Académique Documents
Professionnel Documents
Culture Documents
Activity in which computers or networks are a tool, a target, or a place of criminal activity. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts.
The first spam email took place in 1978. The first virus was installed on an Apple computer in 1982.
1.Hacking
means illegal intrusion into a computer system without the permission of the computer owner/user. It is also known as CRACKING
3.CYBER DEFAMATION
sends emails containing defamatory matters to all concerned of the victim For example disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc
4.Cyber Bullying
The use of technology to harass, threaten, embarrass, or target another person Harassment, is a growing problem among teenagers.
5.Computer Vandalism
6.SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs
7.PHISHING
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
8.Skimming
illegally copy the information from the magnetic strip on the back of your plastic without interfering with the legitimate payment transaction.
It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes.
Offence
Criminal Access Criminal Data Access Data Damage System Damage
Imprisonment (years)
3 3 3 3
Fine
3 Lac 3 Lac 3 Lac 3 Lac
Electronic Fraud
Electronic Forgery Misuse of Device Unauthorized access to code
7
7 3 3
7 Lac
7 Lac 3 Lac 3 Lac
Malicious code
Defamation Cyber stalking Cyber Spamming
5
5 3 6 months
5 Lac
5 Lac 3 Lac 50,000
Spoofing
Pornography Cyber terrorism
3
10 Life
3 Lac
----10 Million
NR3C
Enhance the capability of Government of Pakistan and Federal Investigation Agency(FIA) to effectively prevent growing cyber crimes. To provide on demand state-of-the-art electronic forensic services and cyber investigative to support local police Monitor global security issues and gather IT security intelligence.