4. •Introduction & History
•Types of Cyber Crime
•Types of viruses
•Protect Computers
•Cyber Crime in Pakistan
•Cyber War
•Conclusion
5. Cyber :
Crime:
The term is defined as
computers connected to
internet.
Illegal activities
Computer crime, or
cybercrime, refers to any crime that
involves a computer and a network
It is a criminal activity committed on
the Internet
6. offenses
against the information
technology infrastructure
Such conducts includes:
• Illegal access
• Illegal Transactions
• System interference
• Data interference
• Misuse of devices
• Fraud
7. The first spam email took place in 1978
when it was sent out over the Arpanet.
The first virus was installed on an Apple
computer in 1982
16-year-old student, nicknamed “Data
Stream”, arrested by UK police(1994)
Travelling documents of NATO forces were
hacked in Afghanistan.
FBI's e-mail system was hacked (Feb,2005)
9. hacking refers to finding out
weaknesses in an established
system and exploiting them. It
could involve the power of the
internet and specialized
programming skills to bypass
sophisticated security
systems.
10. E-Mail Bombing:
Email bombing refers to sending a large
amount of e-mails to the victim resulting
in interruption in the victims‟ e-mail
account or mail servers.
Data Diddling:
This kind of an attack involves
altering the raw data just before it is
processed by a computer and then
changing it back after the processing
is completed.
11. Denial of Service:
This involves flooding computer
resources with more requests than it
can handle. This causes the
resources to crash thereby denying
authorized users the service offered
by the resources.
Malware Attacks:
malicious attacks are did through
malicious programs , such as a
virus, which is specifically designed
to disrupt or damage a computer
system.
12. Identity Theft:
This has become a major problem with
people using the Internet for cash
transactions and banking services. In this
cyber crime, a criminal accesses data
about a person‟s bank account, credit
cards, Social Security, debit card and other
sensitive information to siphon money or to
buy things online in the victim‟s name. It
can result in major financial losses for the
victim and even spoil the victim‟s credit
history.
13. •
Use anti-virus software
and firewalls – keep
them up to date.
• Keep your operating
system up to date.
• Don't open emails or
attachments from
unknown sources.
• Use hard-to-guess
passwords.
• Don't share access to
your computers with
strangers.
14. Back-up your computer data on
disks or CDs often.
If you have a Wi-Fi network,
password protect it.
Do not open suspicious
files/emails .
Verify ActiveX/Java prompts .
Avoid using P2P programs .
Avoid downloading freeware.
If attacked, disconnect the
network
26. For the Indian and
Pakistani kids, cyber
space is the new war
front and August
presumably the
appropriate time for
their reign of cyber
terror.
Pakistani Hackers
hack Indian
websites and in
return they hack
some of Pakistan‟s.
27. The cyber war between India and
Pakistan started in May 1998, when
Pakistani hackers attacked Bhabha
Atomic Research Center‟s website to
somehow proclaim their technological
supremacy. In November 2010, a group
called „The Indian cyber army defaced a
number of important Pakistani national
websites, including that of the Pakistan
Army in their efforts to avenge the
Mumbai attacks.
And throughout the year
these geniuses continue to
hack websites in the name of
national pride.
28. It seems evident that the cyber
war between Pakistan and India
is not state-sponsored, but state
agencies have emerged as
constant victims of cyber-attacks
over the years. cybercrime is
now being considered as an
effective way of expressing
patriotism.
Youth of both countries should try
to use their efforts in positive
sense.