0% found this document useful (0 votes)
10 views20 pages

Lect#2 PE

The document discusses computer crimes, also known as cyber crimes, which involve unlawful access to computer systems and the internet. It covers definitions, history, categories, types of cyber crimes, and relevant laws, emphasizing the importance of cyber security and safety tips. Key types of cyber crimes include hacking, credit card fraud, and software piracy, along with preventative measures and legal implications.

Uploaded by

Aliza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views20 pages

Lect#2 PE

The document discusses computer crimes, also known as cyber crimes, which involve unlawful access to computer systems and the internet. It covers definitions, history, categories, types of cyber crimes, and relevant laws, emphasizing the importance of cyber security and safety tips. Key types of cyber crimes include hacking, credit card fraud, and software piracy, along with preventative measures and legal implications.

Uploaded by

Aliza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Computer Crimes

GC-108

Sidra Hameed
2 Contents

 Introduction
 Definition
 History
 Categories
 Types
 Cyber Law
 Imprisonment and fine
 Cyber Security
 Safety Tips
3 Introduction

 Computer crime or Cyber Crime is criminal activity


that involves unlawful access to computer systems.
 Cyber crime is an illegal activity committed on the
internet.
4 Definition

 Crime committed using a computer and the internet


to steal data or information.
 Example:
 Stealing credit card information
 Breaking into government website
5 History

 In 1820, Joseph-Marie Jacquard, a textile manufacturer in


France, produced the loom.
 This device allowed the repetition of a series of steps in the
weaving of special fabrics.
 This resulted in a fear amongst Jacquard's employees that
their traditional employment and livelihood were being
threatened.
 They committed acts of sabotage to discourage Jacquard
from further use of the new technology.
 This is the first recorded cyber crime!
6 Categories of Cyber Crime

 The Computer as a Target


 Using a computer to attacks other computer.
e.g. Hacking etc.

 The Computer as a Weapon


 Using a computer to commit real world crime.
e.g. Cyber terrorism, credit card fraud etc.
7 Types of Cyber Crime

There are many types of cyber crimes few of them


are:
 Hacking
 Credit Card Fraud
 Virus Dissemination
 Cyber Terrorism
 Computer Vandalism
 Software Piracy
 Spoofing
8 Hacking

 Hacking is a source of threat to security in


computer.
 It is defined as unauthorized access to the
computer system by a hacker.
 Types Of Hackers:
 Black Hat Hackers
 Gray Hat Hackers
 White Hat Hackers
9 Credit Card Fraud

 When an individual uses another individuals


credit card for personal reasons while the
owner of the card and the card issuer are not
aware of the fact that the card is being used.
 This problem occur while using online banking,
shopping.
10 Virus

 Malicious software that attaches itself to other software is known as


virus.
Things To Consider:
 Keep a regular backup of your important files.
 Be aware that most current viruses arrive as e- mail attachments.
 Be very aware of any attachment that has any of the following file
extensions:
.exe .vbs .scr .vbe .com .bat .shs .cpl .dll .ocx .pif .drv .lnk .bin .sys .eml .
nws
 It is impossible for any anti-virus program to protect against all new
viruses, so your best protection is to be very cautious about opening
e-mail attachments.
11 Cyber Terrorism

 Use of Internet based attacks in terrorist


activities.
 There are laws to prevent cyber crimes.
 For example:
 Many persons has sent to jail recently in
Rawalpindi for blackmailing on the social
media.
12 Computer Vandalism

 Damaging or destroying data rather than


stealing.
 Transmitting virus.
 Ethical way to deal with computer vandalism
is not to give permissions to software without
reading the agreements.
13 Software Piracy

 Theft of software through the illegal copying of


genuine programs.
 Nowadays, no one is ready to use the original
software’s as they are too costly.
 Some of the organizations are now doing a
serious attempt against the people who are
involved in the distribution of pirated
software’s.
14 Spoofing

 The word "spoof" means to trick, or deceive.


 Therefore, in the IT world, spoofing refers tricking or
deceiving computer systems or other computer users.
 This is typically done by hiding one's identity or faking
the identity of another user on the Internet.
 Spoofing can take place on the Internet in several
different ways:
 E-mail Spoofing
 Fake Identity
15 Spoofing(contd.)

 Always keep your computer system updated with a


good anti virus software.
 Do not open the mail if you do not recognize the
sender.
 Ignore any mails with comes without sender names.
 Ignore any mail which has your name in the sender
details.
 Do not open any mails if it has only a link in the body
of the message.
02/13/2025
16 Cyber Laws in Pakistan

 There are different laws in Pakistan.


 These laws not only deal with crime of
Internet.
 These deal with all dimensions related to
computer & networks.

02/13/2025
17 Imprisonment and Fine

02/13/2025
18 Cyber Security

 Cyber security is a branch of computer


security specifically related to the Internet.
 It's objective is to establish rules and measure
to use against attacks over the Internet.

02/13/2025
19 Safety Tips

 Use antivirus software’s.


 Uninstall unnecessary software.
 Maintain backup.
 Check security settings.
 Never give your full name or address to
strangers.
 Learn more about Internet privacy.
02/13/2025
20

Thank You!

02/13/2025

You might also like