CMS ID: 590-2017 Submitted to: Mam Maryam Khanzai DATE: 4- DEC- 2019 Introduction Definition History Categories of Cyber crime Types of Cyber crime Advantages of cyber crime Disadvantages of cyber crime Cyber crime in Pakistan Safety tip of cyber crime Conclusion The Internet is growing rapidly. It has given rise to new opportunities in every field such as entertainment , business , education or sports.
There are two sides to a coin. INTERNET also
has its disadvantages like CYBER CRIME – Illegal activity committed on the Internet. Cyber crime is an ‘umbrella’ term for lots of different types of crimes which either take place online or where technology is a means and/or target for the attack. It is one of the fastest growing criminal activities across the world, and can affect both individuals and businesses. The first recorded cybercrime took place 1820. The first SPAM email took place in 1976 when it was sent out over ARPANET. ARPANET : Advanced Research Projects Agency Network Like spam the first VIRUS was installed on an Apple Computer in 1982. A 16-year old student was arrested in UK in 1994 for doing this crime. The computer as a target
The computer as a weapon
We can categorize cyber crime in two ways. • THE COMPUTER AS A TARGET: Using a computer to attack other computer e.g. hacking, virus etc. THE COMPUTER AS A WEAPON: Using a computer to commit real world crime e.g. Cyber terrorism, credit card fraud etc. Hacking Identify theft Virus dissemination Computer vandalism Cyber terrorism Software piracy Account Hacking Blackmailing through Social Media Tracking Bank Record •Hacking in simple terms means an illegal intrusion into a computer system or network. •In many organizations they have to check their Internet security protection. It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. •MOTIVE BEHIND THE CRIME CALLED HACKERS •Motive behind the crime called hacking, power, publicity, revenge desire to access forbidden information destructive mindset wants to sell security services. o This has become a major problem with people using the Internet for cash o transactions and banking services. o In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. o It can result in major financial losses for the victim and even spoil the victim’s credit history. Malicious software that attaches itself to other software. (Virus, worms, web-jacking, email bombing etc) This type of software's employed for you to gain access to a system for you to take delicate information or even data or even triggering the destruction of software program contained in the machine. Damaging or destroying the data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate Transmitting virus. •Terrorist attacks on the internet is by distributed denial of service attacks, hate websites and hate E-mail, attacks on service network etc. •Use of internet based attacks in terrorists activities against computers/networks with the intension of causing harm. •Cyber terrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological. Software piracy is the unauthorized or illegal copying, distribution, of genuine programs or the counterfeiting and distribution of products intended to pass for the original. CYBER CRIME 1. CREATING FAKE PROFILE : Fake Profiles use is common in Students. Many cases have been registered against Fake Profiles in Cyber Cell. 2. PASSWORD HACKING : Students are taking cyber crimes just for fun or carrying out small acts such as password hacking to revenge on their teachers , friends in schools an also Morphing pictures and posting them on social networking sites to defame others. 3. PHISHING: Phishing is the act of attempting to acquire information such as username, passwords and credit card details. Phishing emails may contain links to the websites that are infected with malware. Use Anti-virus software. Insert Firewalls. Uninstall unnecessary software Maintain Backup Check security settings Stay Anonymous - choose a genderless screen name. Never give your full name or address to strangers. Learn more about Internet Privacy. Don’t give your passwords, login id’s etc to others Don’t add unnecessary people on social media. DISADVANTAGES OF CYBERCRIME: It could cause violence of privacy. It may result in to loss of data or corruption of data. Preserving and protecting electronic records/ information and/ or individual. CYBER CRIME IN PAKISTAN Cyber crime rise rapidly in Pakistan. The cyber crime of multiple kind in Pakistan have increased by five time over the past two year. According to FIA. a) 641 cases were reported the unit in 2014. b) Ratio dropped in 2015. c) 1309 cases were reported in 2016. d) In 2017 more than 2324 were registered in different categories of cybercrime. Habib bank was hacked on oct 28-2018. A gang was arrested from Sargodha. Which was involved in hacking banks and nadra data. CONCLUSION
• Cybercrime is indeed getting the recognition it deserves. However, it is
not going to restricted that easily. In fact, it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. • So, to make us a safer we must need cyber security.