You are on page 1of 18

CYBER TERRORISM

INSTRUCTOR: MUHAMMAD SUFYAN UL HAQ


PRESENTED BY:
SHAIKH IFTEKHAR AHMED
NATHAN CRISTOPHER MENDOCA
SYED AZHAR MEHDI
SYED HAMZA ZAIDI
3 SECONDS!

Do you know? In every 3 seconds somebody’s identity is


stolen as a result of cyber crime.
CYBER TERRORISM:

• An illegal activity of using digital devices is such a way that it can be used to steals
someone’s identity, government and even companies to use it for criminal conduct.
• Obviously punishable.
• Fastest growing crime because it is fueled by anonymity.
• If you are using your personal without any security so it can be hacked just within four
minutes via connecting through internet.
• Started out with some childish attacks by script killers and now has turned into a serious crime
that makes billions of dollars.
• They are evolved.
• Now they are tricking government too.
• Some of them are:
• Phishing scams
• Online scams
• Eaves dropping and surveillance
• Social media scams and scamming.
• Data digging.
• Ransomware.
• Electronic money laundering and many more.
RANSOMWARE:

• Hacker Encrypt all the files you have so you can’t access them.
• They will send you a message demanding a large amount of money to get your data back.
• Phishing scams:
- Tricking someone by taking out his or hers personal information via calls, text, emails etc.
- The personal information they usually in search are bank accounts numbers, passwords, credit
card etc.

• Online scams:
- Simply those scams happened online.
- Adds keep popping up on your screen, saying yay! You have won a prize. Just enter your credit
card no for shipping. Then what will be seen will just weird transactions from your account.

• Eaves Dropping:
- To record, amplify, or to transmit any private communication without the consent of any
one person engaged in the conversation.
- Done usually over the phone when online.
CYBER CRIMINAL GROUPS:

• There are some groups that arrange some major events to get a hand on large organization.
They even make mysterious program on how to enlarge their group.
• Some of the major arrangements of group terrorism is done by:
1. Script kiddies
2. Wanna Cry

3. Lizard Squad
4. Lulzsec
5. Insiders

6. Advanced president Threat Agent.


CYBER TERRORISM PAKISTAN:

• The usage of social media in Pakistan has conveniently surpassed Canada, Spain, Australia and
countless other developed countries as Pakistan ranked 20th in the world for online
population.
• In the beginning, we didn’t know how to use internet properly , In fact, Pakistan had no cyber
laws until the late 2016.
• Identity theft, phishing scams, harassment, ransomware, privacy were non-existed thus we
hardly focus on our security.
• The cyber security cell were receiving 10 to 12 complaints daily because of the limited
capabilities of the FIA/NRBC and the social media is yet to be used maturely.
SHAHMEER AMIR
SHAHMEER AMIR:
CEO OF VEILIUX(CYBER SECURITY)
• A boy who hacked into 400+ websites including Google, Microsoft, Facebook and Twitter.
• He has earned hundred of thousands of dollars in bounties by reporting bugs to 400+
global organizations.
• You will remain nonplussed by knowing that he once has rejected from 17 universities
• Although he was ranked No.1 Hackerone in 2015.
CONT…

• Then he decided to start a company to improve cyber security of the world.


• Today he is the CEO of Veiliux which help companies to secure their online businesses.
THANKYOU!

You might also like