This document discusses cyber crimes and provides information about a student group project on the topic. The group members are listed along with their student IDs. Cyber crimes are defined as offenses committed using a computer against individuals to harm their reputation or cause physical/mental harm. The document then discusses the history and evolution of the term "hacker" and reasons for studying cyber crimes such as most business now being done online. Common cyber criminal profiles and attacks such as hacking, cracking, and phishing are described. The document concludes with an overview of cyber crimes occurring in Pakistan and some general prevention methods.
Cyber crime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.
Cyber crime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.
ERAU webinar november 2016 cyber security Bill Gibbs
Embry-Riddle Aeronautical University Professor Dr. Jon Haass presents a webinar on Cyber Security. Called Cyber Security Problems and Solutions. Dr. Haass developed the nation's first cyber security bachelor's degree program, which is offered at the ERAU campus in Prescott, Arizona.
The slide contains various day to day cyber-crimes prevailing in India as well as in the world. It talks about various measures to be taken while you are in the cyber-world.
cyber crime & information security is most famous in the world..day by day increase cyber crime in internet world. that see. the detail about of cyber security.
ERAU webinar november 2016 cyber security Bill Gibbs
Embry-Riddle Aeronautical University Professor Dr. Jon Haass presents a webinar on Cyber Security. Called Cyber Security Problems and Solutions. Dr. Haass developed the nation's first cyber security bachelor's degree program, which is offered at the ERAU campus in Prescott, Arizona.
The slide contains various day to day cyber-crimes prevailing in India as well as in the world. It talks about various measures to be taken while you are in the cyber-world.
cyber crime & information security is most famous in the world..day by day increase cyber crime in internet world. that see. the detail about of cyber security.
Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.
Cyber crime is an illegal activity committed on the internet.
hackin is an unauthorized access to the computer system by a hacker..
#Stay_Secure :)
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
4. What are cyber crimes
• Offences that are committed against
individuals or groups of individuals (by
using computer) with a criminal motive to
intentionally harm the reputation of the
victim or cause physical or mental harm to
the victim directly or indirectly.
5. Historical Perspective
• 1960s and 1970s:
Hacker: a positive term
A Hacker: An expert, knowledgeable about programming
and operating systems
• 1970s onwards:
Hacker: a term, which progressively became more
negative.
A Hacker: Someone using computers without authorization
6. Why we study about cyber crimes
• Almost every one is using computer
From white collar criminals to terrorist
organizations and from teenagers to adults
• Conventional crimes like Forgery , extortion, and
kidnapping etc. are being committed with the
help of computer
• New generation is growing up with computers
• MOST IMPORTANT business transactions are
carried out through internet.
7. Profile of cyber criminals
•
•
•
•
•
•
•
Disgruntled employee.
Teenagers.
Professional hackers.
Business rivals.
Political hacktivists.
Ex-friends.
Divorced husband etc.
10. Hacking
Hacking is access of computer resource,
without authorization
Cracking
A hacker who uses his or her skills to
commit unlawful acts, or to deliberately
create mischief
11. Script kiddies
A hacker who downloads the scripts and
uses them to commit unlawful acts, or to
deliberately create mischief, without fully
understanding the scripts
Vandals
A person who deliberately destroys or
damages public or private property by
using computer
12. Spoofing
Spoofing is the criminally fraudulent
process of attempting to acquire sensitive
information such as usernames,
passwords and credit card details etc.
Denial of services
Any problem that makes it difficult or
impossible for the system to continue to
perform productive work
13. Snooping
• Snooping is unauthorized access to
another person's or company's data. The
practice is similar to eavesdropping but is
not necessarily limited to gaining access
to data during its transmission. Snooping
can include casual observance of an email or watching what someone else is
typing.
14. Software privacy
• Theft of software through illegal copying of
genuine programs.
Retail revenue losses are ever increasing
due to this crime.
This can be done in various ways such as
end user copying, hard disk loading and
illegal download from the internet.
15. Net Extortion
• Copying the company confidential data in order
to extort said company for huge amount.
Virus dissemination
Malicious software that attaches itself to t other
software.
(virus, worms, Trojan horse. Time bomb, rabbit
and bacterium are the malicious soft wares.
16. Credit card Frauds
• You simply have to type your credit card
number into www page off the vender for
online transaction and if electronic
transactions are not secured the credit
card number can be stolen by the hacker
who can misuse this credit card.
17. PHISHING
• It is technique of pulling out confidential
information from the bank or financial
institutional account holders by deceptive
means.
Credit card writer
23. Cyber Stalking
• The cyber follows the victim by sending
emails or entering the chat rooms
frequently
Threatening
•
The criminals sends threatening email or
comes in contact in chat rooms with
victims.
24. Salami Attack
• In such crime criminal makes insignificant
changes in such a manner that such
changes would go unnoticed.
Criminal makes such programs that
deducts small amounts as 2.5 rupees from
all the customers accounts of a bank and
deposits in his own account. In such a
case no customer will approach to bank
for such small amount.
25. Pakistan is one of the few countries where cyber
crime laws are still in the pipeline waiting for
implementation. It is certainly not as if we don’t
face that many cyber crimes here.
In fact, Pakistan is currently facing the
following types of it:
28. • Unauthorized access to computer
systemsnetworks
• Theft of information contained in
electronic form
• Virus/worm attacks
• Trojan attacks
• Internet time theft
• Password cracking
30. • Spam blocker
Turn on your spam blocker. Most Internet
providers provide a spam blocking feature
to prevent unwanted messages.
• Firewall protection
Use your computer's firewall protection
feature, which is a digitally created barrier
that prevents hackers from getting into
your computer system. Always keep it
turned on.
31. Anti-virus software
Make sure you have adequate anti-virus
software for your computer. You also need
to make sure you regularly update your
anti-virus software and that you do a oncea-week scan to locate and eliminate any
malware, spyware, viruses and other
problems.
32. Encryption software
• Encrypt important data you don't want
compromised. Utilize encryption software,
which "garbles" your data to make it
unintelligible to anyone who tries to hack
into your computer system.
33. Caution in providing personal
information
• Be wary of providing personal
information via a website you know
nothing about, especially those that
ask for your name, mailing address,
bank account number or social
security number.
34. Secure shopping
• Make sure that you do online shopping on
a secure website, like those with a url that
starts with "https" and/or have a TRUSTe
or VeriSign seal. If you don't see these
anywhere on the site, you run the risk of
submitting credit card information and
other personal information to a site that
may be a fraud
35. Monitoring activities
• Monitor the online activities of your
children. They should only have access to
a computer located in a central area of
your home and you should regularly check
all browser and email activity