SlideShare une entreprise Scribd logo
1  sur  21
CYBER CRIME
Prepared by:

Ahtasham Ali
CONTENT:
 What is CYBERCRIME?
 Forms of Cybercrime
 Report about cybercrime
 Implications of Cybercrime
 Conclusion
WHAT IS CYBERCRIME ?
Cybercrime is defined as:

Criminal activity done using computer and
internet. this include anything from downloading
illegal files to stealing millions of dollars from
online banking account.
BACK GROUND HISTORY
 1988 first national bank of Chicago is the victim of $70
million dollars.
 1987 computer emergency response team created.
 Therefore there are many crimes which are done through
internet…
FORMS OF CYBERCRIME

Piracy – copying protected software without
authorisation
FORMS OF CYBERCRIME

Cracking – accessing computer systems

without authority to commit a crime.
HACKER
Hacker are the programmer they should have
the knowledge of advance technology of operating

system and program languages.
FORMS OF CYBERCRIME
Phreaking – manipulating a phone system

using a computer or other device to obtain free
telephone calls or charge calls to another account
FORMS OF CYBERCRIME
Cyber stalking. The criminal follows the victim

by sending emails, entering the chat rooms
frequently.
FORMS OF CYBERCRIME
Cyber terrorism – is the use of internet based
attacks in terrorist activities.
FORMS OF CYBERCRIME
Cyber pornography – producing and/or
distributing pornography using a computer
FORMS OF CYBERCRIME
FINANCIAL CRIMES
Includes credit card frauds, money laundering, forgery e.t.c

MONEY LAUNDERING
Is the process by which large amount of illegally obtain money is
given the appearance of having originated form a legimate source
EMAIL BOMBING
 Refers to sending a large number of emails to victims resulting
in the victims email account crashing.
 It is a type of Denial-of-service attacks.
H OW T O R E P O RT A B O U T
CYBER CRIME
I M P L I C AT I O N S O F
C Y B E RC R I M E
In 2008, security vendor AVG conducted a survey
into global cybercrime and found that Australia has

the highest incidence of cyber crime in the world
with more than 39 per cent of Australian’s having
been the victim of cyber crime
I M P L I C AT I O N S O F
C Y B E RC R I M E

A recent report by the Australian Institute of

Criminology found that cybercrime is costing
Australian businesses more than $600 million
annually
CONCLUSION
Cyber crime refers to illegal activities that take place
online, including fraud, identity theft, computer viruses
and worms, cyber stalking, drug trafficking and the like.

Most people become victims of these at one time or
another.
REFERENCE LIST:
 http://poahttp://www.fbi.gov/wanted/cyber
 http://propakistani.pk/2011/01/10/a-country-without-cyber-lawpakistan/

 http://www.pakistanlaw.net/law-articles/important-aspects-cybercrime-law-pakistan/
 http://www.nr3c.gov.pk/contact.html
Cyber crime(presentation) by Ahtasham Ali

Contenu connexe

Tendances

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Tendances (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 

En vedette (10)

81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à Cyber crime(presentation) by Ahtasham Ali

Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
Ahmed Sleem
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 

Similaire à Cyber crime(presentation) by Ahtasham Ali (20)

Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
File000146
File000146File000146
File000146
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
English in written
English in writtenEnglish in written
English in written
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 

Dernier

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Cyber crime(presentation) by Ahtasham Ali

  • 2. CONTENT:  What is CYBERCRIME?  Forms of Cybercrime  Report about cybercrime  Implications of Cybercrime  Conclusion
  • 3. WHAT IS CYBERCRIME ? Cybercrime is defined as: Criminal activity done using computer and internet. this include anything from downloading illegal files to stealing millions of dollars from online banking account.
  • 4. BACK GROUND HISTORY  1988 first national bank of Chicago is the victim of $70 million dollars.  1987 computer emergency response team created.
  • 5.  Therefore there are many crimes which are done through internet…
  • 6. FORMS OF CYBERCRIME Piracy – copying protected software without authorisation
  • 7. FORMS OF CYBERCRIME Cracking – accessing computer systems without authority to commit a crime.
  • 8. HACKER Hacker are the programmer they should have the knowledge of advance technology of operating system and program languages.
  • 9. FORMS OF CYBERCRIME Phreaking – manipulating a phone system using a computer or other device to obtain free telephone calls or charge calls to another account
  • 10. FORMS OF CYBERCRIME Cyber stalking. The criminal follows the victim by sending emails, entering the chat rooms frequently.
  • 11. FORMS OF CYBERCRIME Cyber terrorism – is the use of internet based attacks in terrorist activities.
  • 12. FORMS OF CYBERCRIME Cyber pornography – producing and/or distributing pornography using a computer
  • 13. FORMS OF CYBERCRIME FINANCIAL CRIMES Includes credit card frauds, money laundering, forgery e.t.c MONEY LAUNDERING Is the process by which large amount of illegally obtain money is given the appearance of having originated form a legimate source
  • 14. EMAIL BOMBING  Refers to sending a large number of emails to victims resulting in the victims email account crashing.  It is a type of Denial-of-service attacks.
  • 15. H OW T O R E P O RT A B O U T CYBER CRIME
  • 16.
  • 17. I M P L I C AT I O N S O F C Y B E RC R I M E In 2008, security vendor AVG conducted a survey into global cybercrime and found that Australia has the highest incidence of cyber crime in the world with more than 39 per cent of Australian’s having been the victim of cyber crime
  • 18. I M P L I C AT I O N S O F C Y B E RC R I M E A recent report by the Australian Institute of Criminology found that cybercrime is costing Australian businesses more than $600 million annually
  • 19. CONCLUSION Cyber crime refers to illegal activities that take place online, including fraud, identity theft, computer viruses and worms, cyber stalking, drug trafficking and the like. Most people become victims of these at one time or another.
  • 20. REFERENCE LIST:  http://poahttp://www.fbi.gov/wanted/cyber  http://propakistani.pk/2011/01/10/a-country-without-cyber-lawpakistan/  http://www.pakistanlaw.net/law-articles/important-aspects-cybercrime-law-pakistan/  http://www.nr3c.gov.pk/contact.html