Professional Documents
Culture Documents
AND SECURITY
GROUP MEMBERS
AQIB MUMTAZ
SYED MUSHARIB
USAMA KHAN
OBJECTIVES OF TODAY’S PRESENTATION
And some criminal minded people commit crimes here, which are
included under cyber crimes.
SIMPLE THEORY
When you purchase a home it comes with a door and locks you
always ensure that the door or the lock exists and work properly.
You may even purchase security systems.
Likewise, your system is your home and security tools are your
lock or door.
The first cyber attack began with good intentions and ended with
unexpected consequences. In 1988, Cornell University graduate student,
Robert Tappan Morris, developed a program to assess the size of the
internet. But unfortunately the program went horribly wrong.
Unlike computer viruses and worms, Trojans are not able to self-
replicate.
IDENTITY THEFT
The internet you access in daily lives is actually a part of surface web of World Wide Web.
Which is totally the 4% of the internet.
BASIC CATEGORIES
Against a person.
Against government.
CATEGORIZATION OF CYBER CRIMES
HACKING.
DENIEL OF SERVICES ATTACKS.
VIRUS DISSEMINATION.
COMPUTER VANDALISM.
CYBER TERRORISM.
SOFTWARE PIRACY.
PHISHING AND INTERNET FRAUDS.
HACKING
Usually done with paid software to make them free , this practice is
usually done in third world countries.
SOCIAL ENGINEERING ATTACKS
Insert Firewalls
Maintain backup