Introduction Facts Figures Conclusion
By Syed Faris Yasrab
• A crime or and illegal activity done through computers
• It can be of several types such as:
– Bank account hacking
– Credit cards number hacking
– Virus Spreading
– Software piracy etc.
Detailed Introduction of Cyber Crimes
Cyber crimes can be mainly subdivided into two types.
Crimes done to target a node or network
Crimes done by using computer or a network, or device
Example of crimes done to target a node or
• Destroying the computer network
A criminal can destroy the computer network by spreading the
virus that can cause damage to the hardware or even software.
• Denial of service attacks
Its is in an activity that basically floods the bandwidth of user
internet so through this way his/her internet could be made slow.
Example of crimes done using nodes or
• Cyber stalking
The criminal follows the victim by sending emails,
entering the chat rooms frequently.
• Information warfare
Stealing the information from someone’s computer or
from some website using a computer.
Effects of cyber crimes on internet
• World’s biggest network is now a victim of cyber crimes.
• People have stopped shopping over the internet.
• People are afraid of hackers.
• Data in information sharing websites like facebook, orkut and others,
is now more secure.
• Fact that all of the data in information sharing website is under
control or accessible by the intelligence agencies.
• Lot of software companies like, Microsoft and Symantec are going
through great loss.
By Muhammad Farhan Sheikh
• History of Cyber Crimes and Popular Acts
• This list shows the major events in the use of
computers and computer networks to commit criminal
acts, starting in the 1970's to the present day.
• Teller at New York's Dime Savings Bank uses a
computer to embezzle over $2 million
• First electronic bulletin board system (BBS)
appears; becomes the primary means of
communication for the electronic underground..
Movie War Games introduces public to the phenomenon of
hacking (actually war-dialing).
US Secret Service gets jurisdiction over credit card and
Online hacking magazine Phrack established.
Pakistani Brain, the oldest virus created under unauthorized
circumstances, infects IBM computers.
• Section 2 - 1990-2000
Kevin Poulsen is captured and indicted for selling military
Dark Avenger releases 1st polymorphic virus.
16-year-old student, nicknamed “Data Stream”, arrested by UK
police for penetrating computers at the Korean Atomic
Research Institute, NASA and several US govt. agencies.
Section 3 - 2001- Current
Microsoft falls victim of a new type of attack against domain
name servers, corrupting the DNS paths taking users to
Microsoft's Web sites. This is a Denial of Service (DoS) attack.
Netcraft survey estimates more than 60M web sites online.
Paris Hilton’s T-Mobile phone is hacked, and photos and
celebrity private phone numbers posted on Web (Feb).
FTC settles with “Life is Good” (www.lifeisgood.com), which e
xposed credit card information due to SQL Injection flaw (Jan)
By Muhammad Farhan Sheikh
Types of Cyber Crimes
Hacking in simple terms means illegal intrusion into a computer
system without the permission of the computer owner/user.
• DENIAL OF SERVICE ATTACK
Criminal who floods the bandwidth of the victim’s network or fills his e-
mail box with spam mail depriving him of the services he is entitled to
access or provide.
• VIRUS DISSEMINATION
Malicious software that attaches itself to other software. For example:
virus, worms, Trojan horse, time bomb, logic bomb, rabbit and
bacterium are the malicious software.
• SOFTWARE PIRACY
Theft of software through illegal copy of genuine
programs for counterfeiting and distribution of products
intended to pass to the original.
• IRC CRIME
Internet relay chat (IRC) servers have chat rooms in
which people from anywhere the world can come
together and chat with each other.
Criminals use it for meeting co-conspirators.
Hackers use it for discussing their exploits / sharing the
• CREDIT CARD FRAUD
You simply have to type credit card number into
www page of the vendor for online transaction. If
electronic transactions are not secured the credit
card numbers can be stolen by the hackers.
• NET EXTORTION
Copying the company’s confidential data in
order to extort said company for huge amount.
It is technique of pulling out confidential information
from the bank/financial institutional account holders
by deceptive means.
Getting one computer on a network to pretend to
have the identity of another computer, usually one
with special access privileges, so as to obtain
access to the other computers on the network.
• CYBER STALKING
The criminal follows the victim by sending emails, entering the chat
• CYBER DEFAMATION
The criminal sends emails containing defamatory matters to all
concerned of the victim or post the defamatory matters on a website.
disgruntled employee may do this against boss).
The criminal sends threatening email or comes in contact in chat
rooms with victims.
(Any one disgruntled may do this against boss, friend or official).
• SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes would go unnoticed. Criminal make such
programs that deducts small amount like RS 2.50 per month from
the accounts of all the customers of the banks and deposit the same
in his account. In this case no account holder will approach the bank
for such small amount but criminal gains huge amount.
• SALE OF NARCOTICS
Sale and purchase through net. There are websites which offer sale
and shipment of contrabands drugs. They may use the techniques
of stenography for hiding the messages
By M.QASIM AZAM
How can we
protect ourselves from
Here we discuss some
steps use to taken to
protect from cyber crimes:
Protection of social sites
Chose difficult passwords
Purchase good antivirus soft
Don’t show yours personal
Don’t make relations through internet
Make online shopping secure.
Use your email provider's spam
Keep an eye on your credit
Report about each and
Real Cost of Cyber
Crime: only destroys the
Cyber crime is a type of crime that not
security system of a country but also its financial system.
One supporter of legislation against cyber crime, Rep.
Lamar Smith (R-Texas), stated,
Our mouse can be just as dangerous
as a bullet or a bomb.
Cyber attackers should be penalized and punished severely
and most cyber crimes have penalties reflecting the severity
of the crime committed. Although in the past many laws
against cyber crimes were insufficient, law enforcement
agencies and governments have recently proposed many
innovative plans for fighting cyber crimes.
• Cyber crime must be dealt with very
seriously because it causes a lot of
damage to businesses and the actual
punishment should depend on the type
of fraud used.
• The penalty for illegally accessing a
computer system ranges from 6
months to 5 years. The penalty for the
unofficial modification on a computer
ranges from 5 to 10 years.
Its penalties include:
• Telecommunication service theft:
• Communications intercept crime:
Information Technology Act-2000:
According to this act, different penalties are
available for different crimes. Some of the
penalties are as follows:
• Computer source document tampering
• Computer hacking
• Government protected system
by Syed Faris Yasrab
CRIME RATED COUNTRIES(TOP 5)
1. USA 23%
2. CHINA 9%
3. GERMANY 6%
4. BRITAIN 5%
5. BRAZIL 4%
Source Business Week (Symantec)
By Syed Faris Yasrab
Computer networks should be made more secure.
Fire walls should always be turned on.
2. DENIAL OF SERVICE ATTACK
Your bandwidth network should be safe and its IPs should be
hidden so no one can access it.
3. VIRUS DISSEMINATION
To protect yourself from viruses you should always keep a reliable
antivirus with latest anti virus definitions.
4. SOFTWARE PIRACY
The security companies should check from shop to shop whether
the sellers are selling the software legally or not.
5. IRC CRIME
There should be a check that none of extra presons(hackers) should
enter the chat rooms.
6. CREDIT CARD FRAUD
People should stop shopping over the internet through the credit
cards or the shopping system should be made secure enough.
7. NET EXTORTION
Each of the company should make their database more
secure( not accessible by others).
Bank’s confidential data is most important to it, so much
important that it should not be visible to even it’s all of
employs. Imagine how dangerous it would be when
hackers would be able to access it. So all of the banks
should make their banking system and its data more
private and secure.
Network’s privileges must be stricter over the entire network.
If one computer can pretend to be another computer in a
network it can visit all of the computers.
10 CYBER STALKING
Criminals can follow their targets by email s and by
frequently visiting the chat rooms, so less popular or less
secure chat rooms should not be visited and less trusted
sites should not be selected for making email addresses.
11.CYBER DEFAMATION AND THREATENING
Email spamming should be stopped over the networks. It’s
the responsibility of email service providers to keep watch
on the hackers.
Banks should make their online banking systems more
secure, because deducting such amount wont effect the
customer but the hacker.
13.SALE OF NARCOTICS
Intelligence crimes agencies against the sale of narcotics
should made their detecting more efficient.