cyber crimes
DESCRIPTION
TRANSCRIPT
Group MembersGroup Members
• Muhammad NASIR MB-12-04
• Waqas AHMAD MB-12-05
• Maryam BATOOL MB-12-06
• M.Tahir SHAH MB-12-64
• Sarfraz AHMAD MB-12-65
• Javaad AHMAD MB-12-66
CYBERCYBER CRIMESCRIMES
What are cyber crimesWhat are cyber crimes
• Offences that are committed against individuals or groups of individuals (by using computer) with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly.
Historical PerspectiveHistorical Perspective
• 1960s and 1970s: Hacker: a positive term
A Hacker: An expert, knowledgeable about programming and operating systems
• 1970s onwards:Hacker: a term, which progressively became more
negative.
A Hacker: Someone using computers without authorization
Why we study about cyber crimesWhy we study about cyber crimes
• Almost every one is using computer From white collar criminals to terrorist
organizations and from teenagers to adults• Conventional crimes like Forgery , extortion, and
kidnapping etc. are being committed with the help of computer
• New generation is growing up with computers• MOST IMPORTANT business transactions are
carried out through internet.
Profile of cyber criminals
• Disgruntled employee.
• Teenagers.
• Professional hackers.
• Business rivals.
• Political hacktivists.
• Ex-friends.
• Divorced husband etc.
Common cyber crime attacksCommon cyber crime attacks
• Hacking
• Cracking
• Script kiddies
• Vandals
• Spoofing
• Denial of services
• Snooping
Common cyber crimes attacksCommon cyber crimes attacks
• Software privacy
• Net Extortion
• Virus dissemination
• Phishing
• Cyber Stalking
• Salami attacks
• Credit card fraud
HackingHackingHacking is access of computer resource,
without authorization
Cracking A hacker who uses his or her skills to
commit unlawful acts, or to deliberately create mischief
Script kiddiesScript kiddies A hacker who downloads the scripts and
uses them to commit unlawful acts, or to deliberately create mischief, without fully understanding the scripts
Vandals A person who deliberately destroys or
damages public or private property by using computer
SpoofingSpoofing Spoofing is the criminally fraudulent
process of attempting to acquire sensitive information such as usernames, passwords and credit card details etc.
Denial of services
Any problem that makes it difficult or impossible for the system to continue to perform productive work
SnoopingSnooping
• Snooping is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail or watching what someone else is typing.
Software privacy Software privacy • Theft of software through illegal copying of
genuine programs.
Retail revenue losses are ever increasing due to this crime.
This can be done in various ways such as end user copying, hard disk loading and illegal download from the internet.
Net Extortion Net Extortion • Copying the company confidential data in order
to extort said company for huge amount.
Virus dissemination Malicious software that attaches itself to t other
software.
(virus, worms, Trojan horse. Time bomb, rabbit and bacterium are the malicious soft wares.
Credit card Frauds
• You simply have to type your credit card number into www page off the vender for online transaction and if electronic transactions are not secured the credit card number can be stolen by the hacker who can misuse this credit card.
PHISHING
• It is technique of pulling out confidential information from the bank or financial institutional account holders by deceptive means.
Credit card writer
ATM as usual
Inside the boxInside the box
Cyber Stalking• The cyber follows the victim by sending
emails or entering the chat rooms frequently
Threatening • The criminals sends threatening email or
comes in contact in chat rooms with victims.
Salami Attack
• In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.
Criminal makes such programs that deducts small amounts as 2.5 rupees from all the customers accounts of a bank and deposits in his own account. In such a case no customer will approach to bank for such small amount.
Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation. It is certainly not as if we don’t face that many cyber crimes here. In fact, Pakistan is currently facing the following types of it:
Cyber Crimes in Pakistan
• Financial crimes• Cyber pornography• Sale of illegal articles• Online gambling• Intellectual property crimes• Email spoofing• Cyber stalking• Forgery
• Unauthorized access to computer systems\networks• Theft of information contained in electronic form• Virus/worm attacks• Trojan attacks• Internet time theft• Password cracking
General PreventionsGeneral Preventions
• Spam blockerSpam blocker Turn on your spam blocker. Most Internet
providers provide a spam blocking feature to prevent unwanted messages.
• Firewall protection
Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.
Anti-virus software
Make sure you have adequate anti-virus software for your computer. You also need to make sure you regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any malware, spyware, viruses and other problems.
Encryption softwareEncryption software
• Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.
Caution in providing personal Caution in providing personal informationinformation
• Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.
Secure shoppingSecure shopping
• Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud
Monitoring activitiesMonitoring activities
• Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity