Faheem Abbasi (05) Umar Ali (36) Zohaib Maqbool (51) •GROUP 01
  • 4. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desire.
  • 6. Content list  Introduction  History  Evolution  Percentage of cyber crimes  Categories  Types  Cyber criminals  Cyber threats  Cyber security  Safety  Cyber laws in Pakistan
  • 7. CYBER CRIME  Crimes committed using a computer.  Illegal activity committed on the internet.
  • 8. DEFINING •Unlawful act wherein computer is either a tool or a target or both. •Acts that are punishable by the information technology act.
  • 9. HISTORY First recorded in 1820 In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.
  • 10. evolution • 1977 viruses • 1995 breaking websites
  • 11. CYBER CRIMES PERCENTAGE Financial fraud. 11% Sabotage of data 17% Information theft 20% System penetration from outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 12. CATEGORIES •Two: •Computer as a tool. •Computer as a target.
  • 13. TYPES •Financial crimes •Sale of illegal articles •Online gambling •Email spoofing •Forgery •Cyber stalking •Denial of service attacks
  • 14. •Information theft •Email bombing •Vendalism •Malware •Software piracy •Password cracking •Viruses •Physically damaging a system
  • 16. CYBERTHREATS • Cyber Extortion: Where criminal gangs threat to close down internet based business if protection money was not paid. • InformationTheft: When a computer is infiltrated with purpose of obtaining information relating user. • Fraud: Fraud has many guises on internet, from famous e-mails promising millions in advance fees to sale of quality goods.
  • 17. CYBER THREATS •Phishing : Obtaining of financial information from victim such as a bank record or credit card details by sending what look like authentic messages. •Vishing: It is also the obtaining financial information but through voice messages telling the victim to comply immediately.
  • 18. CYBER THREATS IN PAKISTAN According to report of “The Express Tribune”. • Cyber Stalking: The repeated use of electronic communication to frighten someone for example sending threatening e-mails. • Forgery(Fraud): The process of making or creating an alteration of genuine documents with the intent to defraud. • Internet Time Theft: The use by an unauthorized person of the internet hours paid by another person. • Logic Bomb: A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.
  • 19. Cyber Threats in Pakistan • Piracy: Illegal use or reproduction or distribution of another’s software. • IdentityTheft : Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.
  • 21. INTRODUCTION •The term cyber security is used to refer to the security offered through online service to protect your online information. •Security problems almost always stem from a mix of technical, human and organizational causes.
  • 22. WHATTO UNDERSTAND???  What is the meaning of word “cyber”?  Why there is need of cyber security?  What are the security problems in cyber field?  How to implement and maintain security of a cyber field around us?
  • 23. CYBER •Combining form relating to information technology, the internet and virtual reality.
  • 24. NEED •It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.
  • 26. ADVENTAGES I. Defend from critical attacks II.Help in browse safe websites III.Defend from hacks and viruses IV.It processes all the incoming and outgoing data on computer
  • 27. OBJECTIVE OF CYBER SECURITY •To establish rules and measures to use against attacks over the internet
  • 28. CYBER CRIME LAW IN PAKISTAN
  • 29. •Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.
  • 30. National Response Center for Cyber Crime (NR3C) •Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism.To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.
  • 31. PECO(Prevention of Electronic Crimes Ordinance) •On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in 2010.The new PECO 2012 is still under debate in the NationalAssembly and is being tweaked / redrafted by the Standing Committee. •The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.
  • 32.
  • 33. •Use antivirus software •Insert firewalls •Uninstall unnecessary software •Maintain backup •Check security settings •Never give your full name or address to strangers •Learn more about privacy
  • 34.
  • 35. CONCLUSION •Its need of time to spread awareness of cyber security. •I hope that our presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.