SlideShare a Scribd company logo
Group Members
•
•
•
•
•
•

Muhammad NASIR
Waqas AHMAD
Maryam BATOOL
M.Tahir SHAH
Sarfraz AHMAD
Javaad AHMAD

MB-12-04
MB-12-05
MB-12-06
MB-12-64
MB-12-65
MB-12-66
CYBER CRIMES
What are cyber crimes
• Offences that are committed against
individuals or groups of individuals (by
using computer) with a criminal motive to
intentionally harm the reputation of the
victim or cause physical or mental harm to
the victim directly or indirectly.
Historical Perspective
• 1960s and 1970s:
Hacker: a positive term
A Hacker: An expert, knowledgeable about programming
and operating systems
• 1970s onwards:
Hacker: a term, which progressively became more
negative.
A Hacker: Someone using computers without authorization
Why we study about cyber crimes
• Almost every one is using computer
From white collar criminals to terrorist
organizations and from teenagers to adults
• Conventional crimes like Forgery , extortion, and
kidnapping etc. are being committed with the
help of computer
• New generation is growing up with computers
• MOST IMPORTANT business transactions are
carried out through internet.
Profile of cyber criminals
•
•
•
•
•
•
•

Disgruntled employee.
Teenagers.
Professional hackers.
Business rivals.
Political hacktivists.
Ex-friends.
Divorced husband etc.
Common cyber crime attacks
•
•
•
•
•
•
•

Hacking
Cracking
Script kiddies
Vandals
Spoofing
Denial of services
Snooping
Common cyber crimes attacks
•
•
•
•
•
•
•

Software privacy
Net Extortion
Virus dissemination
Phishing
Cyber Stalking
Salami attacks
Credit card fraud
Hacking
Hacking is access of computer resource,
without authorization

Cracking
A hacker who uses his or her skills to
commit unlawful acts, or to deliberately
create mischief
Script kiddies
A hacker who downloads the scripts and
uses them to commit unlawful acts, or to
deliberately create mischief, without fully
understanding the scripts

Vandals
A person who deliberately destroys or
damages public or private property by
using computer
Spoofing
Spoofing is the criminally fraudulent
process of attempting to acquire sensitive
information such as usernames,
passwords and credit card details etc.

Denial of services
Any problem that makes it difficult or
impossible for the system to continue to
perform productive work
Snooping
• Snooping is unauthorized access to
another person's or company's data. The
practice is similar to eavesdropping but is
not necessarily limited to gaining access
to data during its transmission. Snooping
can include casual observance of an email or watching what someone else is
typing.
Software privacy
• Theft of software through illegal copying of
genuine programs.
Retail revenue losses are ever increasing
due to this crime.
This can be done in various ways such as
end user copying, hard disk loading and
illegal download from the internet.
Net Extortion
• Copying the company confidential data in order
to extort said company for huge amount.

Virus dissemination
Malicious software that attaches itself to t other
software.
(virus, worms, Trojan horse. Time bomb, rabbit
and bacterium are the malicious soft wares.
Credit card Frauds
• You simply have to type your credit card
number into www page off the vender for
online transaction and if electronic
transactions are not secured the credit
card number can be stolen by the hacker
who can misuse this credit card.
PHISHING
• It is technique of pulling out confidential
information from the bank or financial
institutional account holders by deceptive
means.

Credit card writer
ATM as usual
Inside the box
Cyber Stalking
• The cyber follows the victim by sending
emails or entering the chat rooms
frequently

Threatening
•

The criminals sends threatening email or
comes in contact in chat rooms with
victims.
Salami Attack
• In such crime criminal makes insignificant
changes in such a manner that such
changes would go unnoticed.
Criminal makes such programs that
deducts small amounts as 2.5 rupees from
all the customers accounts of a bank and
deposits in his own account. In such a
case no customer will approach to bank
for such small amount.
Pakistan is one of the few countries where cyber
crime laws are still in the pipeline waiting for
implementation. It is certainly not as if we don’t
face that many cyber crimes here.
In fact, Pakistan is currently facing the
following types of it:
Cyber Crimes in Pakistan
•
•
•
•
•
•
•
•

Financial crimes
Cyber pornography
Sale of illegal articles
Online gambling
Intellectual property crimes
Email spoofing
Cyber stalking
Forgery
• Unauthorized access to computer
systemsnetworks
• Theft of information contained in
electronic form
• Virus/worm attacks
• Trojan attacks
• Internet time theft
• Password cracking
General Preventions
• Spam blocker
Turn on your spam blocker. Most Internet
providers provide a spam blocking feature
to prevent unwanted messages.

• Firewall protection
Use your computer's firewall protection
feature, which is a digitally created barrier
that prevents hackers from getting into
your computer system. Always keep it
turned on.
Anti-virus software
Make sure you have adequate anti-virus
software for your computer. You also need
to make sure you regularly update your
anti-virus software and that you do a oncea-week scan to locate and eliminate any
malware, spyware, viruses and other
problems.
Encryption software
• Encrypt important data you don't want
compromised. Utilize encryption software,
which "garbles" your data to make it
unintelligible to anyone who tries to hack
into your computer system.
Caution in providing personal
information
• Be wary of providing personal
information via a website you know
nothing about, especially those that
ask for your name, mailing address,
bank account number or social
security number.
Secure shopping
• Make sure that you do online shopping on
a secure website, like those with a url that
starts with "https" and/or have a TRUSTe
or VeriSign seal. If you don't see these
anywhere on the site, you run the risk of
submitting credit card information and
other personal information to a site that
may be a fraud
Monitoring activities
• Monitor the online activities of your
children. They should only have access to
a computer located in a central area of
your home and you should regularly check
all browser and email activity
Cyber crimes
Cyber crimes

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
Bill Gibbs
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
Jay Visavadiya
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
Nithin Raj
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
DivithC
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
vimal kumar arora
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Ivy Rose Recierdo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Abir Rahman
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
cyber crime
cyber crimecyber crime
cyber crime
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 

Viewers also liked

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
Er Mahendra Yadav
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (11)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Cyber crimes

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
Quick Heal Technologies Ltd.
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
sweta dargad
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 

Similar to Cyber crimes (20)

Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from ACCA Global

certificate_24701
certificate_24701certificate_24701
certificate_24701ACCA Global
 
A Feasibility Report of doing Blue Pottery business in India
A Feasibility Report of doing Blue Pottery business in IndiaA Feasibility Report of doing Blue Pottery business in India
A Feasibility Report of doing Blue Pottery business in IndiaACCA Global
 
How to walk like a model
How to walk like a modelHow to walk like a model
How to walk like a modelACCA Global
 
Dhirubhai Ambani--Personality Profile
Dhirubhai Ambani--Personality ProfileDhirubhai Ambani--Personality Profile
Dhirubhai Ambani--Personality ProfileACCA Global
 
How to walk like a model
How to walk like a modelHow to walk like a model
How to walk like a modelACCA Global
 
Sindh Festival, Peace and Prosperity through Culture by Omer Shahzad
Sindh Festival, Peace and Prosperity through Culture by Omer ShahzadSindh Festival, Peace and Prosperity through Culture by Omer Shahzad
Sindh Festival, Peace and Prosperity through Culture by Omer ShahzadACCA Global
 
Governments, Market and International Trade
Governments, Market and International TradeGovernments, Market and International Trade
Governments, Market and International Trade
ACCA Global
 
Communication and Consumer Behavior
Communication and Consumer BehaviorCommunication and Consumer Behavior
Communication and Consumer BehaviorACCA Global
 
Software application
Software applicationSoftware application
Software applicationACCA Global
 
The impact of workforce diversity on organizational effectiveness
The impact of workforce diversity on organizational effectivenessThe impact of workforce diversity on organizational effectiveness
The impact of workforce diversity on organizational effectivenessACCA Global
 
The effects of leadership styles & organizational culture over firm performance
The effects of leadership styles & organizational culture over firm performanceThe effects of leadership styles & organizational culture over firm performance
The effects of leadership styles & organizational culture over firm performanceACCA Global
 
Sindh festival peace and prosperity through culture
Sindh festival  peace and prosperity through cultureSindh festival  peace and prosperity through culture
Sindh festival peace and prosperity through cultureACCA Global
 
Telenor's Human Resource information System Report
Telenor's Human Resource information System ReportTelenor's Human Resource information System Report
Telenor's Human Resource information System ReportACCA Global
 
Buliding a Company like Steve Jobs did
Buliding a Company like Steve Jobs didBuliding a Company like Steve Jobs did
Buliding a Company like Steve Jobs didACCA Global
 
ATLAS HONDA ratio analysis
ATLAS HONDA ratio analysisATLAS HONDA ratio analysis
ATLAS HONDA ratio analysisACCA Global
 

More from ACCA Global (20)

certificate_181
certificate_181certificate_181
certificate_181
 
certificate_66
certificate_66certificate_66
certificate_66
 
certificate_24701
certificate_24701certificate_24701
certificate_24701
 
A Feasibility Report of doing Blue Pottery business in India
A Feasibility Report of doing Blue Pottery business in IndiaA Feasibility Report of doing Blue Pottery business in India
A Feasibility Report of doing Blue Pottery business in India
 
How to walk like a model
How to walk like a modelHow to walk like a model
How to walk like a model
 
Dhirubhai Ambani--Personality Profile
Dhirubhai Ambani--Personality ProfileDhirubhai Ambani--Personality Profile
Dhirubhai Ambani--Personality Profile
 
How to walk like a model
How to walk like a modelHow to walk like a model
How to walk like a model
 
Sindh Festival, Peace and Prosperity through Culture by Omer Shahzad
Sindh Festival, Peace and Prosperity through Culture by Omer ShahzadSindh Festival, Peace and Prosperity through Culture by Omer Shahzad
Sindh Festival, Peace and Prosperity through Culture by Omer Shahzad
 
Governments, Market and International Trade
Governments, Market and International TradeGovernments, Market and International Trade
Governments, Market and International Trade
 
Communication and Consumer Behavior
Communication and Consumer BehaviorCommunication and Consumer Behavior
Communication and Consumer Behavior
 
Prezi Software
Prezi SoftwarePrezi Software
Prezi Software
 
Software application
Software applicationSoftware application
Software application
 
App softwares
App softwaresApp softwares
App softwares
 
The impact of workforce diversity on organizational effectiveness
The impact of workforce diversity on organizational effectivenessThe impact of workforce diversity on organizational effectiveness
The impact of workforce diversity on organizational effectiveness
 
The effects of leadership styles & organizational culture over firm performance
The effects of leadership styles & organizational culture over firm performanceThe effects of leadership styles & organizational culture over firm performance
The effects of leadership styles & organizational culture over firm performance
 
Sindh festival peace and prosperity through culture
Sindh festival  peace and prosperity through cultureSindh festival  peace and prosperity through culture
Sindh festival peace and prosperity through culture
 
Telenor's Human Resource information System Report
Telenor's Human Resource information System ReportTelenor's Human Resource information System Report
Telenor's Human Resource information System Report
 
Buliding a Company like Steve Jobs did
Buliding a Company like Steve Jobs didBuliding a Company like Steve Jobs did
Buliding a Company like Steve Jobs did
 
ATLAS HONDA ratio analysis
ATLAS HONDA ratio analysisATLAS HONDA ratio analysis
ATLAS HONDA ratio analysis
 
Consumption
ConsumptionConsumption
Consumption
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 

Cyber crimes

  • 1.
  • 2. Group Members • • • • • • Muhammad NASIR Waqas AHMAD Maryam BATOOL M.Tahir SHAH Sarfraz AHMAD Javaad AHMAD MB-12-04 MB-12-05 MB-12-06 MB-12-64 MB-12-65 MB-12-66
  • 4. What are cyber crimes • Offences that are committed against individuals or groups of individuals (by using computer) with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly.
  • 5. Historical Perspective • 1960s and 1970s: Hacker: a positive term A Hacker: An expert, knowledgeable about programming and operating systems • 1970s onwards: Hacker: a term, which progressively became more negative. A Hacker: Someone using computers without authorization
  • 6. Why we study about cyber crimes • Almost every one is using computer From white collar criminals to terrorist organizations and from teenagers to adults • Conventional crimes like Forgery , extortion, and kidnapping etc. are being committed with the help of computer • New generation is growing up with computers • MOST IMPORTANT business transactions are carried out through internet.
  • 7. Profile of cyber criminals • • • • • • • Disgruntled employee. Teenagers. Professional hackers. Business rivals. Political hacktivists. Ex-friends. Divorced husband etc.
  • 8. Common cyber crime attacks • • • • • • • Hacking Cracking Script kiddies Vandals Spoofing Denial of services Snooping
  • 9. Common cyber crimes attacks • • • • • • • Software privacy Net Extortion Virus dissemination Phishing Cyber Stalking Salami attacks Credit card fraud
  • 10. Hacking Hacking is access of computer resource, without authorization Cracking A hacker who uses his or her skills to commit unlawful acts, or to deliberately create mischief
  • 11. Script kiddies A hacker who downloads the scripts and uses them to commit unlawful acts, or to deliberately create mischief, without fully understanding the scripts Vandals A person who deliberately destroys or damages public or private property by using computer
  • 12. Spoofing Spoofing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details etc. Denial of services Any problem that makes it difficult or impossible for the system to continue to perform productive work
  • 13. Snooping • Snooping is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an email or watching what someone else is typing.
  • 14. Software privacy • Theft of software through illegal copying of genuine programs. Retail revenue losses are ever increasing due to this crime. This can be done in various ways such as end user copying, hard disk loading and illegal download from the internet.
  • 15. Net Extortion • Copying the company confidential data in order to extort said company for huge amount. Virus dissemination Malicious software that attaches itself to t other software. (virus, worms, Trojan horse. Time bomb, rabbit and bacterium are the malicious soft wares.
  • 16. Credit card Frauds • You simply have to type your credit card number into www page off the vender for online transaction and if electronic transactions are not secured the credit card number can be stolen by the hacker who can misuse this credit card.
  • 17. PHISHING • It is technique of pulling out confidential information from the bank or financial institutional account holders by deceptive means. Credit card writer
  • 19.
  • 20.
  • 21.
  • 23. Cyber Stalking • The cyber follows the victim by sending emails or entering the chat rooms frequently Threatening • The criminals sends threatening email or comes in contact in chat rooms with victims.
  • 24. Salami Attack • In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such programs that deducts small amounts as 2.5 rupees from all the customers accounts of a bank and deposits in his own account. In such a case no customer will approach to bank for such small amount.
  • 25. Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation. It is certainly not as if we don’t face that many cyber crimes here. In fact, Pakistan is currently facing the following types of it:
  • 26. Cyber Crimes in Pakistan
  • 27. • • • • • • • • Financial crimes Cyber pornography Sale of illegal articles Online gambling Intellectual property crimes Email spoofing Cyber stalking Forgery
  • 28. • Unauthorized access to computer systemsnetworks • Theft of information contained in electronic form • Virus/worm attacks • Trojan attacks • Internet time theft • Password cracking
  • 30. • Spam blocker Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages. • Firewall protection Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.
  • 31. Anti-virus software Make sure you have adequate anti-virus software for your computer. You also need to make sure you regularly update your anti-virus software and that you do a oncea-week scan to locate and eliminate any malware, spyware, viruses and other problems.
  • 32. Encryption software • Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.
  • 33. Caution in providing personal information • Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.
  • 34. Secure shopping • Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud
  • 35. Monitoring activities • Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity