Professional Documents
Culture Documents
Agenda
Introduction & History Cyber Criminals Types of Cyber Crime Cyber Crime in Pakistan Protect Computers Conclusion
Cyber Crime
Crime => Illegal activities Cyber => Characteristic of the culture of computers
Computer crime, or cybercrime, refers to any crime that involves a computer and a network
It is a criminal activity committed on the Internet .
Cyber Crime
Cyber crime offenses against the information technology infrastructure. Cyber Crime <=> Cyber Space <=> Net Crime
Such conducts includes: Illegal access Illegal Transactions System interference Data interference Misuse of devices Fraud
History
The first spam email took place in 1978 when it was sent out over the Arpanet. The first virus was installed on an Apple computer in 1982 16-year-old student, nicknamed Data Stream, arrested by UK police(1994)
History
Denial of Service (DoS) attacks by Mafia Boy on eBay, Yahoo! and other popular sites (2000) FBI's e-mail system is hacked (Feb,2005) Travelling documents of NATO forces were hacked in Afghanistan.
Virus Attack
a) The bill deals with the electronic crimes included, cyber terrorism, criminal access, electronic fraud, electronic forgery, misuse of electronic system or electronic device, misuse of encryption etc. b) Most of the young generation is involved in this crime(CCU) c) It proposes seven years punishment on charges of electronic fraud and electronic forgery and would not have the right of bail. d) Hacking of ATM card numbers & bank accounts are on the rise in paksitan
Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Don't share access to your computers with strangers Back-up your computer data on disks or CDs often If you have a Wi-Fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Never send your credit card number to any site that is not secured. Avoid sending any photograph online particularly to strangers.
Conclusion
Do not open suspicious files/emails Verify ActiveX/Java prompts Avoid using P2P programs Avoid downloading freeware If attacked, disconnect the network. Do not turn off the computer
World from Cyber Crime If you spend more on coffee than on IT security, you will be hacked. Whats more, you deserve to be hacked. White House Cybersecurity Advisor, Richard Clarke