SlideShare a Scribd company logo
C Y B E R C R I M E A N D
S E C U R I T Y
B Y
S O B I A S A E E D , AT I Q A &
Z A R A
TA B L E O F
C O N T E N T S
• Introduction
• History of Cybercrime
• Categories of Cybercrime
• Types of Cybercrime
• Cyberthreats to National Security
• Cyber security
• Advantages of Cyber security
• Safety measures against Cybercrime
• Cyber Laws in Pakistan
• NCCS
• Conclusion
• Tools used in presentation
• References
I N T R O D U C T I O N
•Cybercrime is any criminal activity that involves
a computer, networked device or a network.
•Any unlawful act carried out by using internet is
called a cybercrime.
H I S T O R Y O F C Y B E R C R I M E
• The first cybercrime was reported in 1820.
• In 1834, French robbers hacked French Telegraph system and stole the information.
• In 1969, the first ever virus in computer history attacked on the University Washington
Data Center and replicated the files before the machine overload. This virus was called
Rabbit Virus.
• From 1970-1975 Kevin-Mitnick penetrates some of the highest-guarded networks in the
world, including Nokia and Motorola and breech the internal operating system of devices.
• In 1973, A local New York bank teller uses a machine to steal more than $2 million.
H I S T O R Y O F C Y B E R C R I M E
• In1982, The CIA blows up a Siberian gas pipeline by injecting logic bomb into the
network and the operating system to monitor the gas pipeline without using a bomb or a
missile.
• In 1988, Morris Worm was released on a computer of MIT.
• In 1999, Melissa virus infects Microsoft Word records, transmitting itself via email as an
attachment automatically. It mails out to the first 50 names mentioned in the Outlook
email address box of an infected device.
• In 2013-2015, Global Bank Hack more than 100 organizations around the world have
access to secure information from a community of Russian-based hackers.
C AT E G O R I E S
O F
C Y B E R C R I M E
C R I M E A G A I N S T P E O P L E
These crimes include cyber harassment and stalking, distribution
of child pornography, credit card fraud, human trafficking,
spoofing, identity theft, and online libel or slander.
C R I M E S A G A I N S T P R O P E R T Y
Some online crimes occur against property, such as a computer or server.
These crimes include DDOS attacks, hacking, virus transmission, cyber and
typo squatting, computer vandalism, copyright infringement, and IPR
violations.
When a cybercrime is committed against the government, it is
considered an attack on that nation's sovereignty. Cybercrimes
against the government include hacking, accessing confidential
information, cyber warfare, cyber terrorism, and pirated software.
C R I M E S A G A I N S T P R O P E R T Y
T Y P E S O F
C Y B E R C R I M E
H A C K I N G
• Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks.
• And while hacking might not always be for malicious purposes.
• Hacking is unlawful activity by cybercriminals, motivated by financial gain, protest,
information gathering (spying), and even just for the “fun” of the challenge.
• Person who does hacking is called a hacker.
C H I L D P O R N O G R A P H Y
• The Internet is highly used by its abuser to abuse child sexually worldwide.
• More Homes have access to Internet, more children would be using Internet and more of
the chances of falling victim to the aggression of pedophiles.
• Pedophiles uses the false identity to trap the children. Pedophiles connect children in the
various chat rooms which are used by children to connect other children.
D E N I A L O F S E R V I C E AT TA C K
• A Denial-of-Service (DoS) attack is an attack meant to shut
down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the
target with traffic or sending it information that triggers a crash.
V I R U S D I S S E M I N AT I O N
• Malicious software that attaches itself through the other
softwares.
• Virus, worms, Trojan horse, web jacking, e-mail spoofing and
logic bomb etc. Adderall malicious program that are harmful for
our computer systems.
C O M P U T E R VA N D A L I S M
• Damaging and destroying data rather than stealing are
misusing them is called cyber vandalism.
• These are the programs that attach themselves to a file that
circulate.
C Y B E R T E R R O R I S M
• Terrorist attack on the computer network is by distributed denial
of service attacks, hate websites and hate emails and attack on
service networks etc.
S O F T WA R E P I R A C Y
• Theft of software by legal copying of genuine programs or
counterfeiting and distribution of products intended to pass for
original.
C Y B E R T H R E AT S T O N AT I O N A L
S E C U R I T Y
• Cyber crime is increasing in Pakistan tremendously from last two decades.
• Pakistan is one of the amongst most higher Internet user in the world .
• Terrorists are using websites to raise fund for their terrorist activities.
• Some of the NGO's are also using Internet to raise the funds for the terrorists and
criminal groups in the name of poor people and orphan child.
• Harassment by using social media is increasing day by day and causes unrecoverable
damage to society.
• The policies are not implemented practically.
C Y B E R S E C U R I T Y
C Y B E R S E C U R I T Y
• Cyber security involves the protection of secret data and
business information through prevention, detection and
response to different online attacks. Cyber security is
preventing the attacks from the cyber criminals.
P R I VA C Y P O L I C Y
• Before submitting your name, e-mail and other personal data to the website read this
privacy policy.
• Some of the websites sell your data to the different vendors that can be used for illegal
purpose.
• Always keep your privacy settings strict in different websites or apps like Facebook,
YouTube, Instagram and WhatsApp etc.
K E E P T H E S O F T WA R E U P D AT E
• Always use the updated software in your computer system and don't use pirated
software or try to crack password of softwares by using crackers.
• Always keep your antivirus software updated and use its latest version.
• Use good passwords that are difficult to guess.
• Don't use your names, date of birth and personal number as your passwords.
• Always used licensed softwares.
D I S A B L E R E M O T E C O N N E C T I V I T Y
• Don't use public network like public Wi-Fi provided by the governments at public places.
• These are highly used by hackers to steal the data through attacking these public
networks.
• You should disable the features that are not in use.
A D VA N TA G E S O F C Y B E R
S E C U R I T Y
• Cyber security prevent us from the cyber attack.
• Internet security processing all the incoming and outcoming data.
• It helps us to select the websites that are secure or not secure for us.
• It prevents us from the hacks and viruses.
• Applications for cyber security in our computer system should be up to date.
S A F E T Y M E A S U R E S A G A I N S T
C Y B E R C R I M E
• Use antivirus software.
• Insert firewalls
• Uninstall unnecessary softwares
• Maintain backup
• Check security settings
• Always note any change in your computer system
• Don't install softwares from a known websites
C Y B E R L AW S I N PA K I S TA N
• On February 18, 2022, the government passed an ordinance amending the Pakistan
Electronic Crimes Act, 2016 (PECA) to make online “defamation” of authorities, including
the military and judiciary, a criminal offense with harsh penalties.
• They are very insufficient cyber laws in Pakistan. And the laws that are passed are not
implemented practically.
• Due to the weak legislation the cyber crimes are increasing day by day.
N C C S ( N AT I O N A L C E N T E R O F
C Y B E R S E C U R I T Y )
• NCCs is the initiative taken by the government to prevent cyber crimes.
• But it's offices are only in big cities of Pakistan and is not accessible in most of the areas
of Pakistan.
• The method to report the cyber crime in NCCS is online and most of the people R
unaware about it.
• The procedure of case registration in NCCS it's just like a FIR in police station, so the
victims are reluctant to report.
• All these are the reasons that very few cyber crimes are reported and many of them
remain unsolved.
C O N C L U S I O N
• It is very difficult to restrict the cyber crimes.
• Government should take the measures two aware the people about the cyber security.
• There should be strict legislation to stop the cyber crimes.
• The method of reporting cyber crime should be easy, and the investigation agencies and
media should keep the face a victim secret.
• Pakistan is among us the countries well highly watch pornography. People should stop to
access these websites to avoid cyber stalking and Bullying.
• There should be a body do keep check on all the data traffic and content that is uploaded on
different website and watched in Pakistan.
• There should be a content filtering body should filter the data that can be watched in our
country.
R E F E R E N C E S
• https://www.slideshare.net/aemankhan/cybercrimeppt-27376284
• https://www.jigsawacademy.com/blogs/cyber-security/history-of-cybercrime/
• https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940-
2020/
• https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm
• https://www.malwarebytes.com/hacker
• https://www.techtarget.com/searchsecurity/definition/denial-of-service
• https://www.nccs.pk/
• NATIONAL CYBER SECURITY POLICY 2021
T O O L S U S E D F O R P R E S E N TAT I O N
• Microsoft PowerPoint
• NATIONAL CYBER SECURITY POLICY 2021 document.
• Research papers
• Different websites as per reference given in above slide.

More Related Content

Similar to Cybercrime and security.pptx

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
Navjyotsinh Jadeja
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
aritraranjan
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
Online
 

Similar to Cybercrime and security.pptx (20)

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 

Recently uploaded

220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 

Recently uploaded (20)

220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 

Cybercrime and security.pptx

  • 1. C Y B E R C R I M E A N D S E C U R I T Y B Y S O B I A S A E E D , AT I Q A & Z A R A
  • 2. TA B L E O F C O N T E N T S • Introduction • History of Cybercrime • Categories of Cybercrime • Types of Cybercrime • Cyberthreats to National Security • Cyber security • Advantages of Cyber security • Safety measures against Cybercrime • Cyber Laws in Pakistan • NCCS • Conclusion • Tools used in presentation • References
  • 3. I N T R O D U C T I O N •Cybercrime is any criminal activity that involves a computer, networked device or a network. •Any unlawful act carried out by using internet is called a cybercrime.
  • 4. H I S T O R Y O F C Y B E R C R I M E • The first cybercrime was reported in 1820. • In 1834, French robbers hacked French Telegraph system and stole the information. • In 1969, the first ever virus in computer history attacked on the University Washington Data Center and replicated the files before the machine overload. This virus was called Rabbit Virus. • From 1970-1975 Kevin-Mitnick penetrates some of the highest-guarded networks in the world, including Nokia and Motorola and breech the internal operating system of devices. • In 1973, A local New York bank teller uses a machine to steal more than $2 million.
  • 5. H I S T O R Y O F C Y B E R C R I M E • In1982, The CIA blows up a Siberian gas pipeline by injecting logic bomb into the network and the operating system to monitor the gas pipeline without using a bomb or a missile. • In 1988, Morris Worm was released on a computer of MIT. • In 1999, Melissa virus infects Microsoft Word records, transmitting itself via email as an attachment automatically. It mails out to the first 50 names mentioned in the Outlook email address box of an infected device. • In 2013-2015, Global Bank Hack more than 100 organizations around the world have access to secure information from a community of Russian-based hackers.
  • 6. C AT E G O R I E S O F C Y B E R C R I M E
  • 7. C R I M E A G A I N S T P E O P L E These crimes include cyber harassment and stalking, distribution of child pornography, credit card fraud, human trafficking, spoofing, identity theft, and online libel or slander.
  • 8. C R I M E S A G A I N S T P R O P E R T Y Some online crimes occur against property, such as a computer or server. These crimes include DDOS attacks, hacking, virus transmission, cyber and typo squatting, computer vandalism, copyright infringement, and IPR violations.
  • 9. When a cybercrime is committed against the government, it is considered an attack on that nation's sovereignty. Cybercrimes against the government include hacking, accessing confidential information, cyber warfare, cyber terrorism, and pirated software. C R I M E S A G A I N S T P R O P E R T Y
  • 10. T Y P E S O F C Y B E R C R I M E
  • 11. H A C K I N G • Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. • And while hacking might not always be for malicious purposes. • Hacking is unlawful activity by cybercriminals, motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. • Person who does hacking is called a hacker.
  • 12. C H I L D P O R N O G R A P H Y • The Internet is highly used by its abuser to abuse child sexually worldwide. • More Homes have access to Internet, more children would be using Internet and more of the chances of falling victim to the aggression of pedophiles. • Pedophiles uses the false identity to trap the children. Pedophiles connect children in the various chat rooms which are used by children to connect other children.
  • 13. D E N I A L O F S E R V I C E AT TA C K • A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.
  • 14. V I R U S D I S S E M I N AT I O N • Malicious software that attaches itself through the other softwares. • Virus, worms, Trojan horse, web jacking, e-mail spoofing and logic bomb etc. Adderall malicious program that are harmful for our computer systems.
  • 15. C O M P U T E R VA N D A L I S M • Damaging and destroying data rather than stealing are misusing them is called cyber vandalism. • These are the programs that attach themselves to a file that circulate.
  • 16. C Y B E R T E R R O R I S M • Terrorist attack on the computer network is by distributed denial of service attacks, hate websites and hate emails and attack on service networks etc.
  • 17. S O F T WA R E P I R A C Y • Theft of software by legal copying of genuine programs or counterfeiting and distribution of products intended to pass for original.
  • 18. C Y B E R T H R E AT S T O N AT I O N A L S E C U R I T Y • Cyber crime is increasing in Pakistan tremendously from last two decades. • Pakistan is one of the amongst most higher Internet user in the world . • Terrorists are using websites to raise fund for their terrorist activities. • Some of the NGO's are also using Internet to raise the funds for the terrorists and criminal groups in the name of poor people and orphan child. • Harassment by using social media is increasing day by day and causes unrecoverable damage to society. • The policies are not implemented practically.
  • 19. C Y B E R S E C U R I T Y
  • 20. C Y B E R S E C U R I T Y • Cyber security involves the protection of secret data and business information through prevention, detection and response to different online attacks. Cyber security is preventing the attacks from the cyber criminals.
  • 21. P R I VA C Y P O L I C Y • Before submitting your name, e-mail and other personal data to the website read this privacy policy. • Some of the websites sell your data to the different vendors that can be used for illegal purpose. • Always keep your privacy settings strict in different websites or apps like Facebook, YouTube, Instagram and WhatsApp etc.
  • 22. K E E P T H E S O F T WA R E U P D AT E • Always use the updated software in your computer system and don't use pirated software or try to crack password of softwares by using crackers. • Always keep your antivirus software updated and use its latest version. • Use good passwords that are difficult to guess. • Don't use your names, date of birth and personal number as your passwords. • Always used licensed softwares.
  • 23. D I S A B L E R E M O T E C O N N E C T I V I T Y • Don't use public network like public Wi-Fi provided by the governments at public places. • These are highly used by hackers to steal the data through attacking these public networks. • You should disable the features that are not in use.
  • 24. A D VA N TA G E S O F C Y B E R S E C U R I T Y • Cyber security prevent us from the cyber attack. • Internet security processing all the incoming and outcoming data. • It helps us to select the websites that are secure or not secure for us. • It prevents us from the hacks and viruses. • Applications for cyber security in our computer system should be up to date.
  • 25. S A F E T Y M E A S U R E S A G A I N S T C Y B E R C R I M E • Use antivirus software. • Insert firewalls • Uninstall unnecessary softwares • Maintain backup • Check security settings • Always note any change in your computer system • Don't install softwares from a known websites
  • 26. C Y B E R L AW S I N PA K I S TA N • On February 18, 2022, the government passed an ordinance amending the Pakistan Electronic Crimes Act, 2016 (PECA) to make online “defamation” of authorities, including the military and judiciary, a criminal offense with harsh penalties. • They are very insufficient cyber laws in Pakistan. And the laws that are passed are not implemented practically. • Due to the weak legislation the cyber crimes are increasing day by day.
  • 27. N C C S ( N AT I O N A L C E N T E R O F C Y B E R S E C U R I T Y ) • NCCs is the initiative taken by the government to prevent cyber crimes. • But it's offices are only in big cities of Pakistan and is not accessible in most of the areas of Pakistan. • The method to report the cyber crime in NCCS is online and most of the people R unaware about it. • The procedure of case registration in NCCS it's just like a FIR in police station, so the victims are reluctant to report. • All these are the reasons that very few cyber crimes are reported and many of them remain unsolved.
  • 28. C O N C L U S I O N • It is very difficult to restrict the cyber crimes. • Government should take the measures two aware the people about the cyber security. • There should be strict legislation to stop the cyber crimes. • The method of reporting cyber crime should be easy, and the investigation agencies and media should keep the face a victim secret. • Pakistan is among us the countries well highly watch pornography. People should stop to access these websites to avoid cyber stalking and Bullying. • There should be a body do keep check on all the data traffic and content that is uploaded on different website and watched in Pakistan. • There should be a content filtering body should filter the data that can be watched in our country.
  • 29. R E F E R E N C E S • https://www.slideshare.net/aemankhan/cybercrimeppt-27376284 • https://www.jigsawacademy.com/blogs/cyber-security/history-of-cybercrime/ • https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940- 2020/ • https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm • https://www.malwarebytes.com/hacker • https://www.techtarget.com/searchsecurity/definition/denial-of-service • https://www.nccs.pk/ • NATIONAL CYBER SECURITY POLICY 2021
  • 30. T O O L S U S E D F O R P R E S E N TAT I O N • Microsoft PowerPoint • NATIONAL CYBER SECURITY POLICY 2021 document. • Research papers • Different websites as per reference given in above slide.