By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Security Classification Practical Issues in dealing with different types of cybercrime.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
THE MEMBERS GROUP Safeguard Iowa Partnership – Cybersecurity Webinar Series.
2 Language of Computer Crime Investigation
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Breaking Trust On The Internet
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Bank Crime Investigation Techniques by means of Forensic IT
Introduction To Information Technology. Defining Information What is Information? Information is any knowledge that comes to our attention. That could.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Beware! Consumer Fraud Module 9.1.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
What is FORENSICS? Why do we need Network Forensics?
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
“A mobile market researcher wants a smartphone capable of shooting quality video, playing their music, browsing the web and running a range of applications”.
Online Safety Parent Workshop Helping to keep your children safe online.
Cybercrime What is it, what does it cost, & how is it regulated?
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Today we are teaching the Millennial Generation!!!!
Computer crimes.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Course: Introduction to New Media Course Instructor: Muhmmad Farrukh.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Digital Citizenship (Cyber bullying, Identity Theft and Hacker) By Gabby and Heidi.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Cyber Crime and Jurisdiction By Zach Archer COCS 380.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Various Features and Services Provided By the SpotCam.
Identity Theft It’s a crime!
Social and environmental impact
A Project on CYBER SECURITY
Freedom Independence Transition
#1 Consumer Fraud Complaint – 5th straight year!
Digital Citizenship.
What every consumer should know
Digital Citizenship.
Presentation transcript:

By : Syed Shabi Ul Hassan

What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet Fraud, Credit Card account theft.

Cyber Crime Facts  Cyber crime has now surpassed illegal drug trafficking as a criminal moneymaker  Somebody’s identity is stolen every 3 seconds as a result of cyber crime  Without a sophisticated security package, your unprotected PC can become infected within four minutes of connecting to the Internet.

Cyber Crime in Pakistan  As we are getting into internet era, cyber crime rates are hiking in similar manner. Many of us don’t know how to legally challenge those criminal activities.  A common internet or mobile phone user, who is victim of a cyber crime, thinks that there is no one to listen his/her pleas. Many of victims end up not registering any complaint.

National Response Center (NR3C)  It is made in 2007 by FIA, primarily to deal with technology based crimes in Pakistan.  A law enforcement agency that combats Cyber Crime, provides state of the art digital forensic services.

Provided Services  Computer Forensics  Mobile Forensics  Video Forensics  Network Forensics

Computer Forensics  In today’s ever changing criminal world the use of computers for fraud and the pursuit of other crimes has increased to dramatic proportions.  It also encompasses areas such as pornography, child sex abuse and the sale of black market goods online.

 NR3C has state of the art computer forensic facility, and posses leading forensic experts to deal with all computer related crimes.

Mobile Forensics  The increased utility of mobile devices such as smart phones has leveraged the criminals to communicate and use digital application, resultantly storing tremendous amount of data on the device.  Criminals use smart phones for a number of activities such as committing fraud over , harassment through text messages, trafficking of child pornography, communications related to narcotics, etc.

 The data stored on smart phones is extremely useful to forensic analysts through the course of an investigation.

Video Forensic  Video recordings can provide a realtime, eyewitness account of a crime so investigators can watch or hear what transpired.  a surveillance video captures a bank robbery in progress, or a hidden camera records. For most crimes, however, high quality video recordings are often not available. This is where forensic video expertise can help.

 Forensic experts have many techniques to enhance recordings that can bring out details and provide a clearer picture of what occurred.

Network Forensics  Network forensics is the capture, storage, and analysis of network events. Regardless of the name, the idea is the same: record every packet of network traffic.  It also includes the forensic examination of network devices such as router, VOIP gateways, IDS/IDP etc.

Major Online Activities  In Pakistan, internet users range from 10% to 16% of the overall population.  Social networking  Online banking  Internet surfing  Audio & video communication

 Entertainment  Online shopping  Map directions / GPS  Online education  Online auction  Information sharing  Medical assistance  Online game