Cyber crime in pakistan by zubair

Muhammad Zubair
Muhammad Zubairstudent at university of sargodha & Junior Android Developer à Android Developer at MI Dynamics

this is report on cyber crime. it is very easy.so read this.

Cyber Crime
In Pakistan
Table of Contents
Muhammad Zubair
Introduction
……………………………………………………….
4 Cybercrime
……………………………………………………… 4
Cybercrime: The fact
…………………………………... 4 Major online
activities ……………………………………. 4
Cybercrime categories
………………………………….... 5
Recommendations
……………………………………………... 8 Smart
phone
…………………………………………………... 8
Online banking
………………………………………………. 8
Facebook
……………………………………………………….
8 WI-FI
…………………………………………………………
…… 8 Browsing
………………………………………………………...
9 Role of Pakistan in
Cybercrime…………………………... 9 Conclusion
…………………………………………………………
11
Report on:
Cyber Crime in Pakistan.
Submitted by:
Muhammad Zubair Shoukat
BSCS 3rd
(D)
Submitted to:
Miss. Maryam Khan.
11 January 10, 2016
University of Sargodha
(Lahore Campus)
Introduction
What is Cybercrime?
A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal
activity involving computers and networks. It can range from fraud to unsolicited emails (spam).
It can include the distant theft of government or corporate secrets through criminal trespass into
remote systems around the globe. Cybercrime incorporates anything from downloading illegal
music files to stealing millions of rupees from online bank accounts. Cybercrime also includes
non-money offenses, such as creating viruses on other computers or posting confidential business
information on the Internet.
Commission of cybercrime can be:
• The computer as a target attacking the computers (e.g. spreading viruses etc.).
• The computer as a weapon to Commits fraud or illegal gambling.
• The computer as an accessory to store illegal or stolen information.
CYBER CRIME: THE FACTS
• Cybercrime has now surpassed illegal drug trafficking as a criminal moneymaker.
• Somebody’s identity is stolen every 3 seconds as a result of cybercrime.
• Without a sophisticated security package, your unprotected PC can become infected within
four minutes of connecting to the Internet.
MAJOR ONLINE ACTIVITIES
• Social networking
• Internet surfing
• Audio & video communication
• Entertainment
• Online shopping
• Map directions / GPS
• Online education
• Online auction
• Information sharing
• Medical assistance
• Online games
CYBER CRIME CATEGORIES
• Hacking
• Identity theft
• Cyber Bullying
• Cyber Stalking
• Financial fraud
• Digital Piracy
• Computer viruses and worms
• Malicious Software
• Intellectual property rights
• Money Laundering
• Denial of Service attack
• Electronic Terrorism,
• Vandalism and Extortion
HACKING
Trying to get into computer systems in order to steal, corrupt, or illegitimately view data.
Hacking comes from the term “hacker”, who is an expert in computer programming languages
and systems. Hacking, in this sense, means using unusually complex and clever methods to make
computers do things. For some time, however, the popular press has used the word “hacker” and
“hacking” in a negative way to refer to individuals who try to get into computer systems in order
to steal, corrupt, or illegitimately view data. Hackers themselves maintain that the proper term for
such individuals is “cracker”, and that their activities should be called cracking. However, in order
to be consistent with the most common usage of the word, we use “hacking” here to refer to
unauthorized access.
WEBSITE DEFACEMENT
Website defacement is an attack on a website that changes the visual appearance of the site
or a webpage. This is typically the work of system crackers, who break into a web server and
replace the hosted website with one of its own. The most common method of defacement is using
SQL Injections to log on to administrator accounts. Defacements usually consist of an entire page.
This page usually includes the defacer’s pseudonym or “Hacking Codename.” Sometimes, the
Website Defacer makes fun of the system administrator for failing to maintain server security.
Most times, the defacement is harmless, however, sometimes it can be used as a distraction to
cover up more sinister actions such as uploading malware or deleting essential files from the
server.
CYBER BULLYING
Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten
or make unwanted advances towards someone else. This sort of harassment can cause physical,
emotional, and psychological damage to the victim. Children are particularly vulnerable because
of their trusting nature and give away their personal information. This information later is used
against them for stalking purpose.
CYBER STALKING
Using the Internet to threaten or make unwanted advances towards someone else Cyber
stalking (also called cyber harassment) is when someone uses the Internet to threaten or make
unwanted advances towards someone else. This sort of harassment can cause physical, emotional,
and psychological damage to the victim. Children are particularly vulnerable because of their
trusting nature.
CHILD PORNOGRAPHY
The internet evolution has made children a viable victim to the cybercrime. As more homes
have access to internet, children use the internet and chances have increased where they can fall
victim to the aggression of pedophiles. The easy access to pornographic contents available over
the internet lowers the inhibition of the children. Pedophiles lure the children by distributing
pornographic material, and try to meet them for sexual activities which also include collection of
their explicit photographs and videos. Mostly pedophiles try to contact children in chat rooms
posing as teenagers, and start to befriend them to win their confidence.
Each year, countless children around the world fall prey to sexual predators. These young
victims are left with permanent psychological, physical, and emotional scars. When a recording of
that sexual abuse is made or released onto the Internet, it lives on forever. It haunts the children
depicted in it, who live daily with the knowledge that countless strangers use an image of their
worst experiences for their own gratification.
SOCIAL ENGINEERING
Social engineering is a technique used by cyber criminals to get access to confidential
information. With social engineering, attackers use manipulation and deceit to trick victims into
giving out confidential information.
Some of the social engineering methods used by attackers:
• Sending messages that contain dangerous attachments (e.g. malware) with text that
encourage people to open the attachments.
• Pretending to be the main administrator of a local network and asking for the victim’s
password in order to perform a maintenance check.
• Telling a victim over the phone that he/she has won a prize, in return they ask for a credit
card number to deliver it.
• Asking for a user’s password for a certain Internet service, such as a blog, and later use the
same password to access user’s computer. This technique works because users often use
the same passwords for many different portals.
DATA THEFT
Data theft is the act of stealing computer based information from an unknowing victim
with the intent of compromising privacy or obtaining confidential information. Data theft is
increasingly a problem for individual computer users, as well as big corporate firms. The
following categories are most common in data theft cases.
sure that your data is safe from prying eyes when you sell or buy things on the Web. Carelessness
can lead to leaking your private account information.
• Password cracking: Intruders can access your machine and get valuable data if it is not
password protected or its password can be easily decoded (weak password).
• Eavesdropping: Data sent on insecure lines can be wiretapped and recorded. If no
encryption mechanism is used, there is a good chance of losing your password and other
private information to the eavesdropper.
• Laptop theft: Increasingly incidents of laptop theft from corporate firms occur with the
valuable information stored in the laptop being sold to competitors. Carelessness and lack
of laptop data encryption can lead to major losses for the firm.
IDENTITY THEFT
Identity theft refers to a crime where an individual maliciously obtains and uses another
individuals personal/sensitive information to commit frauds/scams by using the stolen identity.
Mostly this crime is committed for economic gain. The cybercriminal gains access to an
individual’s information by stealing email details, stored information on computer databases, they
eavesdrop over the networks to get hold of transactions. Identity thefts includes but not limited to
shoulder surfing, dumpster diving, spamming, spoofing, phishing, and skimming.
FINANCIAL FRAUD
Financial fraud is a criminal behavior in which a person uses wrong methods to trick a
victim out of his money. The Internet fraud scheme is a common example of financial fraud,
which includes emulated online sales, retail schemes, business opportunity schemes, identity theft,
market manipulation schemes, and credit card schemes.
COMPUTER VIRUSES AND WORMS
A virus is a malicious program that passes from one computer to another in the same way
as a biological virus passes from one person to another. Most viruses are written with a malicious
intent, so that they may cause damage to programs and data in addition to spreading themselves.
Viruses infect existing programs to alter the behavior of programs, actively destroy data, and
perform actions to storage devices that render their stored data inaccessible.
A worm is a software program that uses computer networks and security holes to replicate
itself from one computer to another. It usually performs malicious actions, such as using the
resources of computers as well as shutting down the computers.
INTELLECTUAL PROPERTY RIGHTS
Intellectual property rights are concerned with any act that allows access to patent, trade
secrets, customer data, sales trends, and any confidential information.
DENIAL OF SERVICE ATTACK
A Denial of Service (DoS) attack is mounted with the objective of causing a negative
impact on the performance of a computer or network. It is also known as a network saturation
attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large
number of protocol packets to the network.
Recommendations
SECURE YOUR SMART PHONES
• Always secure your smartphone with a strongpassword.
• Ensure that your device locks itself automatically.
• Install securitysoftware.
• Only download apps from approved sources.
• Check your apps permissions.
• Don’t miss operatingsystem updates.
• Be wary of any links you receive via email or text message.
• Turn off automatic Wi-Fi connection.
• When browsing or shopping onyour phone (or computer), always lookfor "https"
in the URL instead of "http".
SECURE YOUR ONLINE BANKING
• Never use same PIN CODE for multiple bank accounts.
• Never use unprotected PCs at cybercafés for internet banking.
• Never keep your pin code and cards together.
• Never leave the PC unattended when using internet banking in a public place.
• Register for Mobile SMS, Email Transaction Alerts.
• Never reply to emails asking for your password or pin code.
• Visit banks website by typing the URL in the address bar.
• Log off and close your browser when you are done using internet banking.
• When using ATM always conceal keypad before entering pin code.
• Before using ATM, make sure that there is no extra device installed in the surroundings.
SECURE YOUR FACEBOOK
• Use extra security features to access account (security code, Login alert etc.).
• Use login notification alert.
• Allow specific individuals to view your contents (Videos, Photos and Friends etc.).
• Control who can contact you.
• Block your profile from search engines.
SECURE YOUR WIFI
• Change Default Administrator Passwords and Usernames of the Wi-Fi Router.
• Use complex password and change Password after regular intervals.
• Position the Router or Access Point Safely.
• Turn off the Network / Wi-Fi routers if it is not in use.
SECURE YOUR BROWSING
• What you put online will always remain there.
• Never trust any free online content.
• Don’t provide personal information online to get something free.
• Don’t click on links inside emails or messages.
Role of Pakistan in the Cyber World
The Pakistan market has now grown manifolds with the largest majority of internet users
in Karachi and then Lahore and Islamabad. These three cities jointly provide over 90% of the
customer base and expansion in activity is also likely to remain primarily confined to these cities
because of the concentration of economic activity in these cities.
It is no surprise that Pakistan is not free from the cyber space dilemma. The availability of
computers and Internet connections provides unprecedented opportunities to communicate and
learn in Pakistan. However, certain individuals do exploit the power of the Internet for criminal
purposes as well.
Pakistan has a legal framework in place to address cybercrimes. The Electronic
Transaction Ordinance 2002 was passed by Pakistan Government with the objective to recognize
and facilitate documents, records, information, communications and transactions in electronic
form, and to provide for the accreditation of certification service providers. With this legal
framework we do have legal backing for electronic information and communication, as any
written and signed document. With ETO in place, Pakistan has joined an exclusive band of
countries that provide necessary framework and an impetus for growth of electronic commerce in
Pakistan.
The Electronic Transaction Ordinance is an essential prerequisite for e-commerce growth
and termed as "a landmark decision for the IT development of the country"
The Ordinance aimed to achieve:
• Great economic impact.
• E-commerce and projecting Pakistan’s products such as textile, leather goods,
sports goods and surgical items to the world.
• Increased e-transactions.
• Major benefits for the small and medium business enterprises as the cost of
transactions are greatly reduced electronically.
• Legal and safe trading to take place as the necessary laws to protect the interests of
both the buyers and the sellers in the process of electronic sales and purchases are
protected through the promulgation of the Electronic Transaction Ordinance 2002.
The Federal Government, by notification in the official Gazette, makes rules to carry out
the Purposes of the Ordinance.
The ordinance has laid down clauses for the following offenses related to electronic
transactions:
• Provision of false information
• Issue of false certificate
• Damage to information system
Furthermore, the Electronic Crime Act 2004 was prepared by the Ministry of Information
Technology, Pakistan with the Electronic Transaction Ordinance 2002 as the basis.
The Act addresses and lays down legislative terms for the following cybercrimes:
• Criminal access
• Criminal data access
• Data damage
• System damage
• Electronic fraud
• Electronic forgery
• Misuse of devices
• Misuse of encryption
• Malicious code
• Cyber stalking
• Spamming
• Spoofing
• Unauthorized interception
• Cyber Terrorism
• Waging cyber war
• Enhanced punishment for offences involving sensitive electronic systems
• Attempt and aiding or abetting
Other initiatives taken by GoP include the formation of a National Response Center to stop
internet misuse and trace those involved in cybercrimes. The Accreditation Council, in line with
the National IT Policy and the Electronic Transactions Ordinance 2002, was also formed for
Certificate Authorities by the Ministry of Information Technology. This voluntary licensing
program aims at promoting high integrity licensed CAs that can be trusted. A CA wishing to get
licensed will have to meet stringent licensing criteria in various aspects, including financial
soundness, personnel integrity, strict security controls and procedures.
Conclusion
It is not possible to eliminate cybercrime from the cyber space in its entirety. However, it is quite
possible to check it. Any legislation in its entirety might be less successful in totally eliminating
crime from the globe. The primary step is to make people aware of their rights and duties (to
report crime as a collective duty towards the society) and further making the application of the
laws more stringent to check crime.
Developing nations must learn from the experiences of developed nations and leap
forward to prepare against the inevitable cybercrime. In order to strengthen the overall
infrastructure, efforts by each country must be made at an international level to cooperate and
coordinate with each other so as to come to harmonized terms on matters regarding security. In
this regards, international instruments such as the Council of Europe’s Convention on Cyber
Crime 2001, could prove extremely valuable in fighting cybercrime at an international level.
However, in any draft legislation it is important that the provisions of the cyber law are not
made so stringent that it may retard the growth of the industry and prove to be counterproductive.
References
Websites:
Http://www.wikipedia.org http://www.interpol.int
http://www.nr3c.gov.pk http://www.itu.int/ITU-
D/cyb/cybersecurity/legislation.html
Books:
“A to Z of cybercrime” By Aaushi Shah & Srinidhi Ravi.
:The hacker’s Underground Handbook” By David Melnichuk.
Cyber crime in pakistan by zubair

Recommandé

Cyber crime and security in pakistan par
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
9K vues15 diapositives
Cyber Crime and laws in Pakistan par
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
2.4K vues20 diapositives
CYBER CRIME AND CYBER LAW IN PAKISTAN par
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANshabanakousershabana
321 vues72 diapositives
Cyber Laws In Pakistan par
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
29K vues40 diapositives
Cyber crime social media &; family par
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
1.4K vues26 diapositives
Online Crime and New Cyber Laws in Pakistan par
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
3.4K vues47 diapositives

Contenu connexe

Tendances

Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securityEng. Shuaib ibrahim
37.5K vues19 diapositives
Cyber Crime and Cyber Security par
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
3.1K vues20 diapositives
Ethical hacking par
Ethical hacking Ethical hacking
Ethical hacking Institute of Information Security (IIS)
3.5K vues28 diapositives
Cyber crime in india par
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
14.8K vues20 diapositives
CYBER CRIME par
CYBER CRIMECYBER CRIME
CYBER CRIMEKunal Sinha
1.8K vues15 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber CrimeRamesh Upadhaya
2.2K vues19 diapositives

Tendances(20)

Cyber Crime and Cyber Security par Sazed Salman
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman3.1K vues
Cyber crime in india par Arpan Shah
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah14.8K vues
cyber security and impact on national security (3) par Tughral Yamin
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
Tughral Yamin9.7K vues
Cybercrime presentation par Rajat Jain
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.3K vues
Cyber security awareness for students par Kandarp Shah
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah46.5K vues
What constitutes a cyber crime in the country par Ujjwal Tripathi
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi4K vues
Cyber crime & security final tapan par Tapan Khilar
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar660 vues
Seminar on yahoo mail cyber attack par rohit2495
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
rohit24952.1K vues
Cyber crime - What is and types. par Niloy Biswas
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
Niloy Biswas1K vues
Cyber law assignment par cparimala
Cyber law assignmentCyber law assignment
Cyber law assignment
cparimala1K vues
Cyber crime presentation par Priya Saluja
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja3.9K vues
Cyber Governemace In Pakistan par Shakeel Ahmed
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
Shakeel Ahmed3.7K vues

En vedette

N.sai kiran IIITA AP par
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA APsai Nagaragiri
409 vues40 diapositives
Basic about cyber crime, computer crime par
Basic about cyber crime, computer crimeBasic about cyber crime, computer crime
Basic about cyber crime, computer crimeRib Vocal
136 vues19 diapositives
Cyber crime ppt par
Cyber crime pptCyber crime ppt
Cyber crime pptGracy Joseph
5.6K vues28 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeRaja Farhan Saeed
7.3K vues16 diapositives
Cyber Law par
Cyber  LawCyber  Law
Cyber Lawfariez91
33.2K vues12 diapositives
An Introduction to Cyber Law - I.T. Act 2000 (India) par
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
58K vues17 diapositives

Similaire à Cyber crime in pakistan by zubair

Cyber crime par
Cyber crimeCyber crime
Cyber crimePardeep Kumar
488 vues67 diapositives
The Major Types of Cybercrime par
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
250 vues23 diapositives
Cyber Crime and Social Media Security par
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
9.4K vues38 diapositives
cyber crime par
cyber crimecyber crime
cyber crimeSaba MuShtaq
2.3K vues12 diapositives
Typology of Cyber Crime par
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
3.6K vues25 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeMd. Atiqur Rahman
3K vues46 diapositives

Similaire à Cyber crime in pakistan by zubair(20)

The Major Types of Cybercrime par Rubi Orbeta
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta250 vues
Cyber Crime and Social Media Security par Hem Pokhrel
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel9.4K vues
Typology of Cyber Crime par Gaurav Patel
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel3.6K vues
Cyber Crime par zahid_ned
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned1.5K vues
Cybercrimes par Fit Tri
CybercrimesCybercrimes
Cybercrimes
Fit Tri461 vues
Cyber crime ppt par Bushra22
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra226.5K vues
Online Security and How to Make Money Online par Nader Alkeinay
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay551 vues
Cyber Crime and Security ppt by Neeraj Ahirwar par Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar317 vues

Plus de Muhammad Zubair

Cloud computing par
Cloud computingCloud computing
Cloud computingMuhammad Zubair
156 vues10 diapositives
Cloud computing disadvantages par
Cloud computing disadvantagesCloud computing disadvantages
Cloud computing disadvantagesMuhammad Zubair
229 vues15 diapositives
Lecture10 par
Lecture10Lecture10
Lecture10Muhammad Zubair
299 vues31 diapositives
Lecture9 recursion par
Lecture9 recursionLecture9 recursion
Lecture9 recursionMuhammad Zubair
199 vues30 diapositives
Lecture8 par
Lecture8Lecture8
Lecture8Muhammad Zubair
273 vues14 diapositives
Lecture7 par
Lecture7Lecture7
Lecture7Muhammad Zubair
240 vues8 diapositives

Dernier

On Killing a Tree.pptx par
On Killing a Tree.pptxOn Killing a Tree.pptx
On Killing a Tree.pptxAncyTEnglish
66 vues11 diapositives
Jibachha publishing Textbook.docx par
Jibachha publishing Textbook.docxJibachha publishing Textbook.docx
Jibachha publishing Textbook.docxDrJibachhaSahVetphys
47 vues14 diapositives
Create a Structure in VBNet.pptx par
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
75 vues8 diapositives
The Value and Role of Media and Information Literacy in the Information Age a... par
The Value and Role of Media and Information Literacy in the Information Age a...The Value and Role of Media and Information Literacy in the Information Age a...
The Value and Role of Media and Information Literacy in the Information Age a...Naseej Academy أكاديمية نسيج
54 vues42 diapositives
unidad 3.pdf par
unidad 3.pdfunidad 3.pdf
unidad 3.pdfMarcosRodriguezUcedo
106 vues38 diapositives
REPRESENTATION - GAUNTLET.pptx par
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptxiammrhaywood
107 vues26 diapositives

Dernier(20)

Create a Structure in VBNet.pptx par Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 vues
REPRESENTATION - GAUNTLET.pptx par iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood107 vues
Monthly Information Session for MV Asterix (November) par Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC58 vues
Drama KS5 Breakdown par WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch87 vues
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... par Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx par Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Narration lesson plan par TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN59 vues
Structure and Functions of Cell.pdf par Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan701 vues
How to empty an One2many field in Odoo par Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George72 vues
Education and Diversity.pptx par DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar177 vues

Cyber crime in pakistan by zubair

  • 1. Cyber Crime In Pakistan Table of Contents Muhammad Zubair
  • 2. Introduction ………………………………………………………. 4 Cybercrime ……………………………………………………… 4 Cybercrime: The fact …………………………………... 4 Major online activities ……………………………………. 4 Cybercrime categories ………………………………….... 5 Recommendations ……………………………………………... 8 Smart phone …………………………………………………... 8 Online banking ………………………………………………. 8 Facebook ………………………………………………………. 8 WI-FI
  • 3. ………………………………………………………… …… 8 Browsing ………………………………………………………... 9 Role of Pakistan in Cybercrime…………………………... 9 Conclusion ………………………………………………………… 11 Report on: Cyber Crime in Pakistan. Submitted by: Muhammad Zubair Shoukat BSCS 3rd (D) Submitted to:
  • 4. Miss. Maryam Khan. 11 January 10, 2016 University of Sargodha (Lahore Campus) Introduction What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It can include the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Cybercrime incorporates anything from downloading illegal music files to stealing millions of rupees from online bank accounts. Cybercrime also includes non-money offenses, such as creating viruses on other computers or posting confidential business information on the Internet. Commission of cybercrime can be:
  • 5. • The computer as a target attacking the computers (e.g. spreading viruses etc.). • The computer as a weapon to Commits fraud or illegal gambling. • The computer as an accessory to store illegal or stolen information. CYBER CRIME: THE FACTS • Cybercrime has now surpassed illegal drug trafficking as a criminal moneymaker. • Somebody’s identity is stolen every 3 seconds as a result of cybercrime. • Without a sophisticated security package, your unprotected PC can become infected within four minutes of connecting to the Internet. MAJOR ONLINE ACTIVITIES • Social networking • Internet surfing • Audio & video communication • Entertainment • Online shopping • Map directions / GPS • Online education • Online auction • Information sharing • Medical assistance • Online games CYBER CRIME CATEGORIES • Hacking • Identity theft • Cyber Bullying • Cyber Stalking • Financial fraud • Digital Piracy
  • 6. • Computer viruses and worms • Malicious Software • Intellectual property rights • Money Laundering • Denial of Service attack • Electronic Terrorism, • Vandalism and Extortion HACKING Trying to get into computer systems in order to steal, corrupt, or illegitimately view data. Hacking comes from the term “hacker”, who is an expert in computer programming languages and systems. Hacking, in this sense, means using unusually complex and clever methods to make computers do things. For some time, however, the popular press has used the word “hacker” and “hacking” in a negative way to refer to individuals who try to get into computer systems in order to steal, corrupt, or illegitimately view data. Hackers themselves maintain that the proper term for such individuals is “cracker”, and that their activities should be called cracking. However, in order to be consistent with the most common usage of the word, we use “hacking” here to refer to unauthorized access. WEBSITE DEFACEMENT Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. This is typically the work of system crackers, who break into a web server and replace the hosted website with one of its own. The most common method of defacement is using SQL Injections to log on to administrator accounts. Defacements usually consist of an entire page. This page usually includes the defacer’s pseudonym or “Hacking Codename.” Sometimes, the Website Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, sometimes it can be used as a distraction to cover up more sinister actions such as uploading malware or deleting essential files from the server.
  • 7. CYBER BULLYING Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or make unwanted advances towards someone else. This sort of harassment can cause physical, emotional, and psychological damage to the victim. Children are particularly vulnerable because of their trusting nature and give away their personal information. This information later is used against them for stalking purpose. CYBER STALKING Using the Internet to threaten or make unwanted advances towards someone else Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or make unwanted advances towards someone else. This sort of harassment can cause physical, emotional, and psychological damage to the victim. Children are particularly vulnerable because of their trusting nature. CHILD PORNOGRAPHY The internet evolution has made children a viable victim to the cybercrime. As more homes have access to internet, children use the internet and chances have increased where they can fall victim to the aggression of pedophiles. The easy access to pornographic contents available over the internet lowers the inhibition of the children. Pedophiles lure the children by distributing pornographic material, and try to meet them for sexual activities which also include collection of their explicit photographs and videos. Mostly pedophiles try to contact children in chat rooms posing as teenagers, and start to befriend them to win their confidence. Each year, countless children around the world fall prey to sexual predators. These young victims are left with permanent psychological, physical, and emotional scars. When a recording of that sexual abuse is made or released onto the Internet, it lives on forever. It haunts the children depicted in it, who live daily with the knowledge that countless strangers use an image of their worst experiences for their own gratification. SOCIAL ENGINEERING Social engineering is a technique used by cyber criminals to get access to confidential information. With social engineering, attackers use manipulation and deceit to trick victims into giving out confidential information.
  • 8. Some of the social engineering methods used by attackers: • Sending messages that contain dangerous attachments (e.g. malware) with text that encourage people to open the attachments. • Pretending to be the main administrator of a local network and asking for the victim’s password in order to perform a maintenance check. • Telling a victim over the phone that he/she has won a prize, in return they ask for a credit card number to deliver it. • Asking for a user’s password for a certain Internet service, such as a blog, and later use the same password to access user’s computer. This technique works because users often use the same passwords for many different portals. DATA THEFT Data theft is the act of stealing computer based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information. Data theft is increasingly a problem for individual computer users, as well as big corporate firms. The following categories are most common in data theft cases. sure that your data is safe from prying eyes when you sell or buy things on the Web. Carelessness can lead to leaking your private account information. • Password cracking: Intruders can access your machine and get valuable data if it is not password protected or its password can be easily decoded (weak password). • Eavesdropping: Data sent on insecure lines can be wiretapped and recorded. If no encryption mechanism is used, there is a good chance of losing your password and other private information to the eavesdropper. • Laptop theft: Increasingly incidents of laptop theft from corporate firms occur with the valuable information stored in the laptop being sold to competitors. Carelessness and lack of laptop data encryption can lead to major losses for the firm. IDENTITY THEFT Identity theft refers to a crime where an individual maliciously obtains and uses another individuals personal/sensitive information to commit frauds/scams by using the stolen identity. Mostly this crime is committed for economic gain. The cybercriminal gains access to an
  • 9. individual’s information by stealing email details, stored information on computer databases, they eavesdrop over the networks to get hold of transactions. Identity thefts includes but not limited to shoulder surfing, dumpster diving, spamming, spoofing, phishing, and skimming. FINANCIAL FRAUD Financial fraud is a criminal behavior in which a person uses wrong methods to trick a victim out of his money. The Internet fraud scheme is a common example of financial fraud, which includes emulated online sales, retail schemes, business opportunity schemes, identity theft, market manipulation schemes, and credit card schemes. COMPUTER VIRUSES AND WORMS A virus is a malicious program that passes from one computer to another in the same way as a biological virus passes from one person to another. Most viruses are written with a malicious intent, so that they may cause damage to programs and data in addition to spreading themselves. Viruses infect existing programs to alter the behavior of programs, actively destroy data, and perform actions to storage devices that render their stored data inaccessible. A worm is a software program that uses computer networks and security holes to replicate itself from one computer to another. It usually performs malicious actions, such as using the resources of computers as well as shutting down the computers. INTELLECTUAL PROPERTY RIGHTS Intellectual property rights are concerned with any act that allows access to patent, trade secrets, customer data, sales trends, and any confidential information. DENIAL OF SERVICE ATTACK A Denial of Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network.
  • 10. Recommendations SECURE YOUR SMART PHONES • Always secure your smartphone with a strongpassword. • Ensure that your device locks itself automatically. • Install securitysoftware. • Only download apps from approved sources. • Check your apps permissions. • Don’t miss operatingsystem updates. • Be wary of any links you receive via email or text message. • Turn off automatic Wi-Fi connection. • When browsing or shopping onyour phone (or computer), always lookfor "https" in the URL instead of "http". SECURE YOUR ONLINE BANKING • Never use same PIN CODE for multiple bank accounts. • Never use unprotected PCs at cybercafés for internet banking. • Never keep your pin code and cards together. • Never leave the PC unattended when using internet banking in a public place. • Register for Mobile SMS, Email Transaction Alerts. • Never reply to emails asking for your password or pin code. • Visit banks website by typing the URL in the address bar. • Log off and close your browser when you are done using internet banking. • When using ATM always conceal keypad before entering pin code. • Before using ATM, make sure that there is no extra device installed in the surroundings. SECURE YOUR FACEBOOK • Use extra security features to access account (security code, Login alert etc.).
  • 11. • Use login notification alert. • Allow specific individuals to view your contents (Videos, Photos and Friends etc.). • Control who can contact you. • Block your profile from search engines. SECURE YOUR WIFI • Change Default Administrator Passwords and Usernames of the Wi-Fi Router. • Use complex password and change Password after regular intervals. • Position the Router or Access Point Safely. • Turn off the Network / Wi-Fi routers if it is not in use. SECURE YOUR BROWSING • What you put online will always remain there. • Never trust any free online content. • Don’t provide personal information online to get something free. • Don’t click on links inside emails or messages. Role of Pakistan in the Cyber World The Pakistan market has now grown manifolds with the largest majority of internet users in Karachi and then Lahore and Islamabad. These three cities jointly provide over 90% of the customer base and expansion in activity is also likely to remain primarily confined to these cities because of the concentration of economic activity in these cities. It is no surprise that Pakistan is not free from the cyber space dilemma. The availability of computers and Internet connections provides unprecedented opportunities to communicate and learn in Pakistan. However, certain individuals do exploit the power of the Internet for criminal purposes as well. Pakistan has a legal framework in place to address cybercrimes. The Electronic Transaction Ordinance 2002 was passed by Pakistan Government with the objective to recognize and facilitate documents, records, information, communications and transactions in electronic form, and to provide for the accreditation of certification service providers. With this legal framework we do have legal backing for electronic information and communication, as any
  • 12. written and signed document. With ETO in place, Pakistan has joined an exclusive band of countries that provide necessary framework and an impetus for growth of electronic commerce in Pakistan. The Electronic Transaction Ordinance is an essential prerequisite for e-commerce growth and termed as "a landmark decision for the IT development of the country" The Ordinance aimed to achieve: • Great economic impact. • E-commerce and projecting Pakistan’s products such as textile, leather goods, sports goods and surgical items to the world. • Increased e-transactions. • Major benefits for the small and medium business enterprises as the cost of transactions are greatly reduced electronically. • Legal and safe trading to take place as the necessary laws to protect the interests of both the buyers and the sellers in the process of electronic sales and purchases are protected through the promulgation of the Electronic Transaction Ordinance 2002. The Federal Government, by notification in the official Gazette, makes rules to carry out the Purposes of the Ordinance. The ordinance has laid down clauses for the following offenses related to electronic transactions: • Provision of false information • Issue of false certificate • Damage to information system Furthermore, the Electronic Crime Act 2004 was prepared by the Ministry of Information Technology, Pakistan with the Electronic Transaction Ordinance 2002 as the basis.
  • 13. The Act addresses and lays down legislative terms for the following cybercrimes: • Criminal access • Criminal data access • Data damage • System damage • Electronic fraud • Electronic forgery • Misuse of devices • Misuse of encryption • Malicious code • Cyber stalking • Spamming • Spoofing • Unauthorized interception • Cyber Terrorism • Waging cyber war • Enhanced punishment for offences involving sensitive electronic systems • Attempt and aiding or abetting Other initiatives taken by GoP include the formation of a National Response Center to stop internet misuse and trace those involved in cybercrimes. The Accreditation Council, in line with the National IT Policy and the Electronic Transactions Ordinance 2002, was also formed for Certificate Authorities by the Ministry of Information Technology. This voluntary licensing program aims at promoting high integrity licensed CAs that can be trusted. A CA wishing to get licensed will have to meet stringent licensing criteria in various aspects, including financial soundness, personnel integrity, strict security controls and procedures.
  • 14. Conclusion It is not possible to eliminate cybercrime from the cyber space in its entirety. However, it is quite possible to check it. Any legislation in its entirety might be less successful in totally eliminating crime from the globe. The primary step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Developing nations must learn from the experiences of developed nations and leap forward to prepare against the inevitable cybercrime. In order to strengthen the overall infrastructure, efforts by each country must be made at an international level to cooperate and coordinate with each other so as to come to harmonized terms on matters regarding security. In this regards, international instruments such as the Council of Europe’s Convention on Cyber Crime 2001, could prove extremely valuable in fighting cybercrime at an international level. However, in any draft legislation it is important that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counterproductive. References Websites: Http://www.wikipedia.org http://www.interpol.int http://www.nr3c.gov.pk http://www.itu.int/ITU- D/cyb/cybersecurity/legislation.html Books: “A to Z of cybercrime” By Aaushi Shah & Srinidhi Ravi. :The hacker’s Underground Handbook” By David Melnichuk.