Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

GHULAM MUSTAFA

Sequence

 Cyber Ethics

 Cyber Crimes

 Common forms of Cyber Crimes

 Cyber Crime Law in Pakistan


Cyber Ethics
 Cyber ethics is the study of ethics pertaining to computers,
covering user behavior and what computers are
programmed to do, and how this affects individuals and
society. For years, various governments have enacted
regulations while organizations have defined policies
about cyber ethics
Internet Ethics
 Internet ethics means acceptable behaviour for using
Internet. We should be honest, respect the rights and
property of others on the Internet
Cyber Law

 Cyber law is the area of law that deals with the Internet's
relationship to technological and electronic elements,
including computers, software, hardware and information
systems (IS)
Cyber Crimes
 Offences that are committed against individuals or groups
of individuals with a criminal motive to intentionally harm
the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using
modern telecommunication networks such as Internet
(networks including but not limited to Chat rooms, emails,
notice boards and groups) and mobile phones
Common Forms of Cyber Crimes
 Phishing Scams

 Online Scams

 Malware

 Email Bombing

 Virus Dissemination

 Logic Bombs

 Theft

 Social Media Hack & Spamming


Phishing Scams
 Phishing scams are attempts by scammers to trick you
into giving out your personal information such as bank
account numbers, passwords and credit card numbers.
These scammers will contact you out of the blue, via email,
text message, phone call or even through social media,
pretending to be a legitimate business such as your bank,
telephone company or even internet provider

 The scammer may ask you to update them on your details


so they can refresh their systems, they may even ask you
to fill out a survey as you have the chance to win a prize at
the end. But here is where the scammer can get access to
your email address, phone number and more
Online Scams
 Online scams, are basically scams that happen online

 Whether that’s tricking you into giving out personal details


online by an ad popping up telling you you have won
something and asking for your card details to pay for
shipping. Sadly, you’ll never receive anything but you’ll
start noticing weird transactions coming from your bank
account.
Cyber Crimes
 Crimes that use computer networks or devices to advance
other ends include: Fraud and identity theft (although this
increasingly uses malware, hacking or phishing, making it
an example of both "computer as target" and "computer
as tool" crime)

 Cybercrime may threaten a person or a nation's security


and financial health
Malware Scams
 Malware is the contraction of malicious software onto your
system.
 It’s a piece of software written with the intent of causing
harm to data and devices.
 Malware is the overarching name for different types of viruses
such as a ‘trojan’ and ‘spyware’. Malware is often done
through a range of viruses that will get into your computer to
cause havoc, by damaging your computer, tablet, phone; so
the culprits can steal credit card details and other personal
information
Email Bombing
 An email bomb is more a form of internet abuse.

 Email bombing is an overload of emails directed to one


email address, this will cause the person receiving the
emails server to become sluggish or even crash.
 They may not necessarily be stealing anything from you
but having a sluggish server can be a real pain and hard
work to fix.
Logic Bombs

Logic bombs act in the same way as a virus, but are small
programs or sections of a program, which are triggered by an
event.
This event can be a certain date or time, a certain percentage
of disk space filled, the removal of a file and so on.
A program could then delete critical sections of code,
rendering your software as useless. The people who
implement logic bombs are most commonly installed by
insiders who already had access to the system
Theft
Internet theft is the broad term for any type of theft that
happens over the internet, this can be done through many
ways such as fake ads, fake emails, viruses and snooping. The
aim of internet theft is to steal your personal information and
use it to then steal money out of your bank account or make
purchases using your details
Social Media Hack & Spamming

Social media hacking is often done as a joke, like the attack


by the people who hacked Burger King’s twitter account and
many celebrities that are hacked may end up following
people they wouldn’t usually or put random statuses. Even
though for the average joe seeing a celebrity or brand post
weird stuff can be amusing, it’s an invasion of privacy.

You might also like