際際滷

際際滷Share a Scribd company logo
C Y B E R C R I M E A N D
S E C U R I T Y
B Y
S O B I A S A E E D , AT I Q A &
Z A R A
TA B L E O F
C O N T E N T S
 Introduction
 History of Cybercrime
 Categories of Cybercrime
 Types of Cybercrime
 Cyberthreats to National Security
 Cyber security
 Advantages of Cyber security
 Safety measures against Cybercrime
 Cyber Laws in Pakistan
 NCCS
 Conclusion
 Tools used in presentation
 References
I N T R O D U C T I O N
Cybercrime is any criminal activity that involves
a computer, networked device or a network.
Any unlawful act carried out by using internet is
called a cybercrime.
H I S T O R Y O F C Y B E R C R I M E
 The first cybercrime was reported in 1820.
 In 1834, French robbers hacked French Telegraph system and stole the information.
 In 1969, the first ever virus in computer history attacked on the University Washington
Data Center and replicated the files before the machine overload. This virus was called
Rabbit Virus.
 From 1970-1975 Kevin-Mitnick penetrates some of the highest-guarded networks in the
world, including Nokia and Motorola and breech the internal operating system of devices.
 In 1973, A local New York bank teller uses a machine to steal more than $2 million.
H I S T O R Y O F C Y B E R C R I M E
 In1982, The CIA blows up a Siberian gas pipeline by injecting logic bomb into the
network and the operating system to monitor the gas pipeline without using a bomb or a
missile.
 In 1988, Morris Worm was released on a computer of MIT.
 In 1999, Melissa virus infects Microsoft Word records, transmitting itself via email as an
attachment automatically. It mails out to the first 50 names mentioned in the Outlook
email address box of an infected device.
 In 2013-2015, Global Bank Hack more than 100 organizations around the world have
access to secure information from a community of Russian-based hackers.
C AT E G O R I E S
O F
C Y B E R C R I M E
C R I M E A G A I N S T P E O P L E
These crimes include cyber harassment and stalking, distribution
of child pornography, credit card fraud, human trafficking,
spoofing, identity theft, and online libel or slander.
C R I M E S A G A I N S T P R O P E R T Y
Some online crimes occur against property, such as a computer or server.
These crimes include DDOS attacks, hacking, virus transmission, cyber and
typo squatting, computer vandalism, copyright infringement, and IPR
violations.
When a cybercrime is committed against the government, it is
considered an attack on that nation's sovereignty. Cybercrimes
against the government include hacking, accessing confidential
information, cyber warfare, cyber terrorism, and pirated software.
C R I M E S A G A I N S T P R O P E R T Y
T Y P E S O F
C Y B E R C R I M E
H A C K I N G
 Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks.
 And while hacking might not always be for malicious purposes.
 Hacking is unlawful activity by cybercriminals, motivated by financial gain, protest,
information gathering (spying), and even just for the fun of the challenge.
 Person who does hacking is called a hacker.
C H I L D P O R N O G R A P H Y
 The Internet is highly used by its abuser to abuse child sexually worldwide.
 More Homes have access to Internet, more children would be using Internet and more of
the chances of falling victim to the aggression of pedophiles.
 Pedophiles uses the false identity to trap the children. Pedophiles connect children in the
various chat rooms which are used by children to connect other children.
D E N I A L O F S E R V I C E AT TA C K
 A Denial-of-Service (DoS) attack is an attack meant to shut
down a machine or network, making it inaccessible to its
intended users. DoS attacks accomplish this by flooding the
target with traffic or sending it information that triggers a crash.
V I R U S D I S S E M I N AT I O N
 Malicious software that attaches itself through the other
softwares.
 Virus, worms, Trojan horse, web jacking, e-mail spoofing and
logic bomb etc. Adderall malicious program that are harmful for
our computer systems.
C O M P U T E R VA N D A L I S M
 Damaging and destroying data rather than stealing are
misusing them is called cyber vandalism.
 These are the programs that attach themselves to a file that
circulate.
C Y B E R T E R R O R I S M
 Terrorist attack on the computer network is by distributed denial
of service attacks, hate websites and hate emails and attack on
service networks etc.
S O F T WA R E P I R A C Y
 Theft of software by legal copying of genuine programs or
counterfeiting and distribution of products intended to pass for
original.
C Y B E R T H R E AT S T O N AT I O N A L
S E C U R I T Y
 Cyber crime is increasing in Pakistan tremendously from last two decades.
 Pakistan is one of the amongst most higher Internet user in the world .
 Terrorists are using websites to raise fund for their terrorist activities.
 Some of the NGO's are also using Internet to raise the funds for the terrorists and
criminal groups in the name of poor people and orphan child.
 Harassment by using social media is increasing day by day and causes unrecoverable
damage to society.
 The policies are not implemented practically.
C Y B E R S E C U R I T Y
C Y B E R S E C U R I T Y
 Cyber security involves the protection of secret data and
business information through prevention, detection and
response to different online attacks. Cyber security is
preventing the attacks from the cyber criminals.
P R I VA C Y P O L I C Y
 Before submitting your name, e-mail and other personal data to the website read this
privacy policy.
 Some of the websites sell your data to the different vendors that can be used for illegal
purpose.
 Always keep your privacy settings strict in different websites or apps like Facebook,
YouTube, Instagram and WhatsApp etc.
K E E P T H E S O F T WA R E U P D AT E
 Always use the updated software in your computer system and don't use pirated
software or try to crack password of softwares by using crackers.
 Always keep your antivirus software updated and use its latest version.
 Use good passwords that are difficult to guess.
 Don't use your names, date of birth and personal number as your passwords.
 Always used licensed softwares.
D I S A B L E R E M O T E C O N N E C T I V I T Y
 Don't use public network like public Wi-Fi provided by the governments at public places.
 These are highly used by hackers to steal the data through attacking these public
networks.
 You should disable the features that are not in use.
A D VA N TA G E S O F C Y B E R
S E C U R I T Y
 Cyber security prevent us from the cyber attack.
 Internet security processing all the incoming and outcoming data.
 It helps us to select the websites that are secure or not secure for us.
 It prevents us from the hacks and viruses.
 Applications for cyber security in our computer system should be up to date.
S A F E T Y M E A S U R E S A G A I N S T
C Y B E R C R I M E
 Use antivirus software.
 Insert firewalls
 Uninstall unnecessary softwares
 Maintain backup
 Check security settings
 Always note any change in your computer system
 Don't install softwares from a known websites
C Y B E R L AW S I N PA K I S TA N
 On February 18, 2022, the government passed an ordinance amending the Pakistan
Electronic Crimes Act, 2016 (PECA) to make online defamation of authorities, including
the military and judiciary, a criminal offense with harsh penalties.
 They are very insufficient cyber laws in Pakistan. And the laws that are passed are not
implemented practically.
 Due to the weak legislation the cyber crimes are increasing day by day.
N C C S ( N AT I O N A L C E N T E R O F
C Y B E R S E C U R I T Y )
 NCCs is the initiative taken by the government to prevent cyber crimes.
 But it's offices are only in big cities of Pakistan and is not accessible in most of the areas
of Pakistan.
 The method to report the cyber crime in NCCS is online and most of the people R
unaware about it.
 The procedure of case registration in NCCS it's just like a FIR in police station, so the
victims are reluctant to report.
 All these are the reasons that very few cyber crimes are reported and many of them
remain unsolved.
C O N C L U S I O N
 It is very difficult to restrict the cyber crimes.
 Government should take the measures two aware the people about the cyber security.
 There should be strict legislation to stop the cyber crimes.
 The method of reporting cyber crime should be easy, and the investigation agencies and
media should keep the face a victim secret.
 Pakistan is among us the countries well highly watch pornography. People should stop to
access these websites to avoid cyber stalking and Bullying.
 There should be a body do keep check on all the data traffic and content that is uploaded on
different website and watched in Pakistan.
 There should be a content filtering body should filter the data that can be watched in our
country.
R E F E R E N C E S
 /aemankhan/cybercrimeppt-27376284
 https://www.jigsawacademy.com/blogs/cyber-security/history-of-cybercrime/
 https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940-
2020/
 https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm
 https://www.malwarebytes.com/hacker
 https://www.techtarget.com/searchsecurity/definition/denial-of-service
 https://www.nccs.pk/
 NATIONAL CYBER SECURITY POLICY 2021
T O O L S U S E D F O R P R E S E N TAT I O N
 Microsoft PowerPoint
 NATIONAL CYBER SECURITY POLICY 2021 document.
 Research papers
 Different websites as per reference given in above slide.

More Related Content

Similar to Cybercrime and security.pptx (20)

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
Navjyotsinh Jadeja
Cyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackersCyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackers
3aitestdata
cyber-crimghgirrif8eieifififejwjdjes.pptx
cyber-crimghgirrif8eieifififejwjdjes.pptxcyber-crimghgirrif8eieifififejwjdjes.pptx
cyber-crimghgirrif8eieifififejwjdjes.pptx
aparnakanampalle1
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
Navjyotsinh Jadeja
Cyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackersCyber Security PPT and how to be aware from hackers
Cyber Security PPT and how to be aware from hackers
3aitestdata
cyber-crimghgirrif8eieifififejwjdjes.pptx
cyber-crimghgirrif8eieifififejwjdjes.pptxcyber-crimghgirrif8eieifififejwjdjes.pptx
cyber-crimghgirrif8eieifififejwjdjes.pptx
aparnakanampalle1
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz

Recently uploaded (20)

GenAI for Trading and Asset Management by Ernest Chan
GenAI for Trading and Asset Management by Ernest ChanGenAI for Trading and Asset Management by Ernest Chan
GenAI for Trading and Asset Management by Ernest Chan
QuantInsti
Combinatorial_Chemistry.pptx by Mrs. Manjushri P. Dabhade
Combinatorial_Chemistry.pptx by Mrs. Manjushri P. DabhadeCombinatorial_Chemistry.pptx by Mrs. Manjushri P. Dabhade
Combinatorial_Chemistry.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
Nguyen Thanh Tu Collection
The Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptxThe Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptx
SamarHosni3
BIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptx
BIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptxBIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptx
BIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptx
maniramkumar
Anti-Protozoal Agents.pptx by Mrs. Manjushri P. Dabhade
Anti-Protozoal Agents.pptx by Mrs. Manjushri P. DabhadeAnti-Protozoal Agents.pptx by Mrs. Manjushri P. Dabhade
Anti-Protozoal Agents.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMC
Action of  Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMCAction of  Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMC
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMC
jaspervedamvemavarap
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷sPurchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Celine George
Mixed_Sinhala_Dual_Male_Names (1).pdf...
Mixed_Sinhala_Dual_Male_Names (1).pdf...Mixed_Sinhala_Dual_Male_Names (1).pdf...
Mixed_Sinhala_Dual_Male_Names (1).pdf...
keshanf79
2. ES: Application of Number: Units of measure & conversions
2. ES: Application of Number: Units of measure & conversions2. ES: Application of Number: Units of measure & conversions
2. ES: Application of Number: Units of measure & conversions
leigh441292
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
Prabhakar Singh Patel
BUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptx
BUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptxBUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptx
BUSINESS QUIZ | THE QUIZ CLUB OF PSGCAS | 17TH MARCH 2025 .pptx
Quiz Club of PSG College of Arts & Science
Proteins, Bio similars & Antibodies.pptx
Proteins, Bio similars &  Antibodies.pptxProteins, Bio similars &  Antibodies.pptx
Proteins, Bio similars & Antibodies.pptx
Ashish Umale
IB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdf
IB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdfIB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdf
IB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdf
Dr. Mahtab Alam
Developing Topic and Research Question for Systematic Reviews - Emmanuel Ekpor
Developing Topic and Research Question for Systematic Reviews - Emmanuel EkporDeveloping Topic and Research Question for Systematic Reviews - Emmanuel Ekpor
Developing Topic and Research Question for Systematic Reviews - Emmanuel Ekpor
Systematic Reviews Network (SRN)
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptxO SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
Literature Hero
How to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of SaleHow to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of Sale
Celine George
Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...
Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...
Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...
A Biodiction : A Unit of Dr. Divya Sharma
Using GenAI for Universal Design for Learning
Using GenAI for Universal Design for LearningUsing GenAI for Universal Design for Learning
Using GenAI for Universal Design for Learning
Damian T. Gordon
How to Invoice Shipping Cost to Customer in Odoo 17
How to Invoice Shipping Cost to Customer in Odoo 17How to Invoice Shipping Cost to Customer in Odoo 17
How to Invoice Shipping Cost to Customer in Odoo 17
Celine George
GenAI for Trading and Asset Management by Ernest Chan
GenAI for Trading and Asset Management by Ernest ChanGenAI for Trading and Asset Management by Ernest Chan
GenAI for Trading and Asset Management by Ernest Chan
QuantInsti
Combinatorial_Chemistry.pptx by Mrs. Manjushri P. Dabhade
Combinatorial_Chemistry.pptx by Mrs. Manjushri P. DabhadeCombinatorial_Chemistry.pptx by Mrs. Manjushri P. Dabhade
Combinatorial_Chemistry.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
TI LI畛U CHUYN SU L畛P 12 THEO CH働NG TRNH M畛I DNG CHO C畉 3 B畛 SCH N THI...
Nguyen Thanh Tu Collection
The Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptxThe Effectiveness of Manual Therapies on the Thoracic.pptx
The Effectiveness of Manual Therapies on the Thoracic.pptx
SamarHosni3
BIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptx
BIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptxBIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptx
BIOPHARMACEUTICS AND PHARMACOKINETICS(BP604T) - Copy (3).pptx
maniramkumar
Anti-Protozoal Agents.pptx by Mrs. Manjushri P. Dabhade
Anti-Protozoal Agents.pptx by Mrs. Manjushri P. DabhadeAnti-Protozoal Agents.pptx by Mrs. Manjushri P. Dabhade
Anti-Protozoal Agents.pptx by Mrs. Manjushri P. Dabhade
Dabhade madam Dabhade
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMC
Action of  Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMCAction of  Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMC
Action of Muscles ppt by Priscilla Jasper Vedam Vemavarapu @ASRHMC
jaspervedamvemavarap
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷sPurchase Analysis in Odoo 17 - Odoo 際際滷s
Purchase Analysis in Odoo 17 - Odoo 際際滷s
Celine George
Mixed_Sinhala_Dual_Male_Names (1).pdf...
Mixed_Sinhala_Dual_Male_Names (1).pdf...Mixed_Sinhala_Dual_Male_Names (1).pdf...
Mixed_Sinhala_Dual_Male_Names (1).pdf...
keshanf79
2. ES: Application of Number: Units of measure & conversions
2. ES: Application of Number: Units of measure & conversions2. ES: Application of Number: Units of measure & conversions
2. ES: Application of Number: Units of measure & conversions
leigh441292
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
URINE SPECIMEN COLLECTION AND HANDLING CLASS 1 FOR ALL PARAMEDICAL OR CLINICA...
Prabhakar Singh Patel
Proteins, Bio similars & Antibodies.pptx
Proteins, Bio similars &  Antibodies.pptxProteins, Bio similars &  Antibodies.pptx
Proteins, Bio similars & Antibodies.pptx
Ashish Umale
IB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdf
IB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdfIB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdf
IB-Unit-4 BBA BVIMR 2022 Syllabus_watermark.pdf
Dr. Mahtab Alam
Developing Topic and Research Question for Systematic Reviews - Emmanuel Ekpor
Developing Topic and Research Question for Systematic Reviews - Emmanuel EkporDeveloping Topic and Research Question for Systematic Reviews - Emmanuel Ekpor
Developing Topic and Research Question for Systematic Reviews - Emmanuel Ekpor
Systematic Reviews Network (SRN)
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptxO SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
O SWEET SPONTANEOUS BY EDWARD ESTLIN CUMMINGSAN.pptx
Literature Hero
How to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of SaleHow to manage Customer Tips with Odoo 17 Point Of Sale
How to manage Customer Tips with Odoo 17 Point Of Sale
Celine George
Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...
Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...
Bioinformatics: History of Bioinformatics, Components of Bioinformatics, Geno...
A Biodiction : A Unit of Dr. Divya Sharma
Using GenAI for Universal Design for Learning
Using GenAI for Universal Design for LearningUsing GenAI for Universal Design for Learning
Using GenAI for Universal Design for Learning
Damian T. Gordon
How to Invoice Shipping Cost to Customer in Odoo 17
How to Invoice Shipping Cost to Customer in Odoo 17How to Invoice Shipping Cost to Customer in Odoo 17
How to Invoice Shipping Cost to Customer in Odoo 17
Celine George

Cybercrime and security.pptx

  • 1. C Y B E R C R I M E A N D S E C U R I T Y B Y S O B I A S A E E D , AT I Q A & Z A R A
  • 2. TA B L E O F C O N T E N T S Introduction History of Cybercrime Categories of Cybercrime Types of Cybercrime Cyberthreats to National Security Cyber security Advantages of Cyber security Safety measures against Cybercrime Cyber Laws in Pakistan NCCS Conclusion Tools used in presentation References
  • 3. I N T R O D U C T I O N Cybercrime is any criminal activity that involves a computer, networked device or a network. Any unlawful act carried out by using internet is called a cybercrime.
  • 4. H I S T O R Y O F C Y B E R C R I M E The first cybercrime was reported in 1820. In 1834, French robbers hacked French Telegraph system and stole the information. In 1969, the first ever virus in computer history attacked on the University Washington Data Center and replicated the files before the machine overload. This virus was called Rabbit Virus. From 1970-1975 Kevin-Mitnick penetrates some of the highest-guarded networks in the world, including Nokia and Motorola and breech the internal operating system of devices. In 1973, A local New York bank teller uses a machine to steal more than $2 million.
  • 5. H I S T O R Y O F C Y B E R C R I M E In1982, The CIA blows up a Siberian gas pipeline by injecting logic bomb into the network and the operating system to monitor the gas pipeline without using a bomb or a missile. In 1988, Morris Worm was released on a computer of MIT. In 1999, Melissa virus infects Microsoft Word records, transmitting itself via email as an attachment automatically. It mails out to the first 50 names mentioned in the Outlook email address box of an infected device. In 2013-2015, Global Bank Hack more than 100 organizations around the world have access to secure information from a community of Russian-based hackers.
  • 6. C AT E G O R I E S O F C Y B E R C R I M E
  • 7. C R I M E A G A I N S T P E O P L E These crimes include cyber harassment and stalking, distribution of child pornography, credit card fraud, human trafficking, spoofing, identity theft, and online libel or slander.
  • 8. C R I M E S A G A I N S T P R O P E R T Y Some online crimes occur against property, such as a computer or server. These crimes include DDOS attacks, hacking, virus transmission, cyber and typo squatting, computer vandalism, copyright infringement, and IPR violations.
  • 9. When a cybercrime is committed against the government, it is considered an attack on that nation's sovereignty. Cybercrimes against the government include hacking, accessing confidential information, cyber warfare, cyber terrorism, and pirated software. C R I M E S A G A I N S T P R O P E R T Y
  • 10. T Y P E S O F C Y B E R C R I M E
  • 11. H A C K I N G Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes. Hacking is unlawful activity by cybercriminals, motivated by financial gain, protest, information gathering (spying), and even just for the fun of the challenge. Person who does hacking is called a hacker.
  • 12. C H I L D P O R N O G R A P H Y The Internet is highly used by its abuser to abuse child sexually worldwide. More Homes have access to Internet, more children would be using Internet and more of the chances of falling victim to the aggression of pedophiles. Pedophiles uses the false identity to trap the children. Pedophiles connect children in the various chat rooms which are used by children to connect other children.
  • 13. D E N I A L O F S E R V I C E AT TA C K A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.
  • 14. V I R U S D I S S E M I N AT I O N Malicious software that attaches itself through the other softwares. Virus, worms, Trojan horse, web jacking, e-mail spoofing and logic bomb etc. Adderall malicious program that are harmful for our computer systems.
  • 15. C O M P U T E R VA N D A L I S M Damaging and destroying data rather than stealing are misusing them is called cyber vandalism. These are the programs that attach themselves to a file that circulate.
  • 16. C Y B E R T E R R O R I S M Terrorist attack on the computer network is by distributed denial of service attacks, hate websites and hate emails and attack on service networks etc.
  • 17. S O F T WA R E P I R A C Y Theft of software by legal copying of genuine programs or counterfeiting and distribution of products intended to pass for original.
  • 18. C Y B E R T H R E AT S T O N AT I O N A L S E C U R I T Y Cyber crime is increasing in Pakistan tremendously from last two decades. Pakistan is one of the amongst most higher Internet user in the world . Terrorists are using websites to raise fund for their terrorist activities. Some of the NGO's are also using Internet to raise the funds for the terrorists and criminal groups in the name of poor people and orphan child. Harassment by using social media is increasing day by day and causes unrecoverable damage to society. The policies are not implemented practically.
  • 19. C Y B E R S E C U R I T Y
  • 20. C Y B E R S E C U R I T Y Cyber security involves the protection of secret data and business information through prevention, detection and response to different online attacks. Cyber security is preventing the attacks from the cyber criminals.
  • 21. P R I VA C Y P O L I C Y Before submitting your name, e-mail and other personal data to the website read this privacy policy. Some of the websites sell your data to the different vendors that can be used for illegal purpose. Always keep your privacy settings strict in different websites or apps like Facebook, YouTube, Instagram and WhatsApp etc.
  • 22. K E E P T H E S O F T WA R E U P D AT E Always use the updated software in your computer system and don't use pirated software or try to crack password of softwares by using crackers. Always keep your antivirus software updated and use its latest version. Use good passwords that are difficult to guess. Don't use your names, date of birth and personal number as your passwords. Always used licensed softwares.
  • 23. D I S A B L E R E M O T E C O N N E C T I V I T Y Don't use public network like public Wi-Fi provided by the governments at public places. These are highly used by hackers to steal the data through attacking these public networks. You should disable the features that are not in use.
  • 24. A D VA N TA G E S O F C Y B E R S E C U R I T Y Cyber security prevent us from the cyber attack. Internet security processing all the incoming and outcoming data. It helps us to select the websites that are secure or not secure for us. It prevents us from the hacks and viruses. Applications for cyber security in our computer system should be up to date.
  • 25. S A F E T Y M E A S U R E S A G A I N S T C Y B E R C R I M E Use antivirus software. Insert firewalls Uninstall unnecessary softwares Maintain backup Check security settings Always note any change in your computer system Don't install softwares from a known websites
  • 26. C Y B E R L AW S I N PA K I S TA N On February 18, 2022, the government passed an ordinance amending the Pakistan Electronic Crimes Act, 2016 (PECA) to make online defamation of authorities, including the military and judiciary, a criminal offense with harsh penalties. They are very insufficient cyber laws in Pakistan. And the laws that are passed are not implemented practically. Due to the weak legislation the cyber crimes are increasing day by day.
  • 27. N C C S ( N AT I O N A L C E N T E R O F C Y B E R S E C U R I T Y ) NCCs is the initiative taken by the government to prevent cyber crimes. But it's offices are only in big cities of Pakistan and is not accessible in most of the areas of Pakistan. The method to report the cyber crime in NCCS is online and most of the people R unaware about it. The procedure of case registration in NCCS it's just like a FIR in police station, so the victims are reluctant to report. All these are the reasons that very few cyber crimes are reported and many of them remain unsolved.
  • 28. C O N C L U S I O N It is very difficult to restrict the cyber crimes. Government should take the measures two aware the people about the cyber security. There should be strict legislation to stop the cyber crimes. The method of reporting cyber crime should be easy, and the investigation agencies and media should keep the face a victim secret. Pakistan is among us the countries well highly watch pornography. People should stop to access these websites to avoid cyber stalking and Bullying. There should be a body do keep check on all the data traffic and content that is uploaded on different website and watched in Pakistan. There should be a content filtering body should filter the data that can be watched in our country.
  • 29. R E F E R E N C E S /aemankhan/cybercrimeppt-27376284 https://www.jigsawacademy.com/blogs/cyber-security/history-of-cybercrime/ https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940- 2020/ https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm https://www.malwarebytes.com/hacker https://www.techtarget.com/searchsecurity/definition/denial-of-service https://www.nccs.pk/ NATIONAL CYBER SECURITY POLICY 2021
  • 30. T O O L S U S E D F O R P R E S E N TAT I O N Microsoft PowerPoint NATIONAL CYBER SECURITY POLICY 2021 document. Research papers Different websites as per reference given in above slide.