Download presentation
Presentation is loading. Please wait.
Published byGrant Bradley Modified over 6 years ago
1
Submitted By: Arslan Javaid Bsmc02143003 Submitted to: Sir Farrukh
NEW MEDIA Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
2
Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desire.
4
CYBER CRIME Illegal activity committed on the internet.
Crimes committed using a computer. Illegal activity committed on the internet.
5
DEFINITION Unlawful act wherein computer is either a tool or a target or both. Acts that are punishable by the information technology act.
6
HISTORY First recorded in 1820
In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.
7
CYBER CRIMES PERCENTAGE
Financial fraud % Sabotage of data % Information theft % System penetration from outside % Denial of service % Unauthorized access by insiders % Employee abuse of internet privileges 79% Viruses %
8
CATEGORIES Two: Computer as a tool. Computer as a target.
9
TYPES Financial crimes Sale of illegal articles Online gambling
spoofing Forgery Cyber stalking Denial of service attacks
10
Information theft bombing Vandalism Malware Software piracy Password cracking Viruses Physically damaging a system
11
CRIMINALS Kids Organized hacktivists Disgruntled employees
Professional hackers
12
CYBER THREATS Cyber Extortion:
Where criminal gangs threat to close down internet based business if protection money was not paid. Information Theft: When a computer is infiltrated with purpose of obtaining information relating user. Fraud: Fraud has many guises on internet, from famous s promising millions in advance fees to sale of quality goods.
13
CYBER THREATS Phishing :
Obtaining of financial information from victim such as a bank record or credit card details by sending what look like authentic messages. Vishing: It is also the obtaining financial information but through voice messages telling the victim to comply immediately.
14
CYBER THREATS IN PAKISTAN
According to report of “The Express Tribune”. Cyber Stalking: The repeated use of electronic communication to frighten someone for example sending threatening s. Forgery(Fraud): The process of making or creating an alteration of genuine documents with the intent to defraud. Internet Time Theft: The use by an unauthorized person of the internet hours paid by another person. Logic Bomb: A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.
15
Cyber Threats in Pakistan
Piracy: Illegal use or reproduction or distribution of another’s software. Identity Theft : Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.
16
Cyber security
17
WHAT TO UNDERSTAND??? What is the meaning of word “cyber”?
Why there is need of cyber security? What are the security problems in cyber field? How to implement and maintain security of a cyber field around us?
18
INTRODUCTION The term cyber security is used to refer to the security offered through online service to protect your online information. Security problems almost always stem from a mix of technical, human and organizational causes.
19
CYBER Combining form relating to information technology, the internet and virtual reality.
20
NEED It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.
21
PROBLEMS Viruses Hackers Malware Password cracking
22
ADVENTAGES Defend from critical attacks Help in browse safe websites
Defend from hacks and viruses It processes all the incoming and outgoing data on computer
23
OBJECTIVE OF CYBER SECURITY
To establish rules and measures to use against attacks over the internet
24
CYBER CRIME LAW IN PAKISTAN
25
Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.
26
National Response Center for Cyber Crime (NR3C)
Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism. To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.
28
PECO(Prevention of Electronic Crimes Ordinance)
On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in The new PECO 2012 is still under debate in the National Assembly and is being tweaked / redrafted by the Standing Committee. The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.
30
Use antivirus software
Insert firewalls Uninstall unnecessary software Maintain backup Check security settings Never give your full name or address to strangers Learn more about privacy
32
CONCLUSION Its need of time to spread awareness of cyber security.
I hope that my presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.