You are on page 1of 32

TOPIC: Cyber crime and its types.

PRESENTED BY:
 2324 Fatima Tariq.
 2301 Nuzhat Nosheen.
 2332 Tuba Iqbal.
 2319 Fiza Shahzad.
 2314 Alina Adil.
 2313 Hira Nadeem.
 2337 Iqra Jabeen.
PROGRAM: BSCS 3rd (Morning).
GOVT. POST GRADUATE COLLEGE OF SCIENCE FAISALABAD.

Presented To:
Mam Shella
 Cyber Crime.
 History.
 Categories.
 Types.
 Safety Tips.
 References:
 https://www.voipshield.com › the-16-most-common-types-of-
cybercrime-acts
 https://www.geeksforgeeks.org › cyber-criminals-and-its-tes
 https://www.slideshare.net › Mazhar_Nazik › cyber-crime-60577247
 https://www.researchgate.net › 274652160_Cyber_Crime_its_Categories
“Cyber Crime refers to any crime that involves a
computer\mobiles and a network. The computer
may have been used in the commission of a crime,
or it may be the target.”

Example:

• Stealing credit card information.


• Breaking into government
website.
 The first Cyber Crime ever recorded was in FRANCE during
1820.
 The person involved was JOSEPH-MARIE. He was a
textile manufacturer, he made looms. He invented looms
that can store designed.

 Black Barrels was a group that attacked and harassed


young boys from America.

 The first spam email took place in the year 1978.

 The first virus was installed on Apple computer in 1982.


Cyber Crime can be basically divided into three major
categories.

 Cyber Crime Against Person.


 Cyber Crime Against Property.
 Cyber Crime Against Government.
“Illegal access into a computer system without
permission of computer user.”

TYPES OF HACKERS:

 Black hat.
 Grey hat.
 White hat.

HACKING CRACKING.
Act of finding a clear Malicious attack on
solution to a programming computer network.
issue.
“Deliberate use of someone else’s identity.”

o Account number.
o Credit or debit card number.
o Pin number.
o ID.

WAYS:

o Phishing.
o Hacking.
o Unsecure website.
“Attracting users to visit fake website in order to
steal password, pin number and other sensitive
information.”

https://twitter.com/
https://twitter.com@example.com
“Stalk and Harass and individual, group or
organization.”

Cyber Bulling Cyber Stalking


Harassment through Harassment through adults.
electronic media.
Cyber Bulling is more harmful then Cyber Stalking.

INTENTION:
 Decrease self confidence.
 To create –ve image.
 To weak emotionally.
“This Crime occurs when a person violates copyright
unauthorized copying of software.”

TYPES:

 Soft lifting.
 Hard disk loading.
 Counterfeiting.
“ E-mail Spoofing refers to E-mail that appears to
have been originated from one source and it was a
actually sent from another source.”

TIPS:
 Take care of grammar mistake.
 Claiming that an email has come
from illegal source.
“It is an action by nation-state to penetrate an other
nation’s computers or network for the purpose of
causing damage or description.”

EXAMPLE:
 There are rumors that China uses Cyber Attack against Taiwan
“It is a form of Malware in which rogue software code
effectively holds users computers hostage until a
“Ransom” fee is paid.”
“ The politically motivated use of computers and
information and technology to cause severe
disruption or widespread fear in society.”

TYPES:
Simple unstructured.
Advanced structured.
Complex co-ordination.

EXAMPLE:
 Hacking
 Web defacing.
 Plagiarism is use of another’s original words or ideas
as though they were your own.

DEVELOP GOOD RESEARCH HABIT:


o if you copying something
word for word in your notes,
enclose this information in
quotation marks and
immediately write down
the source.
BOTS also called ZOMBIE computers.
“They are the computers that contribute to the
BOTNET networks.”

A BOTNET is a network of
compromise computers called
“ZOMBIE COMPUTERS OR BOTS",
under the control of remote
attacker

 Spyware.
 Click fraud.
“Unleashing programs that
disrupt transmission of data
or destroyed system data or
other resources.”
OR
“It is a process wherein there
is a program that perform
Malicious functions such as
extracting a users passwords
or other data or erasing the hard disk.
 Stand for DENIAL OF SERVICES ATTACK.

“It is an attack meant to shut down a machine or


network, or making it in accessible to its intended
users victims of DOS attack often target web such
as banking commerance and media companies or
Government and trade organization.”
METHOD:
 Flooding service.
 DDOS.
VIRUS:
“are Malicious computer program that attach
themselves to or infect a system or files.”

“It is a process of Malicious software that attach it


self to other software.”
FRAUD WRONGFULL.

“ using credit card number without permission possession of


actual card is also a form of credit card fraud.”

o The purpose may be to obtain


goods without paying or to
obtain unauthorized funds
from an account.
“ This term is derived from the term hi-jacking.”
“ Illegally seeking control of a website by taking over a
domain is called web jacking.”

EXAMPLE:
• Web defacement.
• Cyber Stalking.
“Data Diddling is the changing of data before or
during entry into the computer.”
 Social engineering in the context of information
security is the psychological manipulation of
people.
 social engineering attack
uses psychological
manipulation or tricks
user into making security
or giving away sensitive
information.
Cross site scripting is also
known as XSS. In XSS
Attack, a web application is
sent with a script that
activate when it is read by
an suspecting user browser
or by an application that
has not protected it self
against cross site scripting.
“ Short for Malicious software Malware refers to
software program designed to damage or do other
unwanted action on a computer system.”
“SALAMI ATTACK is a program that steals
commission someone being noticed. It also known
as SALAMI SLICING.”

EXAMPLE:
A bank worker insert a pen drive into a computer that
controls all the account of every customer then the pen drive
starts to transfer a small amount of money from every
customer account to the bank workers on account without
the customers awareness.
 Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and
chat with each other.
 Criminals use it for meeting.
 Hackers use it for discussing sharing the technique.
 Cyber Stalking to tease women and girls by send different
messages.
“ Copying the companies confidential data in order to
extort said company for huge amount.”

EXAMPLE:
o Blackmail.
o Protection.
o Schemes and certain
types of Hacking.

Extortion is not a black and white action.


1) Use a full service internet security suite.
2) Use strong passwords.
3) Keep your software update.
4) Manage your social media settings.
5) Strength your home work.

You might also like