Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh

Slides:



Advertisements
Similar presentations
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Technical Implementation: Security Risks
Securing Information Systems
CYBER CRIME fb MANIA & TEACHERS
Add video notes to lecture
The Disadvantages of ICT
Done by… Hanoof Al-Khaldi Information Assurance
To Know what Cyber crime is
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
IT Security  .
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Best Way To Secure U R Self
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
Faculty of Science IT Department By Raz Dara MA.
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME fb MANIA & TEACHERS
Computer Security By: Muhammed Anwar.
Lesson 2- Protecting Yourself Online
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Submitted By: Arslan Javaid Bsmc02143003 Submitted to: Sir Farrukh NEW MEDIA Submitted By: Arslan Javaid Bsmc02143003 Submitted to: Sir Farrukh

Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crime do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desire.

CYBER CRIME Illegal activity committed on the internet. Crimes committed using a computer. Illegal activity committed on the internet.

DEFINITION Unlawful act wherein computer is either a tool or a target or both. Acts that are punishable by the information technology act.

HISTORY First recorded in 1820 In 1820 Joseph-Marie Jacquard, a textile manufacturer in France produced the loom.

CYBER CRIMES PERCENTAGE Financial fraud. 11% Sabotage of data 17% Information theft 20% System penetration from outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%

CATEGORIES Two: Computer as a tool. Computer as a target.

TYPES Financial crimes Sale of illegal articles Online gambling Email spoofing Forgery Cyber stalking Denial of service attacks

Information theft Email bombing Vandalism Malware Software piracy Password cracking Viruses Physically damaging a system

CRIMINALS Kids Organized hacktivists Disgruntled employees Professional hackers

CYBER THREATS Cyber Extortion: Where criminal gangs threat to close down internet based business if protection money was not paid. Information Theft: When a computer is infiltrated with purpose of obtaining information relating user. Fraud: Fraud has many guises on internet, from famous e-mails promising millions in advance fees to sale of quality goods.

CYBER THREATS Phishing : Obtaining of financial information from victim such as a bank record or credit card details by sending what look like authentic messages. Vishing: It is also the obtaining financial information but through voice messages telling the victim to comply immediately.

CYBER THREATS IN PAKISTAN According to report of “The Express Tribune”. Cyber Stalking: The repeated use of electronic communication to frighten someone for example sending threatening e-mails. Forgery(Fraud): The process of making or creating an alteration of genuine documents with the intent to defraud. Internet Time Theft: The use by an unauthorized person of the internet hours paid by another person. Logic Bomb: A piece of code intentionally inserted into a program that will set off malicious function when specified conditions are met.

Cyber Threats in Pakistan Piracy: Illegal use or reproduction or distribution of another’s software. Identity Theft : Identity theft is where cyber criminal steals their victim’s identity and then transacts usually via internet in name of victim.

Cyber security

WHAT TO UNDERSTAND??? What is the meaning of word “cyber”? Why there is need of cyber security? What are the security problems in cyber field? How to implement and maintain security of a cyber field around us?

INTRODUCTION The term cyber security is used to refer to the security offered through online service to protect your online information. Security problems almost always stem from a mix of technical, human and organizational causes.

CYBER Combining form relating to information technology, the internet and virtual reality.

NEED It is necessary since it helps in security data from thefts such as theft or misuse, it also safeguards from viruses.

PROBLEMS Viruses Hackers Malware Password cracking

ADVENTAGES Defend from critical attacks Help in browse safe websites Defend from hacks and viruses It processes all the incoming and outgoing data on computer

OBJECTIVE OF CYBER SECURITY To establish rules and measures to use against attacks over the internet

CYBER CRIME LAW IN PAKISTAN

Unfortunately Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation.

National Response Center for Cyber Crime (NR3C) Cyber crime in Pakistan is growing rapidly with the exponential growth in usage of mobile phones and penetration of internet. It is also observed that criminals are using latest technology to execute their crimes. These criminals are involved in financial matters, information stealing and at times even in terrorism. To counter their activities National Response Center for Cyber Crime (NR3C) was formed which is able to monitor, track and catch all such criminals.

PECO(Prevention of Electronic Crimes Ordinance) On December 31, 2007, the then president Pervez Musharraf promulgated a law called The Prevention of Electronic Crimes Ordinance (PECO) 2007 which lapsed in 2010. The new PECO 2012 is still under debate in the National Assembly and is being tweaked / redrafted by the Standing Committee. The complaint of fake Facebook profiles is the most rampant complaint where people created fake a profile of any person.

Use antivirus software Insert firewalls Uninstall unnecessary software Maintain backup Check security settings Never give your full name or address to strangers Learn more about privacy

CONCLUSION Its need of time to spread awareness of cyber security. I hope that my presentation will be helpful for our audience to improve their knowledge about cyber security and to overcome several security issues on their computer operations.