Cyber Crime & Security: Course: Introduction To New Media Course Code: NM401 Course Instructor: Khansa Tarar
Cyber Crime & Security: Course: Introduction To New Media Course Code: NM401 Course Instructor: Khansa Tarar
4/2/15
CONTENTS
Introduction.
Definition.
Cyber threat evolution.
Categories of cyber crime.
Types of cyber crime.
Prevention.
Security.
INTRODUCTION
The internet in Pakistan is growing
rapidly. It has given rise to new
opportunities in every field we can think
of be it entertainment, business, sports or
education.
Therere two sides to a coin. Internet also
has its own disadvantages is Cyber
crime- illegal activity committed on the
internet.
DEFINING CYBER
CRIME
Crime committed using a computer and
the internet to steal data or information.
Illegal imports.
Malicious programs.
Cyber crime
CYBER THREAT
EVOLUTION
CATEGORIZATION OF CYBER
CRIME
TYPES OF CYBER
CRIME
Hacking
Denial of service attack
Virus Dissemination
Computer Vandalism
Cyber Terrorism
Software Piracy
HACKING
Hacking in simple terms means an
illegal intrusion into a computer system
and/or network.
DENIAL OF SERVICE
ATTACK
Act by the criminal, who floods the
bandwidth of the victims network.
Is his e-mail box with spam mail
depriving him of the services.
VIRUS DISSEMINATION
Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing
etc.)
COMPUTER
VANDALISM
Damaging or destroying data rather
than stealing.
Transmitting virus
CYBER TERRORISM
Use ofInternetbased attacks
interroristactivities.
Technology savvy terrorists are using
512-bit encryption, which is impossible
to decrypt.
SOFTWARE PIRACY
Theft of software through the illegal
copying of genuine programs.
Distribution of products intended to pass
for the original.
Financial fraud:
Sabotage of data/networks:
Theft of proprietary information:
11%
20%
System penetration from the outside:
25%
Denial of service:
27%
Unauthorized access by insiders:
71%
Employee abuse of internet privileges
17%
CYBER SECURITY
Internet securityis a branch
ofcomputer security specifically related
to theInternet.
It's objective is to establish rules and
measure to use against attacks over the
Internet.
ADVANTAGES OF CYBER
SECURITY
Defend us from critical attacks.
Browse the safe website.
Internet security process all the
incoming and outgoing data on our
computer.
CONCLUSION
Technology is destructive only in the hands
of people who do not realize that they are
one and the same process as the universe.