E N D
CYBER CRIME BY SAJJAD AHMAD
Table of contents • Definition • Categories of Cyber Crimes • Tips To Get Protected From Cyber Crime • Pakistan Cyber Crime Wing Headquarter
Definition • Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
TYPES OF CYBER CRIME • Following are few types of Cyber Crimes • Hacking • Identity theft • Cyber Bullying • Financial fraud • Computer viruses and worms • Malicious Software • Intellectual property rights
HACKING • Trying to get into computer systems in order to steal, corrupt, or illegitimately view data. • Hacking comes from the term “hacker”, who is an expert in computer programming languages and systems. Hacking, in this sense, means using unusually complex and clever methods to make computers do things
WEBSITE DEFACEMENT • Website defacement is an attack on a website that changes the visual appearance of the site or a webpage. • This is typically the work of system crackers, who break into a web server and replace the hosted website with one of its own. • Most times, the defacement is harmless, however, sometimes it can be used as a distraction to cover up more sinister actions such as uploading malware or deleting essential files from the server.
CYBER BULLYING • Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or make unwanted advances towards someone else. • This sort of harassment can cause physical, emotional, and psychological damage to the victim. • Children are particularly vulnerable because of their trusting nature and give away their personal information.
CHILD PORNOGRAPHY • The internet evolution has made children a viable victim to the cyber crime. • children use the internet and chances have increased where they can fall victim to the aggression of pedophiles. • The easy access to pornographic contents available over the internet lowers the inhibition of the children. • Sometimes children are abuse online for someone who pays for it. • In some cases a child is blackmailed individually for sharing his/her own pornographic pictures or videos. • .These young victims are left with permanent psychological, physical, and emotional scars.
SOCIAL ENGINEERING • Social engineering is a technique used by cyber criminals to get access to confidential information. • With social engineering, attackers use manipulation and deceit to trick victims into giving out confidential information. • Sending messages that contain dangerous attachments (e.g. malware) with text that encourage people to open the attachments. • Pretending to be the main administrator of a local network and asking for the victim’s password in order to perform a maintenance check. • Asking for a user’s password for a certain Internet service, such as a blog, and later use the same password to access user’s computer. • This technique works because users often use the same passwords for many different portals.
DATA THEFT • Data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information. • Data theft is increasingly a problem for individual computer users, as well as big corporate firms. • Password cracking: Intruders can access your machine and get valuable data if it is not password-protected or its password can be easily decoded (weak password). • Laptop theft: Increasingly incidents of laptop theft from corporate organizations occur with the valuable information stored in the laptop being sold to competitors. Carelessness and lack of laptop data encryption can lead to major losses for the firm.
IDENTITY THEFT • Identity theft refers to a crime where an individual maliciously obtains and uses another individual’s personal/sensitive information to commit frauds/scams by using the stolen identity. • Mostly this crime is committed for economic gain. • NR3C (NATIONAL RESPONSE CENTRE FOR CYBER CRIME)has successfully investigated numerous cases of identity theft.
FINANCIAL FRAUD • Financial fraud is a criminal behavior in which a person uses wrong methods to trick a victim out of his money. • I this case the criminal force the victim to share the his bank record and other information through which he can easily get his worth.
COMPUTER VIRUSES AND WORMS • A virus is a malicious program that passes from one computer to another in the same way as a biological virus passes from one person to another. • Most viruses cause damage to programs and data in addition to spreading themselves. • Viruses infect existing programs to alter the behavior of programs, actively destroy data, and perform actions to storage devices that render their stored data inaccessible. • A worm is a software program that uses computer networks and security holes to replicate itself from one computer to another. • It usually performs hateful actions, such as using the resources of computers as well as shutting down the computers
INTELLECTUAL PROPERTY RIGHTS • Intellectual property (IP) theft is defined as theft of material that is copyrighted, the theft of trade secrets, and trademark violations. • A copyright is the legal right of an author, publisher, composer, or other person who creates a work to exclusively print, publish, distribute, or perform the work in public. • Intellectual property rights is concerned with any act that allows access to trade secrets, customer data, sales trends, and any private information.
TIPS TO GET PROTECTED FROM CYBER CRIME • Terminate Online Session Completely: • Closing the browser window or typing in a new website address without logging out may give others a chance of gaining access to your account information. • Always terminate your online session by clicking on the "Log out or Sign Out" button. Avoid using the option of "remember" your username and password information.
Create Backup of Important Data • Backup of all the important files whether personal or professional should be created. • Getting used to back up your files regularly is the first step towards security of your personal computer.
Protect Your Password • Try creating a password that consists of a combination of letters (both upper case and lower case), numbers and special characters. • Password should be changed regularly. • Do not share your password with other people.
Participation in Social Networking • While participating in most social networking sites do not expose the personal information to others and all of these sites have a certain intensity of control over security issues. Use privacy settings to prevent personal information being broadcast.
Use Your Own Computer: • It's generally safer to access your financial accounts from your own computer only. If you use some others computer, always delete all the "Temporary Internet Files", and clear all your "History" after logging off your account. • Update Your Software Package Regularly: • Frequent online updates are needed for all the Internet security software installed on your computer system.
Using Email • A simple rule in using this communication tool is not to open any links in emails from people you do not know. • Hackers do use E-mail as the main target seeking to steal personal information, security codes and other data.
CYBER CRIME WING HEADQUARTER Of Pakistan • ADDRESS2nd Floor, National Police Foundation Building, Mauve Area, Sector G-10/4, Islamabad, Pakistan. • PHONE +92 51 9106384 • FAX +92 51 9106383 • EMAILhelpdesk@nr3c.gov.pk • Cyber Crime Complaint Registration link: http://complaint.fia.gov.pk/