0% found this document useful (0 votes)
70 views15 pages

Group Intro: Muhammad Waseem BSCS-F15-R12 Abdul Qudoos BSCS-F15-R25 Muhammad Farhan Haider BSCS-F15-R31

This document provides an introduction to a group project on cyber crime and security. It outlines various types of cyber crime including hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. It also discusses the history of cyber crime, defines cyber crime, and provides tips for internet safety and security such as using antivirus software and maintaining backups. The document concludes by noting both the destructive and constructive potential of technology.

Uploaded by

Muhammad Waseem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views15 pages

Group Intro: Muhammad Waseem BSCS-F15-R12 Abdul Qudoos BSCS-F15-R25 Muhammad Farhan Haider BSCS-F15-R31

This document provides an introduction to a group project on cyber crime and security. It outlines various types of cyber crime including hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. It also discusses the history of cyber crime, defines cyber crime, and provides tips for internet safety and security such as using antivirus software and maintaining backups. The document concludes by noting both the destructive and constructive potential of technology.

Uploaded by

Muhammad Waseem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

GROUP INTRO:

MUHAMMAD WASEEM BSCS-F15-R12


ABDUL QUDOOS BSCS-F15-R25
MUHAMMAD FARHAN HAIDER BSCS-F15-R31
CYBER CRIME AND SECURITY

If we can defeat them sitting at home……who needs to fight


with tanks and guns!!!!
CONTENTS:

• Introduction.
• Definition.
• History.
• Types of cyber crime.
• Safety And Security.
• Conclusion.
INTRODUCTION

• The internet in WORLD is growing rapidly. It has given rise to new


opportunities in every field we can think of be it entertainment, business,
sports or education.

• There’re two sides to a coin. Internet also has it’s own disadvantages is
Cyber crime- illegal activity committed on the internet.
DEFINING CYBER CRIME

• Crime committed using a computer and the internet to steal data or


information.
• Illegal imports.
• Malicious programs.
HISTORY:

The first recorded cyber crime took place in the year 1820.
TYPES OF CYBER CRIME

• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Software Piracy
HACKING: DENIAL OF SERVICE ATTACK:

• Hacking in simple terms means an • Act by the criminal, who floods


illegal intrusion into a computer the bandwidth of the victims
system and/or network. network.
• Is his e-mail box with spam mail
depriving him of the services.
CONTINUED…

VIRUS DISSEMINATION COMPUTER VANDALISM

• Malicious software that attaches • Damaging or destroying data


itself to other software. (virus, rather than stealing.
worms, Trojan Horse, web jacking, • Transmitting virus
e-mail bombing etc.
CONTINUED…

CYBER TERRORISM SOFTWARE PIRACY

• Use of Internet based attacks in • Theft of software through the illegal


terrorist activities. copying of genuine programs.
• Technology savvy terrorists are using • Distribution of products intended to
512-bit pass for the original.
• encryption, which is impossible to
decrypt.
SAFETY TIPS FOR CYBER CRIME

• Use antivirus software’s.


• Uninstall unnecessary
• Maintain backup.
• Check security settings.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
CYBER SECURITY:

• Internet security is a branch of computer security specifically related to


the Internet.

• It's objective is to establish rules and measure to use against attacks over
the Internet.
ADVANTAGES OF CYBER SECURITY

• Defend us from critical attacks.


• Browse the safe website.
• Internet security process all the incoming and outgoing data on our
computer.
CONCLUSION:

• Technology is destructive only in the hands of people who do not realize that
they are one and the same process as the universe.

For Example:
• Dark Web
• Cracking
• Hacking
THANKS

You might also like