Sunteți pe pagina 1din 22

CYBER CRIME

 Introduction
 Definition
 History
 Categories of Cyber crime
 Types of Cyber crime
 Advantages of cyber crime
 Disadvantages of cyber crime
 Cyber crime in Pakistan
 Safety tip of cyber crime
 Conclusion
The Internet is growing rapidly. It has given
rise to new opportunities in every field such as
entertainment , business , education or sports.

There are two sides to a coin. INTERNET also


has its disadvantages like CYBER CRIME –
Illegal activity committed on the Internet.
Cyber crime is an ‘umbrella’ term
for lots of different types of crimes
which either take place online or
where technology is a means and/or
target for the attack. It is one of the
fastest growing criminal activities
across the world, and can affect
both individuals and businesses.
The first recorded cybercrime took place 1820.
 The first SPAM email took place in 1976 when it was
sent out over ARPANET.
ARPANET : Advanced Research Projects
Agency Network
Like spam the first VIRUS was installed on an Apple
Computer in 1982.
A 16-year old student was arrested in UK in 1994 for
doing this crime.
 The computer as a target

 The computer as a weapon


We can categorize cyber crime in two ways.
• THE COMPUTER AS A TARGET:
Using a computer to attack other computer e.g. hacking, virus etc.
 THE COMPUTER AS A WEAPON:
Using a computer to commit real world crime e.g. Cyber terrorism, credit
card fraud etc.
 Hacking
 Identify theft
 Virus dissemination
 Computer vandalism
 Cyber terrorism
 Software piracy
 Account Hacking
 Blackmailing through Social Media
 Tracking Bank Record
•Hacking in simple terms means an illegal intrusion into a
computer system or network.
•In many organizations they have to check their Internet
security protection. It is also known as CRACKING.
Government websites are the hot target of the hackers due to
the press coverage, it receives. Hackers enjoy the media
coverage.
•MOTIVE BEHIND THE CRIME CALLED HACKERS
•Motive behind the crime called hacking, power, publicity,
revenge desire to access forbidden information destructive
mindset wants to sell security services.
o This has become a major problem with people using the Internet for
cash
o transactions and banking services.
o In this cyber crime, a criminal accesses data about a person’s bank
account, credit cards, Social Security, debit card and other sensitive
information to siphon money or to buy things online in the victim’s
name.
o It can result in major financial losses for the victim and even spoil the
victim’s credit history.
 Malicious software that attaches itself to other software.
(Virus, worms, web-jacking, email bombing etc)
 This type of software's employed for you to gain access to a
system for you to take delicate information or even data or
even triggering the destruction of software program
contained in the machine.
 Damaging or destroying the data rather than stealing
or misusing them is called cyber vandalism. These are
program that attach themselves to a file and then
circulate
 Transmitting virus.
•Terrorist
attacks on the internet is by distributed denial
of service attacks, hate websites and hate E-mail,
attacks on service network etc.
•Use of internet based attacks in terrorists activities
against computers/networks with the intension of
causing harm.
•Cyber terrorism can also include attacks on Internet
business, but when this is done for economic
motivations rather than ideological.
Software piracy is the unauthorized or illegal
copying, distribution, of genuine programs or the
counterfeiting and distribution of products intended
to pass for the original.
CYBER CRIME
1. CREATING FAKE PROFILE : Fake
Profiles use is common in Students. Many
cases have been registered against Fake
Profiles in Cyber Cell.
2. PASSWORD HACKING : Students are
taking cyber crimes just for fun or
carrying out small acts such as password
hacking to revenge on their teachers ,
friends in schools an also Morphing
pictures and posting them on social
networking sites to defame others.
3. PHISHING: Phishing is the act of
attempting to acquire information such as
username, passwords and credit card
details. Phishing emails may contain links
to the websites that are infected with
malware.
 Use Anti-virus software.
 Insert Firewalls.
 Uninstall unnecessary software
 Maintain Backup
 Check security settings
 Stay Anonymous - choose a genderless screen name.
 Never give your full name or address to strangers.
 Learn more about Internet Privacy.
 Don’t give your passwords, login id’s etc to others
 Don’t add unnecessary people on social media.
DISADVANTAGES OF
CYBERCRIME:
 It could cause violence of privacy.
 It may result in to loss of data or corruption of data.
 Preserving and protecting electronic records/ information and/ or
individual.
CYBER CRIME IN PAKISTAN
Cyber crime rise rapidly in Pakistan.
The cyber crime of multiple kind in Pakistan have increased by five time over the
past two year.
According to FIA.
a) 641 cases were reported the unit in 2014.
b) Ratio dropped in 2015.
c) 1309 cases were reported in 2016.
d) In 2017 more than 2324 were registered in different categories of cybercrime.
Habib bank was hacked on oct 28-2018.
A gang was arrested from Sargodha. Which was involved in hacking banks and
nadra data.
CONCLUSION

• Cybercrime is indeed getting the recognition it deserves. However, it is


not going to restricted that easily. In fact, it is highly likely that cyber
crime and its hackers will continue developing and upgrading to stay
ahead of the law.
• So, to make us a safer we must need cyber security.

S-ar putea să vă placă și