You are on page 1of 27

CYBER CRIMES

AND SECURITY

GROUP MEMBERS
AQIB MUMTAZ
SYED MUSHARIB
USAMA KHAN
OBJECTIVES OF TODAY’S PRESENTATION

 To provide a general awareness about cyber crimes.

 To recognize cybercrime methods.

 To know the importance of cyber laws.

 To learn how to keep away from being a victim.


WHY SHOULD WE KNOW ABOUT CYBER CRIME??

 In this Tech-savvy world of 21st century everyone is engaged with


internet, through Whatsapp, Twitter, Facebook, internet banking and
lots of other platforms are there.

 And some criminal minded people commit crimes here, which are
included under cyber crimes.

 So we should be aware about crimes happening around in the cyber


space.
WHAT ARE CYBER CRIMES??

SIMPLE THEORY
 When you purchase a home it comes with a door and locks you
always ensure that the door or the lock exists and work properly.
You may even purchase security systems.

 Well, why would you not secure your investments?

 Likewise, your system is your home and security tools are your
lock or door.

 So if someone breaches into home(system), accesses all your


personal account and tempers your data, is the criminal who is
committing the crime.

 We can say more precisely that cyber crime is an illegal activity


committed on the internet.
TECHNICAL DEFINITION OF CYBER CRIME.

 Cyber crime is any criminal activity that involves a computer,


networked device or any other network.

 This includes anything from downloading illegal music files to


stealing millions of dollars from online bank accounts. Cyber crime
also includes non-monetary offenses such as creating and disturbing
viruses on other computers or posting confidential business
information on the internet.
EVOLUTION OF CYBER THREATS

The first cyber attack began with good intentions and ended with
unexpected consequences. In 1988, Cornell University graduate student,
Robert Tappan Morris, developed a program to assess the size of the
internet. But unfortunately the program went horribly wrong.

In total, approximately 6,000 computers (10% of the entire internet at the


time) were damaged. The estimated cost of repairing the effects of the
program range between $100,000 and $1 million or between $201,000 and
$2.9 million adjusted for inflation.

Now, we have a variety of cyber threats including viruses, breaking


websites, malicious codes, worms and trojens, identity theft, organized
crimes, DDoS etc.
Their details will be discussed next.
COMPUTER VIRUSES

 A computer virus is a software program which has the ability to make


copies of itself, which attack other files, programs and applications on
its own.

 The first publically wide-spreaded virus was introduced by two


Pakistani brothers in 1986.

 Computer viruses are of three types:


• Boot virus
• Program virus
• Micro virus

 Virus attacks can be prevented by using any antivirus software.


MALICIOUS CODES

Malicious code is the kind of harmful computer code or web script


designed to create system vulnerabilities leading to security breaches,
information and data theft, and other potential damages to files and
computing systems.
COMPUTER WORMS

 A computer worm is a standalone malware


computer program that replicates itself in
order to spread to other computers.

 Now , a question may arise in your mind,


both viruses and worm can replicate so
what makes them different from each
other?

 The difference between a virus and worm


is that virus has to be injected in the system
while worm works on its own without any
external aid.
TROJANS

 A Trojan horse, or Trojan, is a type of software that looks authentic and


harmless but can take control of your computer.

 Once activated, Trojans can enable cyber-criminals to spy on you, steal


your sensitive data, and gain backdoor access to your system. These
actions can include:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or computer networks

 Unlike computer viruses and worms, Trojans are not able to self-
replicate.
IDENTITY THEFT

Identity theft, also known as identity


fraud, is a crime in which an imposter
obtains key pieces of your personal
information, such as Social Security or
driver's license numbers, credit and debit
card numbers, national identity card
number, social media logins etc. in order
to impersonate someone else.
DISTRIBUTED DENIAL OF SERVICE ATTACK

A distributed denial-of-service attack (DDoS attack) is a cyber-attack in


which the perpetrator seeks to make a machine or network resource
unavailable to its intended users by temporarily or indefinitely
disrupting services of a host connected to the Internet.
Do you know??
What percentage of the total internet
on the World Wide Web is
accessable to public?
INTERESTING FACT

The internet you access in daily lives is actually a part of surface web of World Wide Web.
Which is totally the 4% of the internet.
BASIC CATEGORIES

Cyber crimes are generally divided into 3 categories.

 Against a person.

 Against some property.

 Against government.
CATEGORIZATION OF CYBER CRIMES

 THE COMPUTER AS A TARGET :


using a computer to attack other computers .

 THE COMPUTER AS A WEAPON:


using a computer to commit real world crimes .
TYPES OF CYBER CRIMES.

 HACKING.
 DENIEL OF SERVICES ATTACKS.
 VIRUS DISSEMINATION.
 COMPUTER VANDALISM.
 CYBER TERRORISM.
 SOFTWARE PIRACY.
 PHISHING AND INTERNET FRAUDS.
HACKING

 Hacking simply means breaching illegally into


some ones computer, network, phone.

 Hackers also break into websites to hijack


certain operations and data .SQL injections are
the most common attacks against websites and
sometimes the server is also hacked.
 Hackers use the methods of MITMs and RATs
to gain control over the user to steal data or to
manipulate it.
DENIEL OF SERVICES ATTACK

 The distributed denial of services attack generally refers to the flooding


of requests to some open ports on a server.
VIRUS DISSEMINATION

 Malicious software's that attaches itself to


other software's.

 Virus, web jacking, email bombing, worms


trojans etc.
COMPUTER VANDALISM

Computer vandalism refers to destroying data rather than stealing it .


CYBER TERRORISM

 Use of internet for terrorist activates.


 ISIS have been doing it recently.
SOFTWARE PIRACY

 Theft of software through the illegal copying of genuine programs.

 Usually done with paid software to make them free , this practice is
usually done in third world countries.
SOCIAL ENGINEERING ATTACKS

Phishing and internet frauds are usually said to be a part of social


engineering attacks .
SAFETY TIPS TO CYBER-CRIME

 Use Antivirus Software

 Insert Firewalls

 Uninstall unnecessary software

 Maintain backup

 Check security settings

 Can use Linux operating system

 iOS is a better option.


Thank You!!
Any Questions??

You might also like