The document provides an overview of cybercrime, including its history, types, and how to protect against it. It discusses how the internet has led to new opportunities but also new crimes like identity theft. Various types of cybercrime are outlined such as hacking, phishing, and cyberbullying. The document also discusses cybercrime in Nepal and provides safety tips like using antivirus software and strong passwords. It emphasizes that awareness is key to avoiding becoming a victim of cybercrime.
This document discusses cybercrime, including its history, types, causes, categories, and impact on national security. It begins by defining cybercrime as criminal activities carried out through computers or the internet. Some key types discussed are hacking, theft, cyber stalking, and identity theft. The document also outlines categories of cybercrime against individuals, property, and governments. It notes that cybercrime is a growing threat in India and discusses some case studies and laws related to cybercrime in the country. In conclusion, it stresses the importance of educating students about cybercrime and taking precautions online.
This document discusses cyber crime and security. It defines cyber crime as illegal activity committed on the internet. It then covers various topics related to cyber crime such as definitions, history, categories and types of cyber crimes including hacking, denial of service attacks and computer vandalism. The document also discusses cyber security and provides safety tips to prevent cyber crime such as using antivirus software and firewalls. It notes that technology alone is not destructive and depends on how people use it.
This presentation introduces cyber crime and security. It begins with the presenter's name and class. The introduction explains that while the internet provides opportunities, it also enables illegal activity like cyber crime. The document then defines cyber crime as illegal activities using computers and the internet. It provides a brief history of early cyber crimes like spam emails and viruses. It categorizes cyber crimes as those targeting computers or using computers as weapons. The document outlines common cyber crimes like hacking and identity theft. It shares statistics on reported cyber crime cases in India and concludes with safety tips to prevent cyber crime.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cyber crimes are unlawful acts where computers or the internet are used as tools or targets. Some key points covered in the document include:
- Cyber crimes have increased as internet usage has grown and include hacking, identity theft, and harassment.
- Cyber crimes are categorized as those against persons, property, or government. Crimes against persons include harassment while crimes against property include computer vandalism.
- Common cyber crimes also discussed include viruses, malware, and data theft. The document provides examples of different types of hacking and cyber criminals like organized hackers and disgruntled employees.
- Prevention methods to protect against cyber crimes are discussed like using firewalls, antivirus software, and disabling unauthorized access
This document discusses information system security and computer-related issues. It covers topics like computer waste, crime, privacy and ethical issues. Specific types of computer waste and mistakes are examined, along with policies and procedures to prevent them. Computer crime is explored, including the computer as a tool for crime and as an object of crime. Issues like identity theft, cyberterrorism, and vulnerabilities are summarized. Internal threats from employees are also mentioned.
The document provides an overview of cybercrime, including its history, types, and how to protect against it. It discusses how the internet has led to new opportunities but also new crimes like identity theft. Various types of cybercrime are outlined such as hacking, phishing, and cyberbullying. The document also discusses cybercrime in Nepal and provides safety tips like using antivirus software and strong passwords. It emphasizes that awareness is key to avoiding becoming a victim of cybercrime.
This document discusses cybercrime, including its history, types, causes, categories, and impact on national security. It begins by defining cybercrime as criminal activities carried out through computers or the internet. Some key types discussed are hacking, theft, cyber stalking, and identity theft. The document also outlines categories of cybercrime against individuals, property, and governments. It notes that cybercrime is a growing threat in India and discusses some case studies and laws related to cybercrime in the country. In conclusion, it stresses the importance of educating students about cybercrime and taking precautions online.
This document discusses cyber crime and security. It defines cyber crime as illegal activity committed on the internet. It then covers various topics related to cyber crime such as definitions, history, categories and types of cyber crimes including hacking, denial of service attacks and computer vandalism. The document also discusses cyber security and provides safety tips to prevent cyber crime such as using antivirus software and firewalls. It notes that technology alone is not destructive and depends on how people use it.
This presentation introduces cyber crime and security. It begins with the presenter's name and class. The introduction explains that while the internet provides opportunities, it also enables illegal activity like cyber crime. The document then defines cyber crime as illegal activities using computers and the internet. It provides a brief history of early cyber crimes like spam emails and viruses. It categorizes cyber crimes as those targeting computers or using computers as weapons. The document outlines common cyber crimes like hacking and identity theft. It shares statistics on reported cyber crime cases in India and concludes with safety tips to prevent cyber crime.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cyber crimes are unlawful acts where computers or the internet are used as tools or targets. Some key points covered in the document include:
- Cyber crimes have increased as internet usage has grown and include hacking, identity theft, and harassment.
- Cyber crimes are categorized as those against persons, property, or government. Crimes against persons include harassment while crimes against property include computer vandalism.
- Common cyber crimes also discussed include viruses, malware, and data theft. The document provides examples of different types of hacking and cyber criminals like organized hackers and disgruntled employees.
- Prevention methods to protect against cyber crimes are discussed like using firewalls, antivirus software, and disabling unauthorized access
This document discusses information system security and computer-related issues. It covers topics like computer waste, crime, privacy and ethical issues. Specific types of computer waste and mistakes are examined, along with policies and procedures to prevent them. Computer crime is explored, including the computer as a tool for crime and as an object of crime. Issues like identity theft, cyberterrorism, and vulnerabilities are summarized. Internal threats from employees are also mentioned.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to combat cyber crime in India.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to address cyber crime challenges in India.
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. AND Money laundering is the process of creating the appearance that large amounts of money obtained
Cyber crime involves using computers or networks to commit crimes like identity theft, hacking, or spreading viruses. The document discusses definitions of cyber crimes according to Nepali law and examples like hacking, child pornography, and phishing. It provides tips for internet security including using antivirus software, firewalls, and being cautious of emails or websites from unknown sources. Nepal has laws and organizations in place to address cyber crimes and improve cyber security in the country.
The document discusses cyber crime, defining it as criminal activity involving unlawful access to computer systems. It outlines the major types of cyber crimes such as hacking, credit card fraud, and virus dissemination. The history of cyber crime is explored, noting the first documented cases from the 1970s. The relationship between cyber crime and information security is also examined, defining information security as protecting systems from unauthorized use, modification, exploitation, or theft.
This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
This document discusses cybercrime, including what it is, why we should be aware of it, and how to protect ourselves. It defines cybercrime as illegal activities involving computers and networks, such as hacking, viruses, and identity theft. The document outlines different types of cybercrimes and their impacts, describing how financial losses from data breaches are rising. It also discusses Indian laws related to cybercrime and provides tips for security measures like using strong, unique passwords and updating software. The document concludes by emphasizing the importance of awareness in protecting oneself from cybercrime.
Cyber crimes are illegal activities committed using computers and the internet. The document discusses the history and evolution of cyber threats. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Several types of cyber crimes are explained in detail, including hacking, child pornography, denial of service attacks, and software piracy. Prevention tips like using antivirus software and firewalls are provided.
This document discusses cyber crime. It defines cyber crime as any illegal criminal activity that uses a computer as a tool, target, or means of perpetrating crime. Cyber crimes can range from security breaches and identity theft to cyber stalking and child exploitation. The document outlines several types of cyber crimes such as hacking, email spoofing, computer vandalism, and cyber terrorism. It also discusses reasons for cyber crimes and how to avoid becoming a victim.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
Presentation about Cyber crime like what is cyber crime?,What are the types of cyber crime?,How to solve cyber crime etc.
If you like my work then please like the ppt and comment your review.
Thank You.
This document discusses effective techniques and approaches for ensuring cyber security. It begins with an introduction to cyber crime and defines it as illegal activity committed on the internet where computers are used as objects or subjects of criminal acts. The document then covers the history of cyber crime, categories and types of cyber attacks, cyber laws, and safety techniques. It concludes by stating that while complete security is impossible, people can act smart by paying attention, using antivirus software, firewalls, and other precautions when online.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
The document outlines a training agenda for a cyber security conference held in August 2015. Day 1 covers topics like cyber crimes, the current situation in Indonesia and globally, and identifying threats and vulnerabilities. Day 2 focuses on information security strategies across organizations and envisioning the future state. Several sessions explore defining cyber crimes, common attack types like viruses and denial of service, and who carries out cyber crimes. The document also discusses trends like the growing cyber crime marketplace, risks to mobile devices, larger attacks on retailers and banks, and more advanced targeted threats.
The document provides an overview of cyber crime including its history, evolution, categories, and common types. It discusses how cyber criminals have become more organized over time, moving from basic malware in the 1990s to sophisticated ransomware and banking malware today. The document also outlines three categories of cyber crimes: against persons, property, and government. It gives examples of specific cyber crimes like hacking, denial of service attacks, software piracy, and cyber terrorism. In conclusion, it notes that cyber crime continues to evolve as criminals work to stay ahead of law enforcement.
Cyber crime is evolving from traditional organized crime to include online criminal activities. The document defines cyber crime and categories it into crimes against persons, property, government and society. It discusses the weapons used in cyber crimes such as hacking, viruses, and phishing. India is experiencing increased cyber crime due to its growing internet user base, and the document provides statistics on common cyber crimes in India as well as safety tips and cyber security measures.
Computer crimes are on the rise as more individuals and organizations conduct business and transactions online. The document outlines several types of computer crimes, including hacking, denial of service attacks, software piracy, credit card fraud, cyberstalking, and sale of illegal goods. The profile of cyber criminals is varied, ranging from disgruntled employees to professional hackers to ex-partners seeking revenge. Victims can be anyone but are often inexperienced users. Strong security practices are needed to protect against the anonymity and large storage of computers that criminals exploit.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to combat cyber crime in India.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to address cyber crime challenges in India.
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. AND Money laundering is the process of creating the appearance that large amounts of money obtained
Cyber crime involves using computers or networks to commit crimes like identity theft, hacking, or spreading viruses. The document discusses definitions of cyber crimes according to Nepali law and examples like hacking, child pornography, and phishing. It provides tips for internet security including using antivirus software, firewalls, and being cautious of emails or websites from unknown sources. Nepal has laws and organizations in place to address cyber crimes and improve cyber security in the country.
The document discusses cyber crime, defining it as criminal activity involving unlawful access to computer systems. It outlines the major types of cyber crimes such as hacking, credit card fraud, and virus dissemination. The history of cyber crime is explored, noting the first documented cases from the 1970s. The relationship between cyber crime and information security is also examined, defining information security as protecting systems from unauthorized use, modification, exploitation, or theft.
This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
This document discusses cybercrime, including what it is, why we should be aware of it, and how to protect ourselves. It defines cybercrime as illegal activities involving computers and networks, such as hacking, viruses, and identity theft. The document outlines different types of cybercrimes and their impacts, describing how financial losses from data breaches are rising. It also discusses Indian laws related to cybercrime and provides tips for security measures like using strong, unique passwords and updating software. The document concludes by emphasizing the importance of awareness in protecting oneself from cybercrime.
Cyber crimes are illegal activities committed using computers and the internet. The document discusses the history and evolution of cyber threats. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Several types of cyber crimes are explained in detail, including hacking, child pornography, denial of service attacks, and software piracy. Prevention tips like using antivirus software and firewalls are provided.
This document discusses cyber crime. It defines cyber crime as any illegal criminal activity that uses a computer as a tool, target, or means of perpetrating crime. Cyber crimes can range from security breaches and identity theft to cyber stalking and child exploitation. The document outlines several types of cyber crimes such as hacking, email spoofing, computer vandalism, and cyber terrorism. It also discusses reasons for cyber crimes and how to avoid becoming a victim.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
Presentation about Cyber crime like what is cyber crime?,What are the types of cyber crime?,How to solve cyber crime etc.
If you like my work then please like the ppt and comment your review.
Thank You.
This document discusses effective techniques and approaches for ensuring cyber security. It begins with an introduction to cyber crime and defines it as illegal activity committed on the internet where computers are used as objects or subjects of criminal acts. The document then covers the history of cyber crime, categories and types of cyber attacks, cyber laws, and safety techniques. It concludes by stating that while complete security is impossible, people can act smart by paying attention, using antivirus software, firewalls, and other precautions when online.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
The document outlines a training agenda for a cyber security conference held in August 2015. Day 1 covers topics like cyber crimes, the current situation in Indonesia and globally, and identifying threats and vulnerabilities. Day 2 focuses on information security strategies across organizations and envisioning the future state. Several sessions explore defining cyber crimes, common attack types like viruses and denial of service, and who carries out cyber crimes. The document also discusses trends like the growing cyber crime marketplace, risks to mobile devices, larger attacks on retailers and banks, and more advanced targeted threats.
The document provides an overview of cyber crime including its history, evolution, categories, and common types. It discusses how cyber criminals have become more organized over time, moving from basic malware in the 1990s to sophisticated ransomware and banking malware today. The document also outlines three categories of cyber crimes: against persons, property, and government. It gives examples of specific cyber crimes like hacking, denial of service attacks, software piracy, and cyber terrorism. In conclusion, it notes that cyber crime continues to evolve as criminals work to stay ahead of law enforcement.
Cyber crime is evolving from traditional organized crime to include online criminal activities. The document defines cyber crime and categories it into crimes against persons, property, government and society. It discusses the weapons used in cyber crimes such as hacking, viruses, and phishing. India is experiencing increased cyber crime due to its growing internet user base, and the document provides statistics on common cyber crimes in India as well as safety tips and cyber security measures.
Computer crimes are on the rise as more individuals and organizations conduct business and transactions online. The document outlines several types of computer crimes, including hacking, denial of service attacks, software piracy, credit card fraud, cyberstalking, and sale of illegal goods. The profile of cyber criminals is varied, ranging from disgruntled employees to professional hackers to ex-partners seeking revenge. Victims can be anyone but are often inexperienced users. Strong security practices are needed to protect against the anonymity and large storage of computers that criminals exploit.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Cybercrime and security.pptx
1. C Y B E R C R I M E A N D
S E C U R I T Y
B Y
S O B I A S A E E D , AT I Q A &
Z A R A
2. TA B L E O F
C O N T E N T S
• Introduction
• History of Cybercrime
• Categories of Cybercrime
• Types of Cybercrime
• Cyberthreats to National Security
• Cyber security
• Advantages of Cyber security
• Safety measures against Cybercrime
• Cyber Laws in Pakistan
• NCCS
• Conclusion
• Tools used in presentation
• References
3. I N T R O D U C T I O N
•Cybercrime is any criminal activity that involves
a computer, networked device or a network.
•Any unlawful act carried out by using internet is
called a cybercrime.
4. H I S T O R Y O F C Y B E R C R I M E
• The first cybercrime was reported in 1820.
• In 1834, French robbers hacked French Telegraph system and stole the information.
• In 1969, the first ever virus in computer history attacked on the University Washington
Data Center and replicated the files before the machine overload. This virus was called
Rabbit Virus.
• From 1970-1975 Kevin-Mitnick penetrates some of the highest-guarded networks in the
world, including Nokia and Motorola and breech the internal operating system of devices.
• In 1973, A local New York bank teller uses a machine to steal more than $2 million.
5. H I S T O R Y O F C Y B E R C R I M E
• In1982, The CIA blows up a Siberian gas pipeline by injecting logic bomb into the
network and the operating system to monitor the gas pipeline without using a bomb or a
missile.
• In 1988, Morris Worm was released on a computer of MIT.
• In 1999, Melissa virus infects Microsoft Word records, transmitting itself via email as an
attachment automatically. It mails out to the first 50 names mentioned in the Outlook
email address box of an infected device.
• In 2013-2015, Global Bank Hack more than 100 organizations around the world have
access to secure information from a community of Russian-based hackers.
7. C R I M E A G A I N S T P E O P L E
These crimes include cyber harassment and stalking, distribution
of child pornography, credit card fraud, human trafficking,
spoofing, identity theft, and online libel or slander.
8. C R I M E S A G A I N S T P R O P E R T Y
Some online crimes occur against property, such as a computer or server.
These crimes include DDOS attacks, hacking, virus transmission, cyber and
typo squatting, computer vandalism, copyright infringement, and IPR
violations.
9. When a cybercrime is committed against the government, it is
considered an attack on that nation's sovereignty. Cybercrimes
against the government include hacking, accessing confidential
information, cyber warfare, cyber terrorism, and pirated software.
C R I M E S A G A I N S T P R O P E R T Y
11. H A C K I N G
• Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks.
• And while hacking might not always be for malicious purposes.
• Hacking is unlawful activity by cybercriminals, motivated by financial gain, protest,
information gathering (spying), and even just for the “fun” of the challenge.
• Person who does hacking is called a hacker.
12. C H I L D P O R N O G R A P H Y
• The Internet is highly used by its abuser to abuse child sexually worldwide.
• More Homes have access to Internet, more children would be using Internet and more of
the chances of falling victim to the aggression of pedophiles.
• Pedophiles uses the false identity to trap the children. Pedophiles connect children in the
various chat rooms which are used by children to connect other children.
13. D E N I A L O F S E R V I C E AT TA C K
• A Denial-of-Service (DoS) attack is an attack meant to shut
down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the
target with traffic or sending it information that triggers a crash.
14. V I R U S D I S S E M I N AT I O N
• Malicious software that attaches itself through the other
softwares.
• Virus, worms, Trojan horse, web jacking, e-mail spoofing and
logic bomb etc. Adderall malicious program that are harmful for
our computer systems.
15. C O M P U T E R VA N D A L I S M
• Damaging and destroying data rather than stealing are
misusing them is called cyber vandalism.
• These are the programs that attach themselves to a file that
circulate.
16. C Y B E R T E R R O R I S M
• Terrorist attack on the computer network is by distributed denial
of service attacks, hate websites and hate emails and attack on
service networks etc.
17. S O F T WA R E P I R A C Y
• Theft of software by legal copying of genuine programs or
counterfeiting and distribution of products intended to pass for
original.
18. C Y B E R T H R E AT S T O N AT I O N A L
S E C U R I T Y
• Cyber crime is increasing in Pakistan tremendously from last two decades.
• Pakistan is one of the amongst most higher Internet user in the world .
• Terrorists are using websites to raise fund for their terrorist activities.
• Some of the NGO's are also using Internet to raise the funds for the terrorists and
criminal groups in the name of poor people and orphan child.
• Harassment by using social media is increasing day by day and causes unrecoverable
damage to society.
• The policies are not implemented practically.
20. C Y B E R S E C U R I T Y
• Cyber security involves the protection of secret data and
business information through prevention, detection and
response to different online attacks. Cyber security is
preventing the attacks from the cyber criminals.
21. P R I VA C Y P O L I C Y
• Before submitting your name, e-mail and other personal data to the website read this
privacy policy.
• Some of the websites sell your data to the different vendors that can be used for illegal
purpose.
• Always keep your privacy settings strict in different websites or apps like Facebook,
YouTube, Instagram and WhatsApp etc.
22. K E E P T H E S O F T WA R E U P D AT E
• Always use the updated software in your computer system and don't use pirated
software or try to crack password of softwares by using crackers.
• Always keep your antivirus software updated and use its latest version.
• Use good passwords that are difficult to guess.
• Don't use your names, date of birth and personal number as your passwords.
• Always used licensed softwares.
23. D I S A B L E R E M O T E C O N N E C T I V I T Y
• Don't use public network like public Wi-Fi provided by the governments at public places.
• These are highly used by hackers to steal the data through attacking these public
networks.
• You should disable the features that are not in use.
24. A D VA N TA G E S O F C Y B E R
S E C U R I T Y
• Cyber security prevent us from the cyber attack.
• Internet security processing all the incoming and outcoming data.
• It helps us to select the websites that are secure or not secure for us.
• It prevents us from the hacks and viruses.
• Applications for cyber security in our computer system should be up to date.
25. S A F E T Y M E A S U R E S A G A I N S T
C Y B E R C R I M E
• Use antivirus software.
• Insert firewalls
• Uninstall unnecessary softwares
• Maintain backup
• Check security settings
• Always note any change in your computer system
• Don't install softwares from a known websites
26. C Y B E R L AW S I N PA K I S TA N
• On February 18, 2022, the government passed an ordinance amending the Pakistan
Electronic Crimes Act, 2016 (PECA) to make online “defamation” of authorities, including
the military and judiciary, a criminal offense with harsh penalties.
• They are very insufficient cyber laws in Pakistan. And the laws that are passed are not
implemented practically.
• Due to the weak legislation the cyber crimes are increasing day by day.
27. N C C S ( N AT I O N A L C E N T E R O F
C Y B E R S E C U R I T Y )
• NCCs is the initiative taken by the government to prevent cyber crimes.
• But it's offices are only in big cities of Pakistan and is not accessible in most of the areas
of Pakistan.
• The method to report the cyber crime in NCCS is online and most of the people R
unaware about it.
• The procedure of case registration in NCCS it's just like a FIR in police station, so the
victims are reluctant to report.
• All these are the reasons that very few cyber crimes are reported and many of them
remain unsolved.
28. C O N C L U S I O N
• It is very difficult to restrict the cyber crimes.
• Government should take the measures two aware the people about the cyber security.
• There should be strict legislation to stop the cyber crimes.
• The method of reporting cyber crime should be easy, and the investigation agencies and
media should keep the face a victim secret.
• Pakistan is among us the countries well highly watch pornography. People should stop to
access these websites to avoid cyber stalking and Bullying.
• There should be a body do keep check on all the data traffic and content that is uploaded on
different website and watched in Pakistan.
• There should be a content filtering body should filter the data that can be watched in our
country.
29. R E F E R E N C E S
• https://www.slideshare.net/aemankhan/cybercrimeppt-27376284
• https://www.jigsawacademy.com/blogs/cyber-security/history-of-cybercrime/
• https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940-
2020/
• https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm
• https://www.malwarebytes.com/hacker
• https://www.techtarget.com/searchsecurity/definition/denial-of-service
• https://www.nccs.pk/
• NATIONAL CYBER SECURITY POLICY 2021
30. T O O L S U S E D F O R P R E S E N TAT I O N
• Microsoft PowerPoint
• NATIONAL CYBER SECURITY POLICY 2021 document.
• Research papers
• Different websites as per reference given in above slide.