computer hacking

18
Cyber crime Submitted From: Imran Khalid Roll No. 3042 BSIT Eve 1 st Submitted To: Inam ull haq University of Education Okara Campus. University of Education Okara Campus 1

Upload: university-of-educationlahore

Post on 15-Jul-2015

74 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Computer Hacking

Cyber crime

Submitted From:

Imran Khalid

Roll No. 3042

BSIT Eve 1st

Submitted To:

Inam ull haq

University of Education Okara Campus.

University of Education Okara Campus

1

Page 2: Computer Hacking

Outline: Cyber Crime

Reasons for Cyber crimes

Types Of Cyber Crime

Cyber Crime in Pakistan

Growth Rate of Cyber Crime In Pakistan

Country Distribution

University of Education Okara Campus

2

Page 3: Computer Hacking

What Is Cyber Crime:

"It is a criminal activity committed on the internet.

This is a broad term that describes everything from

electronic cracking to denial of service attacks that

cause electronic commerce sites to lose money".

University of Education Okara Campus

3

Page 4: Computer Hacking

University of Education Okara Campus

4

Page 5: Computer Hacking

Reasons for Cyber crimes

Capacity to store data in comparatively small space

Easy to access

Complex

Negligence

Loss of evidence

University of Education Okara Campus

5

Page 6: Computer Hacking

Types of Cyber Crime

Hacking

Denial of Services Attack

Phishing

Spoofing

University of Education Okara Campus

6

Page 7: Computer Hacking

University of Education Okara Campus

7

Page 8: Computer Hacking

What is Hacking

Computer hacking is the process

to access your computer or

device illegally.

University of Education Okara Campus

8

Page 9: Computer Hacking

University of Education Okara Campus

9

Page 10: Computer Hacking

Type of Hacking

White hacker

Black hacker

Grey hacker

University of Education Okara Campus

10

Page 11: Computer Hacking

Denial of Services Attack

It is use to shut down the network

In computing a DOS attack I s an attempt

to make or machine or network resource

unavailable to its intended users.

University of Education Okara Campus

11

Page 12: Computer Hacking

Phishing

is the attempt to acquire sensitive information

such as usernames, passwords, and credit card

details (and sometimes, indirectly, money) by

masquerading as a trustworthy entity in an

electronic communication.

University of Education Okara Campus

12

Page 13: Computer Hacking

University of Education Okara Campus

13

Page 14: Computer Hacking

Spoofing

is the creation of TCP/IP packets using

somebody else's IP address. Routers use the

"destination IP" address in order to forward

packets through the Internet, but ignore the

"source IP" address. That address is only used by

the destination machine when it responds back

to the source.

University of Education Okara Campus

14

Page 15: Computer Hacking

Cyber Crime in Pakistan

Mostly used to hacked Web sites in

Pakistan

Attacks on banks

Other hacking

University of Education Okara Campus

15

Page 16: Computer Hacking

Country Distribution

University of Education Okara Campus

16

Page 17: Computer Hacking

University of Education Okara Campus

17

Page 18: Computer Hacking

University of Education Okara Campus

18