Cyber crimes

37

description

 

Transcript of Cyber crimes

Page 1: Cyber crimes
Page 2: Cyber crimes

Group MembersGroup Members

• Muhammad NASIR MB-12-04

• Waqas AHMAD MB-12-05

• Maryam BATOOL MB-12-06

• M.Tahir SHAH MB-12-64

• Sarfraz AHMAD MB-12-65

• Javaad AHMAD MB-12-66

Page 3: Cyber crimes

CYBERCYBER CRIMESCRIMES

Page 4: Cyber crimes

What are cyber crimesWhat are cyber crimes

• Offences that are committed against individuals or groups of individuals (by using computer) with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly.

Page 5: Cyber crimes

Historical PerspectiveHistorical Perspective

• 1960s and 1970s: Hacker: a positive term

A Hacker: An expert, knowledgeable about programming and operating systems

• 1970s onwards:Hacker: a term, which progressively became more

negative.

A Hacker: Someone using computers without authorization

Page 6: Cyber crimes

Why we study about cyber crimesWhy we study about cyber crimes

• Almost every one is using computer From white collar criminals to terrorist

organizations and from teenagers to adults• Conventional crimes like Forgery , extortion, and

kidnapping etc. are being committed with the help of computer

• New generation is growing up with computers• MOST IMPORTANT business transactions are

carried out through internet.

Page 7: Cyber crimes

Profile of cyber criminals

• Disgruntled employee.

• Teenagers.

• Professional hackers.

• Business rivals.

• Political hacktivists.

• Ex-friends.

• Divorced husband etc.

Page 8: Cyber crimes

Common cyber crime attacksCommon cyber crime attacks

• Hacking

• Cracking

• Script kiddies

• Vandals

• Spoofing

• Denial of services

• Snooping

Page 9: Cyber crimes

Common cyber crimes attacksCommon cyber crimes attacks

• Software privacy

• Net Extortion

• Virus dissemination

• Phishing

• Cyber Stalking

• Salami attacks

• Credit card fraud

Page 10: Cyber crimes

HackingHackingHacking is access of computer resource,

without authorization

Cracking A hacker who uses his or her skills to

commit unlawful acts, or to deliberately create mischief

Page 11: Cyber crimes

Script kiddiesScript kiddies A hacker who downloads the scripts and

uses them to commit unlawful acts, or to deliberately create mischief, without fully understanding the scripts

Vandals A person who deliberately destroys or

damages public or private property by using computer

Page 12: Cyber crimes

SpoofingSpoofing Spoofing is the criminally fraudulent

process of attempting to acquire sensitive information such as usernames, passwords and credit card details etc.

Denial of services

Any problem that makes it difficult or impossible for the system to continue to perform productive work

Page 13: Cyber crimes

SnoopingSnooping

• Snooping is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail or watching what someone else is typing.

Page 14: Cyber crimes

Software privacy Software privacy • Theft of software through illegal copying of

genuine programs.

Retail revenue losses are ever increasing due to this crime.

This can be done in various ways such as end user copying, hard disk loading and illegal download from the internet.

Page 15: Cyber crimes

Net Extortion Net Extortion • Copying the company confidential data in order

to extort said company for huge amount.

Virus dissemination Malicious software that attaches itself to t other

software.

(virus, worms, Trojan horse. Time bomb, rabbit and bacterium are the malicious soft wares.

Page 16: Cyber crimes

Credit card Frauds

• You simply have to type your credit card number into www page off the vender for online transaction and if electronic transactions are not secured the credit card number can be stolen by the hacker who can misuse this credit card.

Page 17: Cyber crimes

PHISHING

• It is technique of pulling out confidential information from the bank or financial institutional account holders by deceptive means.

Credit card writer

Page 18: Cyber crimes

ATM as usual

Page 19: Cyber crimes
Page 20: Cyber crimes
Page 21: Cyber crimes
Page 22: Cyber crimes

Inside the boxInside the box

Page 23: Cyber crimes

Cyber Stalking• The cyber follows the victim by sending

emails or entering the chat rooms frequently

Threatening • The criminals sends threatening email or

comes in contact in chat rooms with victims.

Page 24: Cyber crimes

Salami Attack

• In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.

Criminal makes such programs that deducts small amounts as 2.5 rupees from all the customers accounts of a bank and deposits in his own account. In such a case no customer will approach to bank for such small amount.

Page 25: Cyber crimes

Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation. It is certainly not as if we don’t face that many cyber crimes here. In fact, Pakistan is currently facing the following types of it:

Page 26: Cyber crimes

Cyber Crimes in Pakistan

Page 27: Cyber crimes

• Financial crimes• Cyber pornography• Sale of illegal articles• Online gambling• Intellectual property crimes• Email spoofing• Cyber stalking• Forgery

Page 28: Cyber crimes

• Unauthorized access to computer systems\networks• Theft of information contained in electronic form• Virus/worm attacks• Trojan attacks• Internet time theft• Password cracking

Page 29: Cyber crimes

General PreventionsGeneral Preventions

Page 30: Cyber crimes

• Spam blockerSpam blocker Turn on your spam blocker. Most Internet

providers provide a spam blocking feature to prevent unwanted messages.

• Firewall protection

Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.

Page 31: Cyber crimes

Anti-virus software

Make sure you have adequate anti-virus software for your computer. You also need to make sure you regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any malware, spyware, viruses and other problems.

Page 32: Cyber crimes

Encryption softwareEncryption software

• Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.

Page 33: Cyber crimes

Caution in providing personal Caution in providing personal informationinformation

• Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.

Page 34: Cyber crimes

Secure shoppingSecure shopping

• Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud

Page 35: Cyber crimes

Monitoring activitiesMonitoring activities

• Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity

Page 36: Cyber crimes
Page 37: Cyber crimes