Download presentation
Presentation is loading. Please wait.
Published byJunior Lucas Modified over 9 years ago
1
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL ISLAM UNIVERSITY
2
INTRODUCTION The aim of this research is to determine the cybercrimes, its causes and its harms on society. This research is made to know what kind of problems are faced by victims and what techniques are used by criminals. The purpose of making this report is to identify the actions that has taken by government agencies. The research is also conducted for the solutions of major issues of these criminal activities. It also examine that why the cyber criminals are doing this kind of illegal activity.
3
BACKGROUND In the age of modernization where world is going advance day by day the use of cyber resources is also increasing. Every organization need the cyber resources to fulfill their tasks and to carry on their business. But on the other side the other organizations are also using cyber resources but their intentions are not fair. They use these resources to harm others and get extra money. These crimes are increasing day by day and the whole world is facing these crimes. In a recent survey of Symantec corporation it is found that the 65% of internet users had been victims of some cybercrimes. Some kinds of these crimes are: Financial fraud Hacking and cracking of software Theft of information contained Forgery(copying pictures and documents) Password cracking etc.
4
OBJECTIVES To identify the cybercrimes. To find out the impact and effects of cybercrimes on society. To find out the protection policies. To find out reasons for not reporting to law enforcement To find out types of attack
5
SIGNIFICANCE This study will definitely add value to the existing knowledge base and at the same time give us ability and motivation to indulge in further advance researches in the field of management sciences. This study will help the agencies to better understand the victims of cybercrimes. This study is also useful to direct the top agencies to formulate strategies and processes keeping in view the harms, causes, and impacts of cybercrime in society. This study will aware the internet users how to fight back with cybercriminals.
6
HYPOTHESES Cyber crimes have negative impact on society.we come to know the main reason of going toward this crime is that the criminal may feel the need of extra money and to earn this extra money in easy way they do these crimes. In Social environment more people do this for their entertainment.
7
LITRATURE REVIEW Modern society is defined by the internet: over a quarter of the world's population is wired into the net - and this number is growing every day. The internet is a source of information, communication, entertainment and education, and it is impossible for many of us to imagine a functioning world without it. Unfortunately however, as with most technological advances, the internet also has a dark side - and the evolution of the internet has been paralleled by an evolution in crime. (2013, UNICRI)
8
LITRATURE REVIEW In a recent survey conducted by Symantec Corporation, it was found that 65% of internet users had been a victim of some kind of cybercrime, including viruses and malware attacks, online scams, phishing attacks, hacking of social-networking profiles, credit card fraud and sexual predation. [Norton annual report 2012] Today, the top three websites Google, Microsoft, and Facebook Each have over 300 million unique Users (Nielson ratings, 2011).
9
LITRATURE REVIEW “What I clearly missed was the fact that my 99-year- old mother (now deceased) would be on the Internet; that is, I did not foresee the powerful community side of the Internet and its impact on every aspect of our society”. Kleinrock (2008) The internet crime (both in terms of physical damage to computer systems and in terms of recovery from such crimes) suggest that such crimes are extremely costly to victims. (Gordon et al., 2006, p. 15).
10
METHODOLOGY Data Collection: The data for this research paper is collected from the observations and questionnaire. The sources that we used are newspaper articles, journal articles, company’s reports, research journals, documents review, and newspaper editorials. The sample size of our research is consist on the 30 cyber users who respond the questionnaire.
11
DATA ANALYSIS Do you use a computer for personal or business purposes?
12
DATA ANALYSIS How often do you use an internet?
13
DATA ANALYSIS Have you, or someone you know been victim of cybercrime?
14
DATA ANALYSIS Had someone give you false information about themselves in an email or instant message?
15
DATA ANALYSIS In general, how do you feel about internet advertising?
16
DATA ANALYSIS
17
ANALYSIS After analyzing the all material it is analyzed that the cybercrimes are very harmful for every one weather they are individual or organizations or the entire country or the whole world. Every society is facing the problem of these crimes.
18
CONCLUSION After all the research it is analyzed that cybercrimes are harmful for the society and for the personal life of the people. They are creating serious issues and problems for the systems of different organization and institutions. They should be stop by the law enforcement. To report cybercrimes cases and demands that Government put in place laws, policies and technologies to control cybercrime.
19
RECOMMENDATIONS Government need to take prospective steps to prevent the spread of these crimes. Companies should make strong security mechanism to protect their company from these crimes. The people should avoid to visiting inappropriate sites and sharing personal thoughts and information online. Families should have a safe-site browser tool and make sure that younger’s understand how this works and why it’s important.
20
REFERENCES Policing - An International Journal of Police Strategies and Management. [On line] Available http://www.unicri.it/special_topics/cyber_threats/cyber_crime/ http://www.unicri.it/special_topics/cyber_threats/cyber_crime/ [On line]. Available http://legacy.kctcs.eduhttp://legacy.kctcs.edu [On line]. Availablehttp://books.google.com.pk/books?id=Y5nYlNf5yLgC&printsec =frontcover&dq=cyber+crime:+preventions+and+protections&hl=en&sa= X&ei=4- YRUr2CMIffswbq2ICgCQ&ved=0CDsQ6AEwAw#v=onepage&q=cyber %20crime%3A%20preventions%20and%20protections&f=falsehttp://books.google.com.pk/books?id=Y5nYlNf5yLgC&printsec =frontcover&dq=cyber+crime:+preventions+and+protections&hl=en&sa= X&ei=4- YRUr2CMIffswbq2ICgCQ&ved=0CDsQ6AEwAw#v=onepage&q=cyber %20crime%3A%20preventions%20and%20protections&f=false [On line]. Availablehttp://books.google.com.pk/books?id=SiG- zE6yteMC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=Leg RUoiaPIvMswbP24GAAw&ved=0CCsQ6AEwAA#v=onepage&q=cyber %20crime&f=falsehttp://books.google.com.pk/books?id=SiG- zE6yteMC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=Leg RUoiaPIvMswbP24GAAw&ved=0CCsQ6AEwAA#v=onepage&q=cyber %20crime&f=false
21
REFERENCES [On line]. Availablehttp://books.google.com.pk/books?id=KQhLW0NQPdsC&prints ec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=LegRUoiaPIvMswbP2 4GAAw&ved=0CFMQ6AEwBw#v=onepage&q=cyber%20crime&f=falsehttp://books.google.com.pk/books?id=KQhLW0NQPdsC&prints ec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=LegRUoiaPIvMswbP2 4GAAw&ved=0CFMQ6AEwBw#v=onepage&q=cyber%20crime&f=false [On line]. Availablehttp://books.google.com.pk/books?id=fJVcgl8IJs4C&printsec=fr ontcover&dq=cyber+crime&hl=en&sa=X&ei=YugRUv7KLcXTtQbRy4C YDQ&ved=0CFYQ6AEwCDgK#v=onepage&q=cyber%20crime&f=falsehttp://books.google.com.pk/books?id=fJVcgl8IJs4C&printsec=fr ontcover&dq=cyber+crime&hl=en&sa=X&ei=YugRUv7KLcXTtQbRy4C YDQ&ved=0CFYQ6AEwCDgK#v=onepage&q=cyber%20crime&f=false [On line]. Availablehttp://books.google.com.pk/books?id=cWOQWx4QPFYC&print sec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=YugRUv7KLcXTtQb Ry4CYDQ&ved=0CFwQ6AEwCTgK#v=onepage&q=cyber%20crime&f= falsehttp://books.google.com.pk/books?id=cWOQWx4QPFYC&print sec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=YugRUv7KLcXTtQb Ry4CYDQ&ved=0CFwQ6AEwCTgK#v=onepage&q=cyber%20crime&f= false
22
Thank You FOR YOUR PATIENCE
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.