SlideShare a Scribd company logo
1 of 35
BSCS
Dawood Faheem Abbasi (05)
Umar Ali (36)
Zohaib Maqbool (51)
•GROUP 01
Crimes are not to be measured by the issue of events,
but by the bad intensions of men.
The greatest crime do not arise from a want of feeling
for others but from an over sensibility for ourselves
and an over indulgence in our own desire.
CYBER CRIME
Content list
 Introduction
 History
 Evolution
 Percentage of cyber crimes
 Categories
 Types
 Cyber criminals
 Cyber threats
 Cyber security
 Safety
 Cyber laws in Pakistan
CYBER CRIME
 Crimes committed using a computer.
 Illegal activity committed on the internet.
DEFINING
•Unlawful act wherein computer is either a tool or a target
or both.
•Acts that are punishable by the information technology
act.
HISTORY
First recorded in 1820
In 1820 Joseph-Marie Jacquard, a textile manufacturer
in France produced the loom.
evolution
• 1977 viruses
• 1995 breaking websites
CYBER CRIMES PERCENTAGE
Financial fraud. 11%
Sabotage of data 17%
Information theft 20%
System penetration from outside 25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet privileges 79%
Viruses 85%
CATEGORIES
•Two:
•Computer as a tool.
•Computer as a target.
TYPES
•Financial crimes
•Sale of illegal articles
•Online gambling
•Email spoofing
•Forgery
•Cyber stalking
•Denial of service attacks
•Information theft
•Email bombing
•Vendalism
•Malware
•Software piracy
•Password cracking
•Viruses
•Physically damaging a system
CRIMINALS
•Kids
•Organized hacktivists
•Disgruntled employees
•Professional hackers
CYBERTHREATS
• Cyber Extortion:
Where criminal gangs threat to close down internet based
business if protection money was not paid.
• InformationTheft:
When a computer is infiltrated with purpose of obtaining
information relating user.
• Fraud:
Fraud has many guises on internet, from famous e-mails
promising millions in advance fees to sale of quality goods.
CYBER THREATS
•Phishing :
Obtaining of financial information from victim such as a bank
record or credit card details by sending what look like
authentic messages.
•Vishing:
It is also the obtaining financial information but through voice
messages telling the victim to comply immediately.
CYBER THREATS IN PAKISTAN
According to report of “The Express Tribune”.
• Cyber Stalking:
The repeated use of electronic communication to frighten someone for example
sending threatening e-mails.
• Forgery(Fraud):
The process of making or creating an alteration of genuine documents with the intent
to defraud.
• Internet Time Theft:
The use by an unauthorized person of the internet hours paid by another person.
• Logic Bomb:
A piece of code intentionally inserted into a program that will set off malicious
function when specified conditions are met.
Cyber Threats in Pakistan
• Piracy:
Illegal use or reproduction or distribution of another’s software.
• IdentityTheft :
Identity theft is where cyber criminal steals their victim’s identity and then
transacts usually via internet in name of victim.
• Cyber security
INTRODUCTION
•The term cyber security is used to refer to the security offered
through online service to protect your online information.
•Security problems almost always stem from a mix of technical,
human and organizational causes.
WHATTO UNDERSTAND???
 What is the meaning of word “cyber”?
 Why there is need of cyber security?
 What are the security problems in
cyber field?
 How to implement and maintain security of
a cyber field around us?
CYBER
•Combining form relating to information technology, the
internet and virtual reality.
NEED
•It is necessary since it helps in security data from thefts
such as theft or misuse, it also safeguards from viruses.
PROBLEMS
Viruses
Hackers
Malware
Password cracking
ADVENTAGES
I. Defend from critical attacks
II.Help in browse safe websites
III.Defend from hacks and viruses
IV.It processes all the incoming and outgoing data on
computer
OBJECTIVE OF CYBER SECURITY
•To establish rules and measures to use against attacks
over the internet
CYBER CRIME LAW IN PAKISTAN
•Unfortunately Pakistan is one of the few countries where
cyber crime laws are still in the pipeline waiting for
implementation.
National Response Center for Cyber Crime
(NR3C)
•Cyber crime in Pakistan is growing rapidly with the
exponential growth in usage of mobile phones and
penetration of internet. It is also observed that criminals
are using latest technology to execute their crimes.
These criminals are involved in financial matters,
information stealing and at times even in terrorism.To
counter their activities National Response Center for
Cyber Crime (NR3C) was formed which is able to monitor,
track and catch all such criminals.
PECO(Prevention of Electronic Crimes Ordinance)
•On December 31, 2007, the then president Pervez
Musharraf promulgated a law called The Prevention of
Electronic Crimes Ordinance (PECO) 2007 which lapsed
in 2010.The new PECO 2012 is still under debate in the
NationalAssembly and is being tweaked / redrafted by
the Standing Committee.
•The complaint of fake Facebook profiles is the most
rampant complaint where people created fake a profile
of any person.
•Use antivirus software
•Insert firewalls
•Uninstall unnecessary software
•Maintain backup
•Check security settings
•Never give your full name or address to strangers
•Learn more about privacy
CONCLUSION
•Its need of time to spread awareness of cyber security.
•I hope that our presentation will be helpful for our
audience to improve their knowledge about cyber
security and to overcome several security issues on their
computer operations.

More Related Content

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber crime.pptx

Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxeasy web solution
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 

Similar to Cyber crime.pptx (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 

More from Dawood Faheem Abbasi (11)

First and follow set
First and follow setFirst and follow set
First and follow set
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Report writing
Report writingReport writing
Report writing
 
UML constructs
UML constructs UML constructs
UML constructs
 
Mathematical induction and divisibility rules
Mathematical induction and divisibility rulesMathematical induction and divisibility rules
Mathematical induction and divisibility rules
 
Hashing
HashingHashing
Hashing
 
Features of-RC-quad-copter
Features of-RC-quad-copter Features of-RC-quad-copter
Features of-RC-quad-copter
 
7 cs of communication
7 cs of communication7 cs of communication
7 cs of communication
 
Geography of pakistan
Geography of pakistanGeography of pakistan
Geography of pakistan
 
FET (Field Effect Transistors)
FET (Field Effect Transistors)FET (Field Effect Transistors)
FET (Field Effect Transistors)
 
BJT’s (bipolar junction transistor)
BJT’s (bipolar junction transistor)BJT’s (bipolar junction transistor)
BJT’s (bipolar junction transistor)
 

Recently uploaded

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Cyber crime.pptx

  • 1.
  • 2.
  • 3. BSCS Dawood Faheem Abbasi (05) Umar Ali (36) Zohaib Maqbool (51) •GROUP 01
  • 4. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desire.
  • 6. Content list  Introduction  History  Evolution  Percentage of cyber crimes  Categories  Types  Cyber criminals  Cyber threats  Cyber security  Safety  Cyber laws in Pakistan
  • 7. CYBER CRIME  Crimes committed using a computer.  Illegal activity committed on the internet.
  • 8. DEFINING •Unlawful act wherein computer is either a tool or a target or both. •Acts that are punishable by the information technology act.
  • 9. HISTORY First recorded in 1820 In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.
  • 10. evolution • 1977 viruses • 1995 breaking websites
  • 11. CYBER CRIMES PERCENTAGE Financial fraud. 11% Sabotage of data 17% Information theft 20% System penetration from outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 12. CATEGORIES •Two: •Computer as a tool. •Computer as a target.
  • 13. TYPES •Financial crimes •Sale of illegal articles •Online gambling •Email spoofing •Forgery •Cyber stalking •Denial of service attacks
  • 14. •Information theft •Email bombing •Vendalism •Malware •Software piracy •Password cracking •Viruses •Physically damaging a system
  • 16. CYBERTHREATS • Cyber Extortion: Where criminal gangs threat to close down internet based business if protection money was not paid. • InformationTheft: When a computer is infiltrated with purpose of obtaining information relating user. • Fraud: Fraud has many guises on internet, from famous e-mails promising millions in advance fees to sale of quality goods.
  • 17. CYBER THREATS •Phishing : Obtaining of financial information from victim such as a bank record or credit card details by sending what look like authentic messages. •Vishing: It is also the obtaining financial information but through voice messages telling the victim to comply immediately.
  • 18. CYBER THREATS IN PAKISTAN According to report of “The Express Tribune”. • Cyber Stalking: The repeated use of electronic communication to frighten someone for example sending threatening e-mails. • Forgery(Fraud): The process of making or creating an alteration of genuine documents with the intent to defraud. • Internet Time Theft: The use by an unauthorized person of the internet hours paid by another person. • Logic Bomb: A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.
  • 19. Cyber Threats in Pakistan • Piracy: Illegal use or reproduction or distribution of another’s software. • IdentityTheft : Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.
  • 21. INTRODUCTION •The term cyber security is used to refer to the security offered through online service to protect your online information. •Security problems almost always stem from a mix of technical, human and organizational causes.
  • 22. WHATTO UNDERSTAND???  What is the meaning of word “cyber”?  Why there is need of cyber security?  What are the security problems in cyber field?  How to implement and maintain security of a cyber field around us?
  • 23. CYBER •Combining form relating to information technology, the internet and virtual reality.
  • 24. NEED •It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.
  • 26. ADVENTAGES I. Defend from critical attacks II.Help in browse safe websites III.Defend from hacks and viruses IV.It processes all the incoming and outgoing data on computer
  • 27. OBJECTIVE OF CYBER SECURITY •To establish rules and measures to use against attacks over the internet
  • 28. CYBER CRIME LAW IN PAKISTAN
  • 29. •Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.
  • 30. National Response Center for Cyber Crime (NR3C) •Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism.To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.
  • 31. PECO(Prevention of Electronic Crimes Ordinance) •On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in 2010.The new PECO 2012 is still under debate in the NationalAssembly and is being tweaked / redrafted by the Standing Committee. •The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.
  • 32.
  • 33. •Use antivirus software •Insert firewalls •Uninstall unnecessary software •Maintain backup •Check security settings •Never give your full name or address to strangers •Learn more about privacy
  • 34.
  • 35. CONCLUSION •Its need of time to spread awareness of cyber security. •I hope that our presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.