You are on page 1of 5

SUBMITTED TO: MAM IRUM MATLOOB

SOCIAL MEDIA AND LIFE IN CYBERSPACE


CLASS ACTIVITY

SUBMITTED BY: HAFSA FAROOQI

REGISTRATION NO: 2019-BSE-051

SESSION: 2019-2023

DEPERTMENT OF SOFTWARE ENGINEERING


Compare
Crime is on the rise as a result of the widespread usage of the internet. Although it is a blessing for
humans to save their valuable time, the internet and computers are also used for fraud, cheating, and a
variety of other illicit actions. The globe is dealing with a slew of new crimes. Computer
manipulation, hacking into bank systems, cyber cheating, money laundering, hacking accounting
scams, credit card frauds, and accounting scams, among other crimes, have no bounds.

 Advance Fee fraud


It's a sort of deception in which businesses or individuals are asked to pay a charge in exchange for
promised stocks, services, money, or items that are never delivered.

The ELECTRONIC TRANSACTION ORDINANCE (ETO) 2002 is the law that governs advance fee
fraud. This was first introduced in the year 2002.

 Bank Fraud
In bank fraud, a bank employee sends emails to clients requesting personal information such as credit
card and debit card numbers, which he then utilizes for his own personal gain, such as unlawful
transactions, resulting in a loss to the client due to his faith in the bank employee.

The ELECTRONIC TRANSACTION ORDINANCE (ETO) 2002 is the law that governs bank fraud.
This was first introduced in the year 2002.

 Cyber Defamation
Cyber defamation is defined as the dissemination of false information about a person in cyberspace
with the intent to harm or defame that person's reputation.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the statute that governs cyber
defamation. This was first implemented in 2017.

 Cyber Pornography
The use of cyberspace to publish, distribute, or design pornography is known as cyber pornography.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs cyber
pornography. This was first implemented in 2017.

 Cyber Stalking
It's when someone uses the internet to stalk or harass them. False charges, slander, and defamation are
all involved.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs cyber stalking.
This was first implemented in 2017.

 Cyber Terrorism
Cyber terrorism is the use of the Internet to carry out or threaten violent activities that result in or
threaten the death or serious bodily harm of others in order to obtain political or ideological advantage
through fear or intimidation.
PREVENTION OF ELECTRONIC CRIMES ACTS (2016) and ELECTRONIC/CYBER CRIME
BILL ORDINANCE 2007 are the laws that govern cyber terrorism.

 Data Diddling
Data diddling is a sort of cybercrime in which data is tampered with while being input into a computer
system, most commonly by a data entry clerk or a computer virus. A fraudulent profit is obtained as a
result of the computerized processing of the altered data.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs data tampering.
This was first implemented in 2017.

 Denial of Service Attack


A distributed denial of service (DDoS) assault is a type of cyber attack. It's an attack aimed at
disrupting the targeted server's traffic. It prevents the intended users from accessing a network
resource or system.

PREVENTION OF ELECTRONIC CRIMES ACTS is the law that governs denial of service attacks
(2016). This was first implemented in 2016.

 Digital Piracy
It's also known as internet piracy, and it's the act of downloading and distributing digital copyrighted
content without permission.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs digital piracy.
This was first implemented in 2017.

 Email Bombing
The act of sending a huge number of email messages to a single email address in a short period of
time is known as email bombing. To put it another way, email bombing is a type of distributed denial-
of-service assault that floods an inbox and mail server with messages. The goal of email bombing is to
fill a user's mailbox to capacity.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs email bombings.
This was first implemented in 2017

 Email/Web Spoofing
Spam and phishing attempts use email spoofing to fool people into thinking a message came from
someone or something they know or can trust. The sender forges email headers in spoofing attacks so
that client software shows the false sender address, which most users believe at face value.

The law for the Email/Web Spoofing is ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007.
This was first implemented in 2017.

 Fake Social Media Accounts


Fake social media accounts are those that are formed using the name of another individual rather than
their own. This illegal and immoral practice takes place all throughout the world, but particularly in
Pakistan.
ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs fake social media
profiles. This was first implemented in 2017.

 Internet Time Theft


It refers to a type of theft in which an unauthorized person uses someone else's internet time. The
authorized person gains access to another person's ISP user ID and password without that person's
knowledge, either through hacking or unlawful means.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs Internet time
theft. This was first implemented in 2017.

 Online/Internet Gambling
Any type of gaming that takes place over the internet is referred to as online gambling. Virtual poker,
casinos, and sports betting are all examples of this.

The ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 governs online/internet gambling.


This was first implemented in 2017.

 Salami Attacks
A salami fraud is a method by which cybercriminals steal money or resources in small increments
such that the overall scale of the theft is undetectable.

PREVENTION OF ELECTRONIC CRIMES ACTS is the statute that governs the salami attacks
(2016). This was first implemented in 2016.

 Sale of Illegal Articles


It is a work carried out using the Internet to locate illicit articles with a single click, such as narcotics,
guns, and other articles whose information is posted on websites from which individuals can obtain
information and purchase illicit goods.

PREVENTION OF ELECTRONIC CRIMES ACTS is the law that governs the sale of unlawful
goods (2016). This was first implemented in 2016.

 Use of Encryption by Terrorists


Encryption is a method of encoding messages prior to transmission, making them unreadable if
intercepted; only the intended receiver has access to a key that allows the message to be decoded and
returned to its original legible form.

PREVENTION OF ELECTRONIC CRIMES ACTS is the statute that governs terrorists' use of
encryption (2016). This was first implemented in 2016.

 Virus / Worm Attacks


Machine viruses are little software programs that spread from one computer to another and disrupt
computer processes. It might corrupt or delete data on the victim's computer, propagate itself to other
computers via the victim's e-mail application, or even wipe the victim's hard drive clean. It will scan
and infect additional computers using this system as a host.
ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs virus/worm
attacks. This was first implemented in 2017.

 Web Jacking
In this case, a hacker falsely gains control of a website. He has the ability to alter the content of the
original site or even redirect the user to a phone, similar-looking page that he controls.

ELECTRONIC/CYBER CRIME BILL ORDINANCE 2007 is the law that governs web jacking. This
was first implemented in 2017.

You might also like