SlideShare uma empresa Scribd logo
1 de 33
Cyber Crime
Group Members
o Mazhar Nazik (14-ARID-3883)
o Muhammad Bilal (14-ARID-3842)
o Tayyeb Mehmood (14-ARID-3913)
Contents
o Introduction
o Definition
o History
o Categories
o Types
o Cyber Laws
o Prevention
o Conclusion
Introduction
 Computer crime or Cyber Crime is criminal
activity that involves unlawful access to
computer systems.
Cyber crime is an illegal activity committed
on the internet.
Definition
Crime committed using a computer and the
internet to steal data or information.
Example:
 Stealing credit card information
Breaking into government
website
History
 The first cyber crime ever recorded was in
France during 1820.
 The person involved was Joseph-Marie.
 He was a textile manufacturer, he made
looms.
 He invented looms that can store design.
History
The first spam email took place in the year
1978.
The first virus was installed on Apple
Computer in the year 1982.
Categories of Cyber Crime
 The Computer as a Target:
Using a computer to attacks other computer.
e.g. Hacking, virus/worms attacks etc.
 The Computer as a Weapon:
Using a computer to commit
real world crime
e.g. Cyber terrorism,
credit card fraud etc.
Types of Cyber Crime
 Hacking
Credit Card Fraud
Virus Dissemination
 Cyber Terrorism
 Computer Vandalism
Software Piracy
 Spoofing
Hacking
Hacking is a source of threat to security in
computer. It is defined as unauthorized access to
the computer system by a hacker.
Types Of Hackers:
i. White Hat Hackers
ii. Black Hat Hackers
iii. Gray Hat Hackers
Credit Card Fraud
 When an individual uses another individuals’
credit card for personal reasons while the owner of
the card and the card issuer are not aware of the
fact that the card is being used.
 This problem occur while using online banking ,
shopping.
Credit Card Fraud(contd.)
To avoid such a fraud the banks are now
make a privacy so that one can’t use the
others credit card because of the mobile
security code and two steps verification.
Now this is an ethical conduct that is
enforce by the banks to avoid such type of
hacking.
Virus Dissemination
Malicious software that attaches itself to
other software.
Virus Dissemination(contd.)
• Example to create a virus by yourself open your
notepad and write Following Code and paste it
in notepad then Save it as “anyname.bat".
@echo off
:VIRUS
cd /d C:
md %RANDOM%
cd /d D:
md %RANDOM%
cd /d E:
md %RANDOM%
goto VIRUS
Virus Dissemination(contd.)
 Keep a regular backup of your important files.
 Be aware that most current viruses arrive as e-
mail attachments. Be very aware of any
attachment that has any of the following file
extensions:
.exe .vbs .scr .vbe .com .bat .shs .cpl .dll .ocx
.pif .drv .lnk .bin .sys .eml .nws
 It is impossible for any anti-virus program to
protect against all new viruses, so your best
protection is to be very cautious about opening
e-mail attachments.
Cyber Terrorism
Use of Internet based attacks
in terrorist activities.
There are laws to prevent cyber crimes.
For example:
i. Seven Iranians working on behalf of Iranian
government indicted on hacking charges.
ii. Many persons has sent to jail recently in Rawalpindi
for blackmailing on the social media.
Computer Vandalism
 Damaging or destroying data rather than
stealing.
 Transmitting virus.
 Ethical way to deal
with computer vandalism
is not to give permissions
to software without
reading the agreements.
Computer Vandalism (contd.)
For Example:
Write the Following code In Notepad
Exactly as it says
0100101100011111001001010101010101
0000011111100000
Save as a .EXE -any name will do
Run the .exe
You are done !
Don’t try this at your friend’s laptop it’s just
for information purpose :p
Software Piracy
Theft of software through the illegal
copying of genuine programs.
Software Piracy(contd.)
Nowadays, no one is ready to use the
original software’s as they are too costly.
Some of the organizations are now doing
a serious attempt against the people who
are involved in the distribution of pirated
software’s.
For Example:
BSA has many running cases.
Spoofing
 The word "spoof" means to trick, or deceive.
Therefore, in the IT world, spoofing refers tricking
or deceiving computer systems or other computer
users. This is typically done by hiding one's identity
or faking the identity of another user on the
Internet.
 Spoofing can take place on the Internet in several
different ways:
 E-mail Spoofing
 IP Spoofing
 Fake Identity
Spoofing(contd.)
 Always keep your computer system updated
with a good anti virus software
 Do not open the mail if you do not recognize the
sender.
 Ignore any mails with comes without sender
names
 Ignore any mail which has your name in the
sender details
 Do not open any mails if it has only a link in the
body of the message
Cyber Laws in Pakistan
 There are different laws, promulgated in
Pakistan.
 These laws not only deal with crime of Internet.
 These deal with all dimensions related to
computer & networks.
 Two of them are most known. They are:
 Electronic Transaction Ordinance 2002
 Electronic / Cyber Crime Bill 2007
Electronic Transaction Ordinance
2002
Overview
 The Electronic Transactions Ordinance (ETO),
2002, was the first IT-relevant legislation created
by national lawmakers.
 Protection for Pakistani e-Commerce locally and
globally.
 Protect Pakistan’s critical infrastructure
 It is heavily taken from foreign law related to
cyber crime.
Electronic/Cyber Crime Bill 2007
Overview
 “Prevention of Electronic Crimes Ordinance, 2007″ is in force now.
 It was promulgated by the President of Pakistan on the 31st
December 2007
 The bill deals with the electronic crimes included:
Cyber terrorism
Data damage
Electronic fraud
Unauthorized access to code
Cyber Spamming/spoofing
Electronic/Cyber Crime Bill 2007
 It will apply to every person who commits
an offence, irrespective of his nationality or
citizenship.
 It gives exclusive powers to the Federal
Investigation Agency (FIA) to investigate
and charge cases against such crimes.
 Every respective offence under this law
has its distinctive punishment which can
be imprisonment or fine.
Imprisonment and Fine
SAFETY TIPS FOR CYBER
CRIME
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Never give your full name or address to
strangers.
 Learn more about Internet privacy.
Cyber Security
Internet security is a branch of computer
security specifically related to the Internet.
It's objective is to establish rules and
measure to use
against attacks
over the Internet.
ADVANTAGES OF CYBER
SECURITY
Defend us from critical attacks.
Browse the safe website.
Internet security process all the incoming
and outgoing data on our computer.
Conclusion
As someone rightly said that “bytes are
replacing bullets in the crime world”.
The key to protecting yourself is being
aware.
Not all cybercriminals are “hackers.”
There is a whole other world that
exists in cyberspace, make sure that
your information travels safely.
Stay Secure.
Cyber Crime

Mais conteúdo relacionado

Mais procurados

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

Mais procurados (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 

Destaque

JT_May 2015 (pdf6 - 05.06.2015 Final low res)
JT_May 2015 (pdf6 - 05.06.2015 Final low res)JT_May 2015 (pdf6 - 05.06.2015 Final low res)
JT_May 2015 (pdf6 - 05.06.2015 Final low res)
Anthea Van Zyl
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connections
yashgaba
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 

Destaque (20)

Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
JT_May 2015 (pdf6 - 05.06.2015 Final low res)
JT_May 2015 (pdf6 - 05.06.2015 Final low res)JT_May 2015 (pdf6 - 05.06.2015 Final low res)
JT_May 2015 (pdf6 - 05.06.2015 Final low res)
 
Finansiële wiskunde
Finansiële wiskundeFinansiële wiskunde
Finansiële wiskunde
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Route Optimization Algorithm..
Route Optimization Algorithm..Route Optimization Algorithm..
Route Optimization Algorithm..
 
Grid computing
Grid computingGrid computing
Grid computing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connections
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

Semelhante a Cyber Crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
cyber crime
cyber crimecyber crime
cyber crime
Mukund10
 

Semelhante a Cyber Crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Hamza
HamzaHamza
Hamza
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Presentation1
Presentation1Presentation1
Presentation1
 
cyber crime
cyber crimecyber crime
cyber crime
 

Último

Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 

Último (20)

Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 

Cyber Crime

  • 1.
  • 3. Group Members o Mazhar Nazik (14-ARID-3883) o Muhammad Bilal (14-ARID-3842) o Tayyeb Mehmood (14-ARID-3913)
  • 4. Contents o Introduction o Definition o History o Categories o Types o Cyber Laws o Prevention o Conclusion
  • 5. Introduction  Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems. Cyber crime is an illegal activity committed on the internet.
  • 6. Definition Crime committed using a computer and the internet to steal data or information. Example:  Stealing credit card information Breaking into government website
  • 7. History  The first cyber crime ever recorded was in France during 1820.  The person involved was Joseph-Marie.  He was a textile manufacturer, he made looms.  He invented looms that can store design.
  • 8. History The first spam email took place in the year 1978. The first virus was installed on Apple Computer in the year 1982.
  • 9. Categories of Cyber Crime  The Computer as a Target: Using a computer to attacks other computer. e.g. Hacking, virus/worms attacks etc.  The Computer as a Weapon: Using a computer to commit real world crime e.g. Cyber terrorism, credit card fraud etc.
  • 10. Types of Cyber Crime  Hacking Credit Card Fraud Virus Dissemination  Cyber Terrorism  Computer Vandalism Software Piracy  Spoofing
  • 11. Hacking Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker. Types Of Hackers: i. White Hat Hackers ii. Black Hat Hackers iii. Gray Hat Hackers
  • 12. Credit Card Fraud  When an individual uses another individuals’ credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used.  This problem occur while using online banking , shopping.
  • 13. Credit Card Fraud(contd.) To avoid such a fraud the banks are now make a privacy so that one can’t use the others credit card because of the mobile security code and two steps verification. Now this is an ethical conduct that is enforce by the banks to avoid such type of hacking.
  • 14. Virus Dissemination Malicious software that attaches itself to other software.
  • 15. Virus Dissemination(contd.) • Example to create a virus by yourself open your notepad and write Following Code and paste it in notepad then Save it as “anyname.bat". @echo off :VIRUS cd /d C: md %RANDOM% cd /d D: md %RANDOM% cd /d E: md %RANDOM% goto VIRUS
  • 16. Virus Dissemination(contd.)  Keep a regular backup of your important files.  Be aware that most current viruses arrive as e- mail attachments. Be very aware of any attachment that has any of the following file extensions: .exe .vbs .scr .vbe .com .bat .shs .cpl .dll .ocx .pif .drv .lnk .bin .sys .eml .nws  It is impossible for any anti-virus program to protect against all new viruses, so your best protection is to be very cautious about opening e-mail attachments.
  • 17. Cyber Terrorism Use of Internet based attacks in terrorist activities. There are laws to prevent cyber crimes. For example: i. Seven Iranians working on behalf of Iranian government indicted on hacking charges. ii. Many persons has sent to jail recently in Rawalpindi for blackmailing on the social media.
  • 18. Computer Vandalism  Damaging or destroying data rather than stealing.  Transmitting virus.  Ethical way to deal with computer vandalism is not to give permissions to software without reading the agreements.
  • 19. Computer Vandalism (contd.) For Example: Write the Following code In Notepad Exactly as it says 0100101100011111001001010101010101 0000011111100000 Save as a .EXE -any name will do Run the .exe You are done ! Don’t try this at your friend’s laptop it’s just for information purpose :p
  • 20. Software Piracy Theft of software through the illegal copying of genuine programs.
  • 21. Software Piracy(contd.) Nowadays, no one is ready to use the original software’s as they are too costly. Some of the organizations are now doing a serious attempt against the people who are involved in the distribution of pirated software’s. For Example: BSA has many running cases.
  • 22. Spoofing  The word "spoof" means to trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.  Spoofing can take place on the Internet in several different ways:  E-mail Spoofing  IP Spoofing  Fake Identity
  • 23. Spoofing(contd.)  Always keep your computer system updated with a good anti virus software  Do not open the mail if you do not recognize the sender.  Ignore any mails with comes without sender names  Ignore any mail which has your name in the sender details  Do not open any mails if it has only a link in the body of the message
  • 24. Cyber Laws in Pakistan  There are different laws, promulgated in Pakistan.  These laws not only deal with crime of Internet.  These deal with all dimensions related to computer & networks.  Two of them are most known. They are:  Electronic Transaction Ordinance 2002  Electronic / Cyber Crime Bill 2007
  • 25. Electronic Transaction Ordinance 2002 Overview  The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers.  Protection for Pakistani e-Commerce locally and globally.  Protect Pakistan’s critical infrastructure  It is heavily taken from foreign law related to cyber crime.
  • 26. Electronic/Cyber Crime Bill 2007 Overview  “Prevention of Electronic Crimes Ordinance, 2007″ is in force now.  It was promulgated by the President of Pakistan on the 31st December 2007  The bill deals with the electronic crimes included: Cyber terrorism Data damage Electronic fraud Unauthorized access to code Cyber Spamming/spoofing
  • 27. Electronic/Cyber Crime Bill 2007  It will apply to every person who commits an offence, irrespective of his nationality or citizenship.  It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.  Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.
  • 29. SAFETY TIPS FOR CYBER CRIME  Use antivirus software’s.  Insert firewalls.  Uninstall unnecessary software  Maintain backup.  Check security settings.  Never give your full name or address to strangers.  Learn more about Internet privacy.
  • 30. Cyber Security Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 31. ADVANTAGES OF CYBER SECURITY Defend us from critical attacks. Browse the safe website. Internet security process all the incoming and outgoing data on our computer.
  • 32. Conclusion As someone rightly said that “bytes are replacing bullets in the crime world”. The key to protecting yourself is being aware. Not all cybercriminals are “hackers.” There is a whole other world that exists in cyberspace, make sure that your information travels safely. Stay Secure.