0% found this document useful (0 votes)
12 views27 pages

Cyber Crime

Uploaded by

umar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views27 pages

Cyber Crime

Uploaded by

umar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

CYBER CRIME

PRESENTED BY:

 ZONISH FATIMA
 MAH.E.UFAQ
 MOHSINA IJAZ
 SADIA ANAYAT
 MALAIKA SIKANDER
CONTENTS:
• Introduction
• Definition
• History
• Types of Cyber Crime
• Facts
• Online Activities
• Disadvantages
INTRODUCTION:

• Cybercrime, or computer crime, is a crime


that involves a computer and a network.

• The computer may have been used in the


commission of a crime, or it may be the
target.
• Cyber Crime is an illegal activity committed on
the internet.
DEFINITION:

Crime committed using a computer and the internet


to steal data or information .

Example :
• Stealing credit card information.

• Breaking into government website .


HISTORY

• The first cyber crime ever recorded was in France during 1820.

• The person involved was Joseph-Marie.

• He invented looms that can store design.


Joseph meri looms

.
CYBERCRIME LAWS IN PAKISTAN:

Cyber crime law includes the following crimes:


 Illegal access to information(Section 3).
 Cyber terrorism(Section 7).
 Special protection of women(Section 13).
 Electronic fraud (Section 9).
 Warrant for disclosure of traffic data (Section 20).
 Child pornography ( Section 292).
TYPES OF CYBER CRIME

• Hacking
• Credit Card Fraud
• Virus Dissemination
• Cyber Terrorism
• Computer vandalism
• Software privacy
• Spoofing
HACKING

• Hacking is an attempt to exploit a computer


system or a private network.

TYPES OF HACKERS

I. White Hat Hacker


II. Black Hat Hacker
III. Gray Hat Hacker
CREDIT CARD FRAUD

• Credit card fraud is a wide-ranging term for theft and fraud committed using
or involving a payment card.

• The purpose may be to obtain goods without paying, or to obtain unauthorized


funds from an account.
• Credit card fraud is also an adjunct to identity theft.
TYPES OF CREDIT CARD FRAUD

 Counterfeit credit card


 Lost or stolen cards
 no card fraud
VIRUS DISSEMINATION

• Virus dissemination is a process of a


Malicious software that attaches to other
software that destroys the system of the
victim.
• They disrupt the computer operation and
affect the data store by modifying or deleting
it.
SOLUTION FOR VIRUSES:

 ANTIVIRUSES
e.g:
VGA
NORTON
CYBER TERRORISM

• Cyber terrorism is the use of the internet to conduct violent acts that result in,
loss of life or significant bodily harm.

• In order to achieve political or ideological gains through threat


or intimidation.
• Cyber terrorism is a controversial term.
EXAMPLES OF CYBER TERORISM:

 Hacking into computer system


 Website defacing
 Introducing viruses to vulnerable networks
 Terosistic threats made via e.mail
COMPUTER VANDALISM

• Damaging or destroying data rather than stealing.

• Transmitting virus.

• Ethical way to deal with computer vandalism is not


Give permissions to software without reading the
Agreements.
SOFTWARE PRIVACY

• Privacy software is software built to


protect the privacy of its users
• The software typically works in
conjunction with Internet usage to
control or limit the amount of information
made available to third parties.
TYPES OF SOFTWARE PRIVACY:
 Soft lifting
 Hard disk loading
 Renting
 OEM unbundling
 Counterfeiting
 Online privacy
SPOOFING

• Spoofing is the act of disguising a


communication from an unknown source
as being from a known, trusted source.
• Spoofing can apply to emails, phone calls,
and websites, or can be more technical,
such as a computer spoofing an IP
address, Address Resolution Protocol
(ARP), or Domain Name System (DNS)
server
DEFENCE AGAINST IP SPOFFING
ATTACK:
 Authentication based on key exchange.
 Accessing control list.
 Filtering
 Configure ruler and switches.
CYBER CRIME: THE FACTS

• Cyber crime has now surpassed illegal


drug trafficking as a criminal moneymaker

• Somebody’s identity is stolen every 3


seconds as a result of cyber crime

• Without a sophisticated security package,


your unprotected PC can become
infected within four minutes of connecting
to the Internet.
MAJOR ONLINE ACTIVITIES

•Internet surfing

• Entertainment
•Online Banking

•Audio & video communication

•Social networking
DISADVANTAGES

•It could cause a violation of privacy.

•It can steal your personal and sensitive


information and use it for malicious activities.

•It can cause data loss that could lead to a


business demise.

•Exposure to security risks that come with


connecting to a large network.
SERVICES FOR CYBER CRIME

• Computer Forensics
• Mobile Forensics
• Video Forensics
• Network Forensics
• Technical Training
How to protect yourself against cybercrime

• Use a full-service internet security suite


• Use strong passwords

• Keep your software updated

• Manage your social media settings

• Keep up to date on major security breaches

You might also like