SlideShare une entreprise Scribd logo
1  sur  29
•Danish Munir
•Muhammad Soban
•Tayyab Raza
•Muhammad Ali
•Ali Raza
•Muhammad Waqas
•Muhammad Nabeel
•Hamza Khalid
•Introduction & History
•Types of Cyber Crime
•Types of viruses
•Protect Computers
•Cyber Crime in Pakistan
•Cyber War
•Conclusion
Cyber :

Crime:

The term is defined as
computers connected to
internet.

Illegal activities

Computer crime, or
cybercrime, refers to any crime that
involves a computer and a network

It is a criminal activity committed on
the Internet
offenses
against the information
technology infrastructure

Such conducts includes:
• Illegal access
• Illegal Transactions
• System interference
• Data interference
• Misuse of devices
• Fraud
The first spam email took place in 1978
when it was sent out over the Arpanet.
The first virus was installed on an Apple
computer in 1982

16-year-old student, nicknamed “Data
Stream”, arrested by UK police(1994)
Travelling documents of NATO forces were
hacked in Afghanistan.

FBI's e-mail system was hacked (Feb,2005)
•
•
•
•
•
•

Hacking
Email bombing
Data diddling
Denial of Service attack
Malware attacks
Identity Theft
hacking refers to finding out
weaknesses in an established
system and exploiting them. It
could involve the power of the
internet and specialized
programming skills to bypass
sophisticated security
systems.
E-Mail Bombing:
Email bombing refers to sending a large
amount of e-mails to the victim resulting
in interruption in the victims‟ e-mail
account or mail servers.

Data Diddling:
This kind of an attack involves
altering the raw data just before it is
processed by a computer and then
changing it back after the processing
is completed.
Denial of Service:
This involves flooding computer
resources with more requests than it
can handle. This causes the
resources to crash thereby denying
authorized users the service offered
by the resources.

Malware Attacks:
malicious attacks are did through
malicious programs , such as a
virus, which is specifically designed
to disrupt or damage a computer
system.
Identity Theft:
This has become a major problem with
people using the Internet for cash
transactions and banking services. In this
cyber crime, a criminal accesses data
about a person‟s bank account, credit
cards, Social Security, debit card and other
sensitive information to siphon money or to
buy things online in the victim‟s name. It
can result in major financial losses for the
victim and even spoil the victim‟s credit
history.
•

Use anti-virus software
and firewalls – keep
them up to date.
• Keep your operating
system up to date.
• Don't open emails or
attachments from
unknown sources.
• Use hard-to-guess
passwords.
• Don't share access to
your computers with
strangers.
Back-up your computer data on
disks or CDs often.
If you have a Wi-Fi network,
password protect it.
Do not open suspicious
files/emails .
Verify ActiveX/Java prompts .
Avoid using P2P programs .
Avoid downloading freeware.
If attacked, disconnect the
network
VS
For the Indian and
Pakistani kids, cyber
space is the new war
front and August
presumably the
appropriate time for
their reign of cyber
terror.

Pakistani Hackers
hack Indian
websites and in
return they hack
some of Pakistan‟s.
The cyber war between India and
Pakistan started in May 1998, when
Pakistani hackers attacked Bhabha
Atomic Research Center‟s website to
somehow proclaim their technological
supremacy. In November 2010, a group
called „The Indian cyber army defaced a
number of important Pakistani national
websites, including that of the Pakistan
Army in their efforts to avenge the
Mumbai attacks.

And throughout the year
these geniuses continue to
hack websites in the name of
national pride.
It seems evident that the cyber
war between Pakistan and India
is not state-sponsored, but state
agencies have emerged as
constant victims of cyber-attacks
over the years. cybercrime is
now being considered as an
effective way of expressing
patriotism.
Youth of both countries should try
to use their efforts in positive
sense.
Cyber crime presentation by HuNnY ButT

Contenu connexe

Tendances

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
The dark web
The dark webThe dark web
The dark webBella M
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Tendances (20)

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Darknet
DarknetDarknet
Darknet
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Deep web
Deep webDeep web
Deep web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
The dark web
The dark webThe dark web
The dark web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Similaire à Cyber crime presentation by HuNnY ButT

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 

Similaire à Cyber crime presentation by HuNnY ButT (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
SYBER CRIME.pptx
SYBER CRIME.pptxSYBER CRIME.pptx
SYBER CRIME.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Cyber crime presentation by HuNnY ButT

  • 1.
  • 2.
  • 3. •Danish Munir •Muhammad Soban •Tayyab Raza •Muhammad Ali •Ali Raza •Muhammad Waqas •Muhammad Nabeel •Hamza Khalid
  • 4. •Introduction & History •Types of Cyber Crime •Types of viruses •Protect Computers •Cyber Crime in Pakistan •Cyber War •Conclusion
  • 5. Cyber : Crime: The term is defined as computers connected to internet. Illegal activities Computer crime, or cybercrime, refers to any crime that involves a computer and a network It is a criminal activity committed on the Internet
  • 6. offenses against the information technology infrastructure Such conducts includes: • Illegal access • Illegal Transactions • System interference • Data interference • Misuse of devices • Fraud
  • 7. The first spam email took place in 1978 when it was sent out over the Arpanet. The first virus was installed on an Apple computer in 1982 16-year-old student, nicknamed “Data Stream”, arrested by UK police(1994) Travelling documents of NATO forces were hacked in Afghanistan. FBI's e-mail system was hacked (Feb,2005)
  • 8. • • • • • • Hacking Email bombing Data diddling Denial of Service attack Malware attacks Identity Theft
  • 9. hacking refers to finding out weaknesses in an established system and exploiting them. It could involve the power of the internet and specialized programming skills to bypass sophisticated security systems.
  • 10. E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims‟ e-mail account or mail servers. Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 11. Denial of Service: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources. Malware Attacks: malicious attacks are did through malicious programs , such as a virus, which is specifically designed to disrupt or damage a computer system.
  • 12. Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person‟s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim‟s name. It can result in major financial losses for the victim and even spoil the victim‟s credit history.
  • 13. • Use anti-virus software and firewalls – keep them up to date. • Keep your operating system up to date. • Don't open emails or attachments from unknown sources. • Use hard-to-guess passwords. • Don't share access to your computers with strangers.
  • 14. Back-up your computer data on disks or CDs often. If you have a Wi-Fi network, password protect it. Do not open suspicious files/emails . Verify ActiveX/Java prompts . Avoid using P2P programs . Avoid downloading freeware. If attacked, disconnect the network
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. VS
  • 25.
  • 26. For the Indian and Pakistani kids, cyber space is the new war front and August presumably the appropriate time for their reign of cyber terror. Pakistani Hackers hack Indian websites and in return they hack some of Pakistan‟s.
  • 27. The cyber war between India and Pakistan started in May 1998, when Pakistani hackers attacked Bhabha Atomic Research Center‟s website to somehow proclaim their technological supremacy. In November 2010, a group called „The Indian cyber army defaced a number of important Pakistani national websites, including that of the Pakistan Army in their efforts to avenge the Mumbai attacks. And throughout the year these geniuses continue to hack websites in the name of national pride.
  • 28. It seems evident that the cyber war between Pakistan and India is not state-sponsored, but state agencies have emerged as constant victims of cyber-attacks over the years. cybercrime is now being considered as an effective way of expressing patriotism. Youth of both countries should try to use their efforts in positive sense.