SlideShare uma empresa Scribd logo
1 de 14
.
R.A.Saboor
17581556-046
1 What is Cyber
Crime?
2 Cyber Laws in the
World and Pakistan
3
4
5
6
What are Cyber
Security Professionals?
Types of Cyber crime.
Roles and responsibilities of
CSP
How to become CSP?
1. HACKING
2. VIRUS ATTACK
3. CREDIT CARD
FRAUD
4. PHISHING
5.CYBER
DEFAMATI
ON
6.DENIAL OF
SERVICE
ATTACK
7. SOFTWARE
PIRACY
8. NET
EXTORTION
9. SPOOFING
10.IRC CRIME
11.BLUE
BUGGING
• Cyber laws is an attempt to apply laws designed
for the physical world to human activity on the
Internet
• The legal issues related to use of
communications
technology, particularly "cyberspace"
• , i.e. the Internet.
It is an intersection of many legal fields, like:
Intellectual property,
Privacy
Cyber Laws in Pakistan
Electronic/Cyber
Crime Bill 2007
Prevention of
Electronic Crime
Act 2016
Computer
Misuse Act
1990
Electronic
Transaction
Ordinance 2002
What are Cyber Security Professional
 Provide security during the development stages of software systems,
networks, and data centers.
 Search for risks and vulnerabilities in software and hardware.
 Monitor and manage any attacks and illegal intrusions.
 Responsible for securing the information systems of an organization.
 Eliminate thread by closing off the security vulnerability.
 Apply multi-layer security policies.
Roles and responsibilities of Cyber
Security Professional
 Monitor operations and infrastructure.
 Maintain Security Tools and Technology.
 Monitor internal and external policies.
 Work with different departments in an organization to reduce risks.
 Implement new technology.
 Audit policies and controls
Tools needed to become a cyber security Professional.
Metasploit
Nmap
Wireshark
Aircrack-ng
John the Ripper
Nessus
Burpsuite
Skills needed to become a cyber secuirty professional
Windows, UNIX and Linux operating systems
Penetration and vulnerability
Computer networking, routing, TCP/IP, and switching
Security Information and Event Management (SIEM)
Anti-virus, and anti-malware, DLP
Ethical hacking, threat modeling, and secure coding practices
Java, PHP, C++, C#
.

Mais conteúdo relacionado

Mais procurados

Analysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crimeAnalysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crimeMohammad Husain
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsCma Mohd
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy lawsesther_sonu
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 

Mais procurados (20)

Cyber crime.ppt
Cyber crime.pptCyber crime.ppt
Cyber crime.ppt
 
Analysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crimeAnalysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crime
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 

Semelhante a cyber security and cyber crime

Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber Crimes and other Economic Offences
Cyber Crimes and other Economic OffencesCyber Crimes and other Economic Offences
Cyber Crimes and other Economic OffencesRupak Ghosh
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastMohamed N. El-Guindy
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 

Semelhante a cyber security and cyber crime (20)

Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
it act
it actit act
it act
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Crimes and other Economic Offences
Cyber Crimes and other Economic OffencesCyber Crimes and other Economic Offences
Cyber Crimes and other Economic Offences
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 

Mais de university of Gujrat, pakistan

Mais de university of Gujrat, pakistan (20)

Change management
Change management Change management
Change management
 
Latest Trends in Digital Marketing
Latest Trends in Digital MarketingLatest Trends in Digital Marketing
Latest Trends in Digital Marketing
 
Dark web (2)
Dark web (2)Dark web (2)
Dark web (2)
 
Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)
 
Certification accreditation and licensure (1)
Certification accreditation and licensure (1)Certification accreditation and licensure (1)
Certification accreditation and licensure (1)
 
biggest technology trends
biggest technology trendsbiggest technology trends
biggest technology trends
 
Freedom of information (1)
Freedom of information (1)Freedom of information (1)
Freedom of information (1)
 
Individual cognition ppt (1)
Individual cognition ppt (1)Individual cognition ppt (1)
Individual cognition ppt (1)
 
Top 10 highest (1)
Top 10 highest (1)Top 10 highest (1)
Top 10 highest (1)
 
creativity and imagination
creativity and imagination creativity and imagination
creativity and imagination
 
Brainstorming 078 (1)
Brainstorming 078 (1)Brainstorming 078 (1)
Brainstorming 078 (1)
 
speeh-artificial intelligemce
speeh-artificial intelligemce speeh-artificial intelligemce
speeh-artificial intelligemce
 
Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)
 
Motivation
MotivationMotivation
Motivation
 
Vision of artificial intelligence (1)
Vision of artificial intelligence (1)Vision of artificial intelligence (1)
Vision of artificial intelligence (1)
 
Entrepreneurship (1)
Entrepreneurship (1)Entrepreneurship (1)
Entrepreneurship (1)
 
Role of professional societies
Role of professional societiesRole of professional societies
Role of professional societies
 
Dealing with culticultural environment (1)
Dealing with culticultural environment (1)Dealing with culticultural environment (1)
Dealing with culticultural environment (1)
 
Dealing with problem complexity (1)
Dealing with problem complexity (1)Dealing with problem complexity (1)
Dealing with problem complexity (1)
 
Resume writing and interview techniques (1)
Resume writing and interview techniques (1)Resume writing and interview techniques (1)
Resume writing and interview techniques (1)
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

cyber security and cyber crime

  • 2. 1 What is Cyber Crime? 2 Cyber Laws in the World and Pakistan 3 4 5 6 What are Cyber Security Professionals? Types of Cyber crime. Roles and responsibilities of CSP How to become CSP?
  • 3.
  • 4.
  • 5. 1. HACKING 2. VIRUS ATTACK 3. CREDIT CARD FRAUD 4. PHISHING 5.CYBER DEFAMATI ON 6.DENIAL OF SERVICE ATTACK 7. SOFTWARE PIRACY 8. NET EXTORTION 9. SPOOFING 10.IRC CRIME 11.BLUE BUGGING
  • 6. • Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet • The legal issues related to use of communications technology, particularly "cyberspace" • , i.e. the Internet. It is an intersection of many legal fields, like: Intellectual property, Privacy
  • 7.
  • 8. Cyber Laws in Pakistan Electronic/Cyber Crime Bill 2007 Prevention of Electronic Crime Act 2016 Computer Misuse Act 1990 Electronic Transaction Ordinance 2002
  • 9. What are Cyber Security Professional  Provide security during the development stages of software systems, networks, and data centers.  Search for risks and vulnerabilities in software and hardware.  Monitor and manage any attacks and illegal intrusions.  Responsible for securing the information systems of an organization.  Eliminate thread by closing off the security vulnerability.  Apply multi-layer security policies.
  • 10. Roles and responsibilities of Cyber Security Professional  Monitor operations and infrastructure.  Maintain Security Tools and Technology.  Monitor internal and external policies.  Work with different departments in an organization to reduce risks.  Implement new technology.  Audit policies and controls
  • 11. Tools needed to become a cyber security Professional. Metasploit Nmap Wireshark Aircrack-ng John the Ripper Nessus Burpsuite
  • 12. Skills needed to become a cyber secuirty professional Windows, UNIX and Linux operating systems Penetration and vulnerability Computer networking, routing, TCP/IP, and switching Security Information and Event Management (SIEM) Anti-virus, and anti-malware, DLP Ethical hacking, threat modeling, and secure coding practices Java, PHP, C++, C#
  • 13.
  • 14. .