29

Cyber crime presentation by HuNnY ButT

Embed Size (px)

DESCRIPTION

www.facebook.com/hunnybutt9t6

Citation preview

Page 1: Cyber crime presentation by HuNnY ButT
Page 2: Cyber crime presentation by HuNnY ButT

Cyber Crime

Page 3: Cyber crime presentation by HuNnY ButT

Group Members•Danish Munir

•Muhammad Soban•Tayyab Raza•Muhammad Ali•Ali Raza•Muhammad Waqas•Muhammad Nabeel•Hamza Khalid

Page 4: Cyber crime presentation by HuNnY ButT

Contents•Introduction & History•Types of Cyber Crime•Types of viruses•Protect Computers•Cyber Crime in Pakistan•Cyber War•Conclusion

Page 5: Cyber crime presentation by HuNnY ButT

Cyber :The term is defined as computers connected to internet.

Crime: Illegal activities

Computer crime, or cybercrime, refers to any crime that involves a computer and a network

It is a criminal activity committed on the Internet

Page 6: Cyber crime presentation by HuNnY ButT

Cyber crime offenses against the information technology infrastructure

Such conducts includes: • Illegal access• Illegal Transactions • System interference• Data interference• Misuse of devices• Fraud

Page 7: Cyber crime presentation by HuNnY ButT

History

The first spam email took place in 1978 when it was sent out over the Arpanet.

The first virus was installed on an Apple computer in 1982

16-year-old student, nicknamed “Data Stream”, arrested by UK police(1994)

FBI's e-mail system was hacked (Feb,2005)

Travelling documents of NATO forces were hacked in Afghanistan.

Page 8: Cyber crime presentation by HuNnY ButT

• Hacking• Email bombing• Data diddling• Denial of Service attack• Malware attacks• Identity Theft

Types of Cyber Crime

Page 9: Cyber crime presentation by HuNnY ButT

Hackinghacking refers to finding out weaknesses in an established system and exploiting them. It could involve the power of the internet and specialized programming skills to bypass sophisticated security systems.

Page 10: Cyber crime presentation by HuNnY ButT

E-Mail Bombing:Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers.

Data Diddling:

This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

Page 11: Cyber crime presentation by HuNnY ButT

Denial of Service:This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.

Malware Attacks:malicious attacks are did through malicious programs , such as a virus, which is specifically designed to disrupt or damage a computer system.

Page 12: Cyber crime presentation by HuNnY ButT

Identity Theft:

This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.

Page 13: Cyber crime presentation by HuNnY ButT

• Use anti-virus software and firewalls – keep them up to date.

• Keep your operating system up to date.

• Don't open emails or attachments from unknown sources.

• Use hard-to-guess passwords.

• Don't share access to your computers with strangers.

Preventions

Page 14: Cyber crime presentation by HuNnY ButT

Back-up your computer data on disks or CDs often.

If you have a Wi-Fi network, password protect it.

Do not open suspicious files/emails .

Verify ActiveX/Java prompts .Avoid using P2P programs .Avoid downloading freeware.If attacked, disconnect the

network

Page 15: Cyber crime presentation by HuNnY ButT

Cyber crime

inPakistan

Page 16: Cyber crime presentation by HuNnY ButT
Page 17: Cyber crime presentation by HuNnY ButT
Page 18: Cyber crime presentation by HuNnY ButT
Page 19: Cyber crime presentation by HuNnY ButT
Page 20: Cyber crime presentation by HuNnY ButT
Page 21: Cyber crime presentation by HuNnY ButT
Page 22: Cyber crime presentation by HuNnY ButT
Page 23: Cyber crime presentation by HuNnY ButT
Page 24: Cyber crime presentation by HuNnY ButT

VS

Cyber War

Page 25: Cyber crime presentation by HuNnY ButT
Page 26: Cyber crime presentation by HuNnY ButT

For the Indian and Pakistani kids, cyber space is the new war front and August presumably the appropriate time for their reign of cyber terror.

Pakistani Hackers hack Indian websites and in return they hack some of Pakistan’s.

Page 27: Cyber crime presentation by HuNnY ButT

The cyber war between India and Pakistan started in May 1998, when Pakistani hackers attacked Bhabha Atomic Research Center’s website to somehow proclaim their technological supremacy. In November 2010, a group called ‘The Indian cyber army defaced a number of important Pakistani national websites, including that of the Pakistan Army in their efforts to avenge the Mumbai attacks.

And throughout the year these geniuses continue to hack websites in the name of national pride.

Page 28: Cyber crime presentation by HuNnY ButT

It seems evident that the cyber war between Pakistan and India is not state-sponsored, but state agencies have emerged as constant victims of cyber-attacks over the years. cybercrime is now being considered as an effective way of expressing patriotism.Youth of both countries should try to use their efforts in positive sense.

conclusion

Page 29: Cyber crime presentation by HuNnY ButT

#include<stdio.h>main(){printf(“Thanks For Your Attention!”);getch();}