The document provides an overview of cybercrime, including its history, types, and how to protect against it. It discusses how the internet has led to new opportunities but also new crimes like identity theft. Various types of cybercrime are outlined such as hacking, phishing, and cyberbullying. The document also discusses cybercrime in Nepal and provides safety tips like using antivirus software and strong passwords. It emphasizes that awareness is key to avoiding becoming a victim of cybercrime.
This document discusses cybercrime, including its history, types, causes, categories, and impact on national security. It begins by defining cybercrime as criminal activities carried out through computers or the internet. Some key types discussed are hacking, theft, cyber stalking, and identity theft. The document also outlines categories of cybercrime against individuals, property, and governments. It notes that cybercrime is a growing threat in India and discusses some case studies and laws related to cybercrime in the country. In conclusion, it stresses the importance of educating students about cybercrime and taking precautions online.
This document discusses cyber crime and security. It defines cyber crime as illegal activity committed on the internet. It then covers various topics related to cyber crime such as definitions, history, categories and types of cyber crimes including hacking, denial of service attacks and computer vandalism. The document also discusses cyber security and provides safety tips to prevent cyber crime such as using antivirus software and firewalls. It notes that technology alone is not destructive and depends on how people use it.
This presentation introduces cyber crime and security. It begins with the presenter's name and class. The introduction explains that while the internet provides opportunities, it also enables illegal activity like cyber crime. The document then defines cyber crime as illegal activities using computers and the internet. It provides a brief history of early cyber crimes like spam emails and viruses. It categorizes cyber crimes as those targeting computers or using computers as weapons. The document outlines common cyber crimes like hacking and identity theft. It shares statistics on reported cyber crime cases in India and concludes with safety tips to prevent cyber crime.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cyber crimes are unlawful acts where computers or the internet are used as tools or targets. Some key points covered in the document include:
- Cyber crimes have increased as internet usage has grown and include hacking, identity theft, and harassment.
- Cyber crimes are categorized as those against persons, property, or government. Crimes against persons include harassment while crimes against property include computer vandalism.
- Common cyber crimes also discussed include viruses, malware, and data theft. The document provides examples of different types of hacking and cyber criminals like organized hackers and disgruntled employees.
- Prevention methods to protect against cyber crimes are discussed like using firewalls, antivirus software, and disabling unauthorized access
This document discusses information system security and computer-related issues. It covers topics like computer waste, crime, privacy and ethical issues. Specific types of computer waste and mistakes are examined, along with policies and procedures to prevent them. Computer crime is explored, including the computer as a tool for crime and as an object of crime. Issues like identity theft, cyberterrorism, and vulnerabilities are summarized. Internal threats from employees are also mentioned.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to combat cyber crime in India.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to address cyber crime challenges in India.
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. AND Money laundering is the process of creating the appearance that large amounts of money obtained
Cyber crime involves using computers or networks to commit crimes like identity theft, hacking, or spreading viruses. The document discusses definitions of cyber crimes according to Nepali law and examples like hacking, child pornography, and phishing. It provides tips for internet security including using antivirus software, firewalls, and being cautious of emails or websites from unknown sources. Nepal has laws and organizations in place to address cyber crimes and improve cyber security in the country.
The document discusses cyber crime, defining it as criminal activity involving unlawful access to computer systems. It outlines the major types of cyber crimes such as hacking, credit card fraud, and virus dissemination. The history of cyber crime is explored, noting the first documented cases from the 1970s. The relationship between cyber crime and information security is also examined, defining information security as protecting systems from unauthorized use, modification, exploitation, or theft.
This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
This document discusses cybercrime, including what it is, why we should be aware of it, and how to protect ourselves. It defines cybercrime as illegal activities involving computers and networks, such as hacking, viruses, and identity theft. The document outlines different types of cybercrimes and their impacts, describing how financial losses from data breaches are rising. It also discusses Indian laws related to cybercrime and provides tips for security measures like using strong, unique passwords and updating software. The document concludes by emphasizing the importance of awareness in protecting oneself from cybercrime.
Cyber crimes are illegal activities committed using computers and the internet. The document discusses the history and evolution of cyber threats. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Several types of cyber crimes are explained in detail, including hacking, child pornography, denial of service attacks, and software piracy. Prevention tips like using antivirus software and firewalls are provided.
This document discusses cyber crime. It defines cyber crime as any illegal criminal activity that uses a computer as a tool, target, or means of perpetrating crime. Cyber crimes can range from security breaches and identity theft to cyber stalking and child exploitation. The document outlines several types of cyber crimes such as hacking, email spoofing, computer vandalism, and cyber terrorism. It also discusses reasons for cyber crimes and how to avoid becoming a victim.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
Presentation about Cyber crime like what is cyber crime?,What are the types of cyber crime?,How to solve cyber crime etc.
If you like my work then please like the ppt and comment your review.
Thank You.
This document discusses effective techniques and approaches for ensuring cyber security. It begins with an introduction to cyber crime and defines it as illegal activity committed on the internet where computers are used as objects or subjects of criminal acts. The document then covers the history of cyber crime, categories and types of cyber attacks, cyber laws, and safety techniques. It concludes by stating that while complete security is impossible, people can act smart by paying attention, using antivirus software, firewalls, and other precautions when online.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
油
The document outlines a training agenda for a cyber security conference held in August 2015. Day 1 covers topics like cyber crimes, the current situation in Indonesia and globally, and identifying threats and vulnerabilities. Day 2 focuses on information security strategies across organizations and envisioning the future state. Several sessions explore defining cyber crimes, common attack types like viruses and denial of service, and who carries out cyber crimes. The document also discusses trends like the growing cyber crime marketplace, risks to mobile devices, larger attacks on retailers and banks, and more advanced targeted threats.
The document provides an overview of cyber crime including its history, evolution, categories, and common types. It discusses how cyber criminals have become more organized over time, moving from basic malware in the 1990s to sophisticated ransomware and banking malware today. The document also outlines three categories of cyber crimes: against persons, property, and government. It gives examples of specific cyber crimes like hacking, denial of service attacks, software piracy, and cyber terrorism. In conclusion, it notes that cyber crime continues to evolve as criminals work to stay ahead of law enforcement.
GenAI for Trading and Asset Management by Ernest ChanQuantInsti
油
Presentation from the power-packed webinar on AI-driven trading and automation, bringing together leading experts and a community of over 6000 traders, analysts, developers, and students.
Participants got the chance to interact live with experts, ask questions, and gain practical, actionable skills in automated tradingmaking this webinar a useful resource for anyone serious about the future of trading technology.
In Session 1, renowned quant expert Dr. Ernest Chan explores the evolving role of Generative AI in finance, diving into advanced trading strategies that go beyond traditional language models (LLMs).
About the author:
Dr. Ernest P. Chan is a recognized expert in applying statistical models and machine learning to finance. He is the Founder and Chief Scientist at PredictNow.ai, where he helps investors make informed decisions using advanced data-driven insights. Additionally, he is the Founder and Non-executive Chairman of QTS Capital Management, LLC, which focuses on systematic trading strategies. Dr. Chan has worked at notable organizations like IBM Research, Morgan Stanley, and Credit Suisse, gaining experience in pattern recognition, data mining, and quantitative trading.
Dr. Chan obtained his PhD in Physics from Cornell University and his B.Sc. in Physics from the University of Toronto. He has also authored several influential books, including Quantitative Trading and Algorithmic Trading. He was an Adjunct Associate Professor of Finance at Nanyang Technological University in Singapore and an adjunct faculty at Northwestern Universitys Masters in Data Science program.
Dr. Chan combines extensive industry experience with deep technical knowledge, making him an excellent resource for understanding how to apply machine learning to trading effectively.
This webinar was conducted on: Thursday, April 10, 2025
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to combat cyber crime in India.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to address cyber crime challenges in India.
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. AND Money laundering is the process of creating the appearance that large amounts of money obtained
Cyber crime involves using computers or networks to commit crimes like identity theft, hacking, or spreading viruses. The document discusses definitions of cyber crimes according to Nepali law and examples like hacking, child pornography, and phishing. It provides tips for internet security including using antivirus software, firewalls, and being cautious of emails or websites from unknown sources. Nepal has laws and organizations in place to address cyber crimes and improve cyber security in the country.
The document discusses cyber crime, defining it as criminal activity involving unlawful access to computer systems. It outlines the major types of cyber crimes such as hacking, credit card fraud, and virus dissemination. The history of cyber crime is explored, noting the first documented cases from the 1970s. The relationship between cyber crime and information security is also examined, defining information security as protecting systems from unauthorized use, modification, exploitation, or theft.
This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
This document discusses cybercrime, including what it is, why we should be aware of it, and how to protect ourselves. It defines cybercrime as illegal activities involving computers and networks, such as hacking, viruses, and identity theft. The document outlines different types of cybercrimes and their impacts, describing how financial losses from data breaches are rising. It also discusses Indian laws related to cybercrime and provides tips for security measures like using strong, unique passwords and updating software. The document concludes by emphasizing the importance of awareness in protecting oneself from cybercrime.
Cyber crimes are illegal activities committed using computers and the internet. The document discusses the history and evolution of cyber threats. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Several types of cyber crimes are explained in detail, including hacking, child pornography, denial of service attacks, and software piracy. Prevention tips like using antivirus software and firewalls are provided.
This document discusses cyber crime. It defines cyber crime as any illegal criminal activity that uses a computer as a tool, target, or means of perpetrating crime. Cyber crimes can range from security breaches and identity theft to cyber stalking and child exploitation. The document outlines several types of cyber crimes such as hacking, email spoofing, computer vandalism, and cyber terrorism. It also discusses reasons for cyber crimes and how to avoid becoming a victim.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
Presentation about Cyber crime like what is cyber crime?,What are the types of cyber crime?,How to solve cyber crime etc.
If you like my work then please like the ppt and comment your review.
Thank You.
This document discusses effective techniques and approaches for ensuring cyber security. It begins with an introduction to cyber crime and defines it as illegal activity committed on the internet where computers are used as objects or subjects of criminal acts. The document then covers the history of cyber crime, categories and types of cyber attacks, cyber laws, and safety techniques. It concludes by stating that while complete security is impossible, people can act smart by paying attention, using antivirus software, firewalls, and other precautions when online.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
油
The document outlines a training agenda for a cyber security conference held in August 2015. Day 1 covers topics like cyber crimes, the current situation in Indonesia and globally, and identifying threats and vulnerabilities. Day 2 focuses on information security strategies across organizations and envisioning the future state. Several sessions explore defining cyber crimes, common attack types like viruses and denial of service, and who carries out cyber crimes. The document also discusses trends like the growing cyber crime marketplace, risks to mobile devices, larger attacks on retailers and banks, and more advanced targeted threats.
The document provides an overview of cyber crime including its history, evolution, categories, and common types. It discusses how cyber criminals have become more organized over time, moving from basic malware in the 1990s to sophisticated ransomware and banking malware today. The document also outlines three categories of cyber crimes: against persons, property, and government. It gives examples of specific cyber crimes like hacking, denial of service attacks, software piracy, and cyber terrorism. In conclusion, it notes that cyber crime continues to evolve as criminals work to stay ahead of law enforcement.
GenAI for Trading and Asset Management by Ernest ChanQuantInsti
油
Presentation from the power-packed webinar on AI-driven trading and automation, bringing together leading experts and a community of over 6000 traders, analysts, developers, and students.
Participants got the chance to interact live with experts, ask questions, and gain practical, actionable skills in automated tradingmaking this webinar a useful resource for anyone serious about the future of trading technology.
In Session 1, renowned quant expert Dr. Ernest Chan explores the evolving role of Generative AI in finance, diving into advanced trading strategies that go beyond traditional language models (LLMs).
About the author:
Dr. Ernest P. Chan is a recognized expert in applying statistical models and machine learning to finance. He is the Founder and Chief Scientist at PredictNow.ai, where he helps investors make informed decisions using advanced data-driven insights. Additionally, he is the Founder and Non-executive Chairman of QTS Capital Management, LLC, which focuses on systematic trading strategies. Dr. Chan has worked at notable organizations like IBM Research, Morgan Stanley, and Credit Suisse, gaining experience in pattern recognition, data mining, and quantitative trading.
Dr. Chan obtained his PhD in Physics from Cornell University and his B.Sc. in Physics from the University of Toronto. He has also authored several influential books, including Quantitative Trading and Algorithmic Trading. He was an Adjunct Associate Professor of Finance at Nanyang Technological University in Singapore and an adjunct faculty at Northwestern Universitys Masters in Data Science program.
Dr. Chan combines extensive industry experience with deep technical knowledge, making him an excellent resource for understanding how to apply machine learning to trading effectively.
This webinar was conducted on: Thursday, April 10, 2025
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMCjaspervedamvemavarap
油
Action of muscles-Anatomy
Contraction and relaxation
Muscle tone
Length and tension relationship
Types of muscle contraction
Active and passive insufficiency
Shunt and sprunt muscles
Agonists
Antagonists
Fixators
Synergists
Purchase Analysis in Odoo 17 - Odoo 際際滷sCeline George
油
Purchase is one of the important things as a part of a business. It is essential to analyse everything that is happening inside the purchase and keep tracking. In Odoo 17, the reporting section is inside the purchase module, which is purchase analysis.
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...Prabhakar Singh Patel
油
1. Urine analysis provides important information about renal and metabolic function through physical, chemical, and microscopic examination of urine samples.
2. Proper collection, preservation and timely testing of urine samples is necessary to obtain accurate results and detect abnormalities that can indicate underlying diseases.
3.
The Quiz club of PSGCAS brings you another fun-filled trivia ride. Presenting you a Business quiz with 20 sharp questions to feed your intellectual stimulus. So, sharpen your business mind for this quiz set
Quizmaster: Thanvanth N A, BA Economics, The Quiz Club of PSG College of Arts & Science (2023-26 batch)
Proteins, Bio similars & Antibodies.pptxAshish Umale
油
The slides describe about the protein along with biosimilar data, which is helpful for the study respect to the subject. antibody is known to be active against antigen to show its action in treatment of various disease condition.
These slides gives you the information regarding the topic of protein, biosimilars and details about antibody in response to the antigen along with targeted drug to the antigen. As this topic data is useful for the students of sem VI who are studying in Bachelor of Pharmacy with respect to the subject Pharmacology III.
The topic and research question forms the foundation of the entire systematic review.
A poorly defined topic/question leads to:
Unfocused search strategy
Irrelevant studies
Weak synthesis and conclusions
How to manage Customer Tips with Odoo 17 Point Of SaleCeline George
油
In the context of point-of-sale (POS) systems, a tip refers to the optional amount of money a customer leaves for the service they received. It's a way to show appreciation to the cashier, server, or whoever provided the service.
How to Invoice Shipping Cost to Customer in Odoo 17Celine George
油
Odoo allows the invoicing of the shipping costs after delivery and this ensures that the charges are accurate based on the real time factors like weight, distance and chosen shipping method.
How to Invoice Shipping Cost to Customer in Odoo 17Celine George
油
Cybercrime and security.pptx
1. C Y B E R C R I M E A N D
S E C U R I T Y
B Y
S O B I A S A E E D , AT I Q A &
Z A R A
2. TA B L E O F
C O N T E N T S
Introduction
History of Cybercrime
Categories of Cybercrime
Types of Cybercrime
Cyberthreats to National Security
Cyber security
Advantages of Cyber security
Safety measures against Cybercrime
Cyber Laws in Pakistan
NCCS
Conclusion
Tools used in presentation
References
3. I N T R O D U C T I O N
Cybercrime is any criminal activity that involves
a computer, networked device or a network.
Any unlawful act carried out by using internet is
called a cybercrime.
4. H I S T O R Y O F C Y B E R C R I M E
The first cybercrime was reported in 1820.
In 1834, French robbers hacked French Telegraph system and stole the information.
In 1969, the first ever virus in computer history attacked on the University Washington
Data Center and replicated the files before the machine overload. This virus was called
Rabbit Virus.
From 1970-1975 Kevin-Mitnick penetrates some of the highest-guarded networks in the
world, including Nokia and Motorola and breech the internal operating system of devices.
In 1973, A local New York bank teller uses a machine to steal more than $2 million.
5. H I S T O R Y O F C Y B E R C R I M E
In1982, The CIA blows up a Siberian gas pipeline by injecting logic bomb into the
network and the operating system to monitor the gas pipeline without using a bomb or a
missile.
In 1988, Morris Worm was released on a computer of MIT.
In 1999, Melissa virus infects Microsoft Word records, transmitting itself via email as an
attachment automatically. It mails out to the first 50 names mentioned in the Outlook
email address box of an infected device.
In 2013-2015, Global Bank Hack more than 100 organizations around the world have
access to secure information from a community of Russian-based hackers.
7. C R I M E A G A I N S T P E O P L E
These crimes include cyber harassment and stalking, distribution
of child pornography, credit card fraud, human trafficking,
spoofing, identity theft, and online libel or slander.
8. C R I M E S A G A I N S T P R O P E R T Y
Some online crimes occur against property, such as a computer or server.
These crimes include DDOS attacks, hacking, virus transmission, cyber and
typo squatting, computer vandalism, copyright infringement, and IPR
violations.
9. When a cybercrime is committed against the government, it is
considered an attack on that nation's sovereignty. Cybercrimes
against the government include hacking, accessing confidential
information, cyber warfare, cyber terrorism, and pirated software.
C R I M E S A G A I N S T P R O P E R T Y
11. H A C K I N G
Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks.
And while hacking might not always be for malicious purposes.
Hacking is unlawful activity by cybercriminals, motivated by financial gain, protest,
information gathering (spying), and even just for the fun of the challenge.
Person who does hacking is called a hacker.
12. C H I L D P O R N O G R A P H Y
The Internet is highly used by its abuser to abuse child sexually worldwide.
More Homes have access to Internet, more children would be using Internet and more of
the chances of falling victim to the aggression of pedophiles.
Pedophiles uses the false identity to trap the children. Pedophiles connect children in the
various chat rooms which are used by children to connect other children.
13. D E N I A L O F S E R V I C E AT TA C K
A Denial-of-Service (DoS) attack is an attack meant to shut
down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the
target with traffic or sending it information that triggers a crash.
14. V I R U S D I S S E M I N AT I O N
Malicious software that attaches itself through the other
softwares.
Virus, worms, Trojan horse, web jacking, e-mail spoofing and
logic bomb etc. Adderall malicious program that are harmful for
our computer systems.
15. C O M P U T E R VA N D A L I S M
Damaging and destroying data rather than stealing are
misusing them is called cyber vandalism.
These are the programs that attach themselves to a file that
circulate.
16. C Y B E R T E R R O R I S M
Terrorist attack on the computer network is by distributed denial
of service attacks, hate websites and hate emails and attack on
service networks etc.
17. S O F T WA R E P I R A C Y
Theft of software by legal copying of genuine programs or
counterfeiting and distribution of products intended to pass for
original.
18. C Y B E R T H R E AT S T O N AT I O N A L
S E C U R I T Y
Cyber crime is increasing in Pakistan tremendously from last two decades.
Pakistan is one of the amongst most higher Internet user in the world .
Terrorists are using websites to raise fund for their terrorist activities.
Some of the NGO's are also using Internet to raise the funds for the terrorists and
criminal groups in the name of poor people and orphan child.
Harassment by using social media is increasing day by day and causes unrecoverable
damage to society.
The policies are not implemented practically.
20. C Y B E R S E C U R I T Y
Cyber security involves the protection of secret data and
business information through prevention, detection and
response to different online attacks. Cyber security is
preventing the attacks from the cyber criminals.
21. P R I VA C Y P O L I C Y
Before submitting your name, e-mail and other personal data to the website read this
privacy policy.
Some of the websites sell your data to the different vendors that can be used for illegal
purpose.
Always keep your privacy settings strict in different websites or apps like Facebook,
YouTube, Instagram and WhatsApp etc.
22. K E E P T H E S O F T WA R E U P D AT E
Always use the updated software in your computer system and don't use pirated
software or try to crack password of softwares by using crackers.
Always keep your antivirus software updated and use its latest version.
Use good passwords that are difficult to guess.
Don't use your names, date of birth and personal number as your passwords.
Always used licensed softwares.
23. D I S A B L E R E M O T E C O N N E C T I V I T Y
Don't use public network like public Wi-Fi provided by the governments at public places.
These are highly used by hackers to steal the data through attacking these public
networks.
You should disable the features that are not in use.
24. A D VA N TA G E S O F C Y B E R
S E C U R I T Y
Cyber security prevent us from the cyber attack.
Internet security processing all the incoming and outcoming data.
It helps us to select the websites that are secure or not secure for us.
It prevents us from the hacks and viruses.
Applications for cyber security in our computer system should be up to date.
25. S A F E T Y M E A S U R E S A G A I N S T
C Y B E R C R I M E
Use antivirus software.
Insert firewalls
Uninstall unnecessary softwares
Maintain backup
Check security settings
Always note any change in your computer system
Don't install softwares from a known websites
26. C Y B E R L AW S I N PA K I S TA N
On February 18, 2022, the government passed an ordinance amending the Pakistan
Electronic Crimes Act, 2016 (PECA) to make online defamation of authorities, including
the military and judiciary, a criminal offense with harsh penalties.
They are very insufficient cyber laws in Pakistan. And the laws that are passed are not
implemented practically.
Due to the weak legislation the cyber crimes are increasing day by day.
27. N C C S ( N AT I O N A L C E N T E R O F
C Y B E R S E C U R I T Y )
NCCs is the initiative taken by the government to prevent cyber crimes.
But it's offices are only in big cities of Pakistan and is not accessible in most of the areas
of Pakistan.
The method to report the cyber crime in NCCS is online and most of the people R
unaware about it.
The procedure of case registration in NCCS it's just like a FIR in police station, so the
victims are reluctant to report.
All these are the reasons that very few cyber crimes are reported and many of them
remain unsolved.
28. C O N C L U S I O N
It is very difficult to restrict the cyber crimes.
Government should take the measures two aware the people about the cyber security.
There should be strict legislation to stop the cyber crimes.
The method of reporting cyber crime should be easy, and the investigation agencies and
media should keep the face a victim secret.
Pakistan is among us the countries well highly watch pornography. People should stop to
access these websites to avoid cyber stalking and Bullying.
There should be a body do keep check on all the data traffic and content that is uploaded on
different website and watched in Pakistan.
There should be a content filtering body should filter the data that can be watched in our
country.
29. R E F E R E N C E S
/aemankhan/cybercrimeppt-27376284
https://www.jigsawacademy.com/blogs/cyber-security/history-of-cybercrime/
https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940-
2020/
https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm
https://www.malwarebytes.com/hacker
https://www.techtarget.com/searchsecurity/definition/denial-of-service
https://www.nccs.pk/
NATIONAL CYBER SECURITY POLICY 2021
30. T O O L S U S E D F O R P R E S E N TAT I O N
Microsoft PowerPoint
NATIONAL CYBER SECURITY POLICY 2021 document.
Research papers
Different websites as per reference given in above slide.