SlideShare a Scribd company logo
1 of 24
 Activity in which computers or networks are
a tool, target, or a place of criminal activity.
 cyber crime is a subset of computer crime. In
a cyber crime, the computer network can be;
 The tool of a crime
 The target of a crime
 Used for purpose incidental to a crime
 Offences that are committed against individuals or group of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm to the
victim directly or indirectly, using modern telecommunication
networks such a s internet.
 Cyber crime is a term for any illegal activity that uses a
computer as its primary means of communication. The U.S.
department of Justice expands the definition of cyber crime and
includes any illegal activity that uses a computer for the storage
of evidence.
 Cyber crime also stated as any use of a computer as an
instrument of further illegal ends, such as;
 Committing fraud
 Stealing identities
 Violating privacy
 The first recorded cyber crime took place in the
year 1820, when , Joseph-Marie Jacquard, a
textile manufacturer in France, produced the
loom.
 The firm spam e-mail took place in 1978 when it
was sent out over the Arpanet.
 The first Virus was installedon an Apple
computer in1982.
 A Sixteen years old student nicknamed “Data
Stream”, arrested by UK police (1994).
 Denial of Service (DoS) attacks by ‘Mafia
Boy’ on eBay, Yahoo! And other popular sites
(2000).
 FBI’s e-mail system was hacked (Feb,
2005).
 Travelling documents of NATO forces were
hacked in Afghanistan.
 Against individual property
 Transmitting virus
 Un-authorized control/access over computer
 Intellectual property crimes
 Internet time thefts
 Against Organization
 Possession of un-authorized information
 Cyber terrorism against the government
organization
 Distribution of pirated software,etc
 Against Social at Large
 Pornography (basically child pornography)
 Trafficking
 Financial crimes
 Online gambling
 Forgery
 Sale of illegal articles
 Computer Virus: A computer virus is a
computer program or attaches itself to
application programs or other executable
system software causing damage to the files.
 Phishing: Phishing occurs when the
perpetrator sends fictitious e-mails to
individuals with links to fraudulent websites
that appear official and thereby cause the
victim to release personal information to the
perpetrator.
 Hacking: The act of penetrating or gaining
unauthorized access to or use of data
unavailable in a computer system or a
computer network for the purpose of gaining
knowledge, stealing or making unauthorized
use of the data.
 Spoofing : Spoofing is the creation of
TCP/IP packets using somebody else’s IP
address.
 Netsplonage: Netsplonage occurs when
perpetrators back into online systems or
individual PCs to obtain confidential
information for the purpose of selling it to
other parties.
 Cyber stalking: Cyber stalking refers to the
use of the internet, email or other electronic
communications device to stalk another
person. It is an electronic harassment that
involves harassing or threatening over a
period of time.
 Cyber Terrorism: Cyber terrorism occurs
when terrorists cause virtual destruction in
online computer system.
 Desire for entertainment
 Profit
 Infuriation or revenge
 Political agenda
 Sexual motivations
 Psychiatric illness
 Cyber law is a term used to describe the
legal issues related to use of communication
technology, particularly cyber space, i.e.
internet.
 Cyber law is an attempt to apply laws
designed for the physical world to human
activities on internet.
 Electronic Commerce Act (Ireland)
 Electronic Transactions Act (UK, USA,
Australia, New Zealand, Singapore)
 Electronic Transactions Ordinance (Hong
Kong)
 Information Technology Act (India)
 Information communication Technology Act
(Bangladesh)
 India has enacted the first I.T. Act, 2000 based
on the UNCIRAL model recommended by the
general assembly of the United Nations.
 Offences under IT acts are:
 Tampering with computer source document
 Hacking with computer systems, data
alterations
 Publishing obscene information
 Un-authorized access to protected systems
 Breach of confidentiality and privacy
 Publishing false digital signature certificates.
It is no surprise that Pakistan is not free from
the cyber space dilemma. The availability of
computers and Internet connections provides
unprecedented opportunities to
communicate and learn in Pakistan.
However, certain individuals do exploit the
power of the Internet for criminal purposes
as well.
Pakistan has a legal framework in place to
address cyber crimes.
 Prevention of Electronic Crimes Ordinance,
2007
 Electronic Transactions Ordinance, 2002
 Pakistan Telecommunication (Re-organization)
Act, 1996
 Wireless Telegraphy Act, 1933
 Telegraph Act, 1885
 Federal Investigation Agency Act, 1974
 Payments & Electronic Fund Transfers Act,
2007
Important sections are:
36 .Violation of privacy information.
37. Damage to information system, etc
 It deals with the electronic crimes included:
 Cyber terrorism
 Data damage
 Electronic fraud
 Electronic forgery
 Cyber stalking
 Cyber spaming
 Un-authorizes access to code
 Use hard to guess passwords
 Use anti-virus software and firewalls-keep
them up to date
 Don’t open email or attachments from
unknown sources
 Back up your computer on disk or CD often
 Fostering Linkages:
 Creation liaison with international community
will create sharing of experiences and good
practices.
 The value of fostering co-operation
internationally with other countries/regions
and parties needs to be enhanced.
 Co-operation between governments and the
private sector in combating cyber crime.
 Building National level Partnerships and
Creating Awareness:
 Create specialized forums for exchange of
experiences and information which would
entail initiating and promoting literary,
technical and scientific activity.
 Setting up a cyber crime cell consisting of
experts to deal with cyber-crime will
encourage reporting and evolve into a
process online with the legislature.
 Training and Awareness Raising :
 It is essential to educate and empower youth
to safely and responsibly take control of their
Internet experience.
 Disseminate general awareness of cyber
crimes and user laws/rights by arranging
symposia, seminars, lectures, classes,
demonstrations, and presentations, briefings,
to educate the society and gain their comfort
level.
 People need to be aware of the appropriate
law enforcement investigative authorities at
the local, state, federal, or international
levels.
It is not possible to eliminate cyber crime from
the cyber space in its entirety. However, it is
quite possible to check it. Any legislation in its
entirety might be less successful in totally
eliminating crime from the globe. The primary
step is to make people aware of their rights and
duties and further making the application of the
laws more stringent to check crime.
However, in any draft legislation it is important that
the provisions of the cyber law are not made so
stringent that it may retard the growth of the
industry and prove to be counter-productive.
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw

More Related Content

Similar to ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 

Similar to ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 

Recently uploaded

Rachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docxRachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docxRachel Ochsenschlager
 
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...ZurliaSoop
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证eqaqen
 
Fracture design PowerPoint presentations
Fracture design PowerPoint presentationsFracture design PowerPoint presentations
Fracture design PowerPoint presentationsjitiniift
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfDeepak15CivilEngg
 
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证gkyvm
 
Launch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideLaunch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideKaziFaisalAlam
 
Sales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezSales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezInfinity Skies Corp
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...yulianti213969
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理F
 
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...yulianti213969
 
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...rightmanforbloodline
 
b-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state boardb-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state boardramyaul734
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证epyhpep
 
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证vflw6bsde
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Juli Boned
 
Crafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdfCrafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdfShri Dr Arul Selvan
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfDan Berlin
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Juli Boned
 

Recently uploaded (20)

Rachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docxRachel_Ochsenschlager_Resume_May_2024.docx
Rachel_Ochsenschlager_Resume_May_2024.docx
 
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
 
Fracture design PowerPoint presentations
Fracture design PowerPoint presentationsFracture design PowerPoint presentations
Fracture design PowerPoint presentations
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
 
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(TMU毕业证书)多伦多都会大学毕业证成绩单本科硕士学位证留信学历认证
 
Launch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideLaunch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's Guide
 
Sales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel LopezSales Experience Presentation - Angel Lopez
Sales Experience Presentation - Angel Lopez
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
obat aborsi gresik wa 081336238223 jual obat aborsi cytotec asli di gresik782...
 
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
TEST BANK For Growth and Development Across the Lifespan, 3rd Edition By Glor...
 
b-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state boardb-sc-agri-course-curriculum.pdf for Karnataka state board
b-sc-agri-course-curriculum.pdf for Karnataka state board
 
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(Columbia毕业证书)哥伦比亚大学毕业证成绩单本科硕士学位证留信学历认证
 
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
一比一原版(UCI毕业证)加州大学欧文分校毕业证成绩单学位证留信学历认证
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
Crafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdfCrafting an effective CV for AYUSH Doctors.pdf
Crafting an effective CV for AYUSH Doctors.pdf
 
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdfUXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
UXPA Boston 2024 Maximize the Client Consultant Relationship.pdf
 
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
Novo Nordisk Kalundborg. We are expanding our manufacturing hub in Kalundborg...
 

ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw

  • 1.
  • 2.  Activity in which computers or networks are a tool, target, or a place of criminal activity.  cyber crime is a subset of computer crime. In a cyber crime, the computer network can be;  The tool of a crime  The target of a crime  Used for purpose incidental to a crime
  • 3.  Offences that are committed against individuals or group of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such a s internet.  Cyber crime is a term for any illegal activity that uses a computer as its primary means of communication. The U.S. department of Justice expands the definition of cyber crime and includes any illegal activity that uses a computer for the storage of evidence.  Cyber crime also stated as any use of a computer as an instrument of further illegal ends, such as;  Committing fraud  Stealing identities  Violating privacy
  • 4.  The first recorded cyber crime took place in the year 1820, when , Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.  The firm spam e-mail took place in 1978 when it was sent out over the Arpanet.  The first Virus was installedon an Apple computer in1982.  A Sixteen years old student nicknamed “Data Stream”, arrested by UK police (1994).
  • 5.  Denial of Service (DoS) attacks by ‘Mafia Boy’ on eBay, Yahoo! And other popular sites (2000).  FBI’s e-mail system was hacked (Feb, 2005).  Travelling documents of NATO forces were hacked in Afghanistan.
  • 6.  Against individual property  Transmitting virus  Un-authorized control/access over computer  Intellectual property crimes  Internet time thefts  Against Organization  Possession of un-authorized information  Cyber terrorism against the government organization  Distribution of pirated software,etc
  • 7.  Against Social at Large  Pornography (basically child pornography)  Trafficking  Financial crimes  Online gambling  Forgery  Sale of illegal articles
  • 8.  Computer Virus: A computer virus is a computer program or attaches itself to application programs or other executable system software causing damage to the files.  Phishing: Phishing occurs when the perpetrator sends fictitious e-mails to individuals with links to fraudulent websites that appear official and thereby cause the victim to release personal information to the perpetrator.
  • 9.  Hacking: The act of penetrating or gaining unauthorized access to or use of data unavailable in a computer system or a computer network for the purpose of gaining knowledge, stealing or making unauthorized use of the data.  Spoofing : Spoofing is the creation of TCP/IP packets using somebody else’s IP address.  Netsplonage: Netsplonage occurs when perpetrators back into online systems or individual PCs to obtain confidential information for the purpose of selling it to other parties.
  • 10.  Cyber stalking: Cyber stalking refers to the use of the internet, email or other electronic communications device to stalk another person. It is an electronic harassment that involves harassing or threatening over a period of time.  Cyber Terrorism: Cyber terrorism occurs when terrorists cause virtual destruction in online computer system.
  • 11.  Desire for entertainment  Profit  Infuriation or revenge  Political agenda  Sexual motivations  Psychiatric illness
  • 12.  Cyber law is a term used to describe the legal issues related to use of communication technology, particularly cyber space, i.e. internet.  Cyber law is an attempt to apply laws designed for the physical world to human activities on internet.
  • 13.  Electronic Commerce Act (Ireland)  Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore)  Electronic Transactions Ordinance (Hong Kong)  Information Technology Act (India)  Information communication Technology Act (Bangladesh)
  • 14.  India has enacted the first I.T. Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations.  Offences under IT acts are:  Tampering with computer source document  Hacking with computer systems, data alterations  Publishing obscene information  Un-authorized access to protected systems  Breach of confidentiality and privacy  Publishing false digital signature certificates.
  • 15. It is no surprise that Pakistan is not free from the cyber space dilemma. The availability of computers and Internet connections provides unprecedented opportunities to communicate and learn in Pakistan. However, certain individuals do exploit the power of the Internet for criminal purposes as well.
  • 16. Pakistan has a legal framework in place to address cyber crimes.  Prevention of Electronic Crimes Ordinance, 2007  Electronic Transactions Ordinance, 2002  Pakistan Telecommunication (Re-organization) Act, 1996  Wireless Telegraphy Act, 1933  Telegraph Act, 1885  Federal Investigation Agency Act, 1974  Payments & Electronic Fund Transfers Act, 2007
  • 17. Important sections are: 36 .Violation of privacy information. 37. Damage to information system, etc
  • 18.  It deals with the electronic crimes included:  Cyber terrorism  Data damage  Electronic fraud  Electronic forgery  Cyber stalking  Cyber spaming  Un-authorizes access to code
  • 19.  Use hard to guess passwords  Use anti-virus software and firewalls-keep them up to date  Don’t open email or attachments from unknown sources  Back up your computer on disk or CD often
  • 20.  Fostering Linkages:  Creation liaison with international community will create sharing of experiences and good practices.  The value of fostering co-operation internationally with other countries/regions and parties needs to be enhanced.  Co-operation between governments and the private sector in combating cyber crime.
  • 21.  Building National level Partnerships and Creating Awareness:  Create specialized forums for exchange of experiences and information which would entail initiating and promoting literary, technical and scientific activity.  Setting up a cyber crime cell consisting of experts to deal with cyber-crime will encourage reporting and evolve into a process online with the legislature.
  • 22.  Training and Awareness Raising :  It is essential to educate and empower youth to safely and responsibly take control of their Internet experience.  Disseminate general awareness of cyber crimes and user laws/rights by arranging symposia, seminars, lectures, classes, demonstrations, and presentations, briefings, to educate the society and gain their comfort level.  People need to be aware of the appropriate law enforcement investigative authorities at the local, state, federal, or international levels.
  • 23. It is not possible to eliminate cyber crime from the cyber space in its entirety. However, it is quite possible to check it. Any legislation in its entirety might be less successful in totally eliminating crime from the globe. The primary step is to make people aware of their rights and duties and further making the application of the laws more stringent to check crime. However, in any draft legislation it is important that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive.