“In the name of Allah, the most gracious, the most merciful.
”
CYBER
SECURITY
Table of Content
01 02
Introduction Cyber Crime
06 Cyber 03
Conclusion Security Reason of Cyber Crime
05 04
Cyber Security in Pakistan Types of security threats
Introduction
“Cyber” is a combining form relating to information technology, the Internet, and
virtual reality.
The term cyber security is used to refer to the security offered through on-line services
to protect your online information. With an increasing amount of people getting
connected to Internet, the term cyber security is used to refer to the security offered
through on-line services to protect your online information.
Cyber security secure data from threats such as data theft or misuse, also safeguards
your system from viruses.
Cyber Crime
The term cyber crime is used to describe a unlawful activity in which
computer or computing devices such as smartphones, tablets, Personal
Digital Assistants(PDAs), etc. which are stand alone or a part of a
network are used as a tool or/and target of criminal activity.
Classification:
Insider Attack.
External Attack.
Reasons for Commission of Cyber Crimes
Money
Revenge
Fun
Recognition
Anonymity
Cyber Espionage
Types Of
Cyber Security
Threats
Phishing
It is the practice of sending fraudulent emails that resemble emails from reputable
sources.
Solution:
Protect your computer by using security software & your accounts
by using multi-factor authentication.
If you responded to a phishing attack then update your computer
security Software & run scan.
Types of Phishing
Spear Phishing Whaling Pharming
Attack on Specific Attack senior executives leverages DNS cache
companies and/or and stakeholders within an poisoning to capture user
individuals. organization. credentials by a fake login
landing page.
Malware
Malware uses a vulnerability to breach a network when a user clicks a “planted”
dangerous link or email attachment, which is used to install malicious software
inside the system.
Solution:
Install Anti-Virus/Malware Software.
Keep Your Operating System Current.
Secure Your Network.
Don’t Use Open Wi-Fi.
Best malware removal if malware breach in system; Avast Internet Security,
Bitdefender Antivirus, [Link].
Types of Malware
Viruses Worms Spyware
Trojans Ransomware
Man in the Middle Attack
Occurs when an attacker intercepts a two-party
transaction, inserting themselves in the middle.
From there, cyber attackers can steal and
manipulate data by interrupting traffic.
Solution:
Encryption & VPNs
Denial of Service Attack
DOS attacks work by flooding systems, servers,
and/or networks with traffic to overload
resources and bandwidth. This result is
rendering the system unable to process and
fulfill legitimate requests.
Solution:
Get help recognizing attacks.
Contact your Internet Service provider
Password Attack
Password attackers use a myriad of methods to identify an individual
password, including using social engineering, gaining access to a password
database, testing the network connection to obtain unencrypted passwords,
or simply by guessing.
Solution:
Account lockout best practices and two-factor authentication are very useful
at preventing a password attack.
Cyber crime
&
security in Pakistan
“ If we can defeat
them sitting at
home...who needs to
fight with tanks and
guns. ”
Cyber Crime Rises Rapidly in Pakistan
The cyber crimes of multiple kinds in Pakistan
have increased by five times over the past four
years.
According to CCU a branch of FIA:
a. 62 cases were reported to the unit in 2007
b. 287 cases in 2008
c. Ratio dropped in 2009
d. In 2010 more than 312 cases were
registered in different categories of cyber
crimes.
Pakistan cyber crime bill 2016
The Act introduces a range of offenses involving the unauthorized
access, transmission, copying, or interference in an information
system or data. Harsher penalties are set for these crimes if they
involve information systems or data connected to critical
infrastructure.
Recent cybercrime figure:
The corresponding figures for 2017 were 1,290 inquiries, 207
cases registered and 160 arrests made, whereas figures for 2016
stood at 514, 47 and 49.
The punishment for such an offense upon conviction is up to a 14-
year term of imprisonment or a fine of Rs5 million.
CYBER SECURITY TECHNIQUES
Authentication
Encryption
Digital signature
Antivirus
Firewall
Solution
Conclusion
User awareness is key to secure Computer/Network
Report incidents
Avoid using P2P programs.
Do not open suspicious file/Email
Avoid downloading freeware
If attacked disconnected the network.
“ If you spend more on coffee than on IT security, you will
be hacked. What’s more, you deserve to be hacked. ”
White House cyber security advisor “Richard Clarke”.