32
CYBERCRIMES - PREVENTION AND PROTECTION IN PAKISTAN Department Of Computer Science Sindh MadressaTul Islam University, Karachi. Hira Farooq Qureshi MasroorManzoorChand io A report submitted to Sir Abdul Malik Abbasi the Department Of Computer Science, Sindh

CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

  • Upload
    dangnhu

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

CYBERCRIMES - PREVENTION AND PROTECTION IN PAKISTAN

D e p a r t m e n t O f C o m p u t e r S c i e n c eS i n d h M a d r e s s a T u l I s l a m U n i v e r s i t y , K a r a c h i .

Hira Farooq QureshiMasroorManzoorChandioA report submitted to Sir Abdul Malik Abbasi the Department Of Computer Science, Sindh MadressaTul Islam, University, Karachi.

Page 2: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

ACKNOWLEDGEMENTPraise is to Allah Almighty, the one testing us all at all times and making decisions about what we don’t know and can’t know. Writing for this project appeared to be a great experience to all group members. It added a lot to our knowledge while we were working on this project. If we say that this project is one of our memorable experiences in student life, then it would not be wrong.

We would like to acknowledge our teacher Sir Abdul Malik Abbasi of SMIU, Karachi, who provided valuable guidance to all students for accomplishing this task. We are grateful to all our teachers at the university who equipped uswith knowledge, which came to our aid while performing various tasks and completing assignments in organizational setting.

We are immensely obliged to our elders and to all our fellow students who guided us in making this project success. Whatever we have learnt from them and this project report has put indelible impression on our mind. It is our conviction that this learning experience will always be a source of help in our practical life.

We would like to thanks our parents for their enormous love, support and prayers.

Page | 1

Page 3: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

SUMMARYIn cyber industry there is an indomitable competition is appearing all over the world. The companies such as Intel, Microsoft, Apple, Samsung etc. having cyber businesses are facing this challenge by spending more on advancement. With such advancement cyber industry and its cyber users are facing an enormous challenge of insecurity. Where the companies are busy in making advance software, new websites, advance communication devices, the cyber criminals are also being created. These cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network or group of criminals who are doing cybercrimes for some purpose.It is important to emphasis the role of cybercrimes and to identify theirimpact.United Nation Institute of Cybercrime Research and Investigation and such other agencies are using different strategies to acquire criminal reach. This research is defining the different types of cybercrimes and the purposes of these crimes. The protection policies that companies are making include anti-virus software for computers, mobiles and other devices and criminal laws are making by the government agencies. In this research the causes of cybercrimes on the society are determined. It is also determined that what the impact of these crimes is and what difficulties cyber users are facing.We praise companies and agencies to protectsociety and suggest criminals to stop doing such crimes all over the world.

Page | 2

Page 4: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

TABLE OF CONTENTSAcknowledgment

Summary1. Introduction……….………………………………………………………..……………042. Background…….………………………………………………………..……………….043. Research Objectives……………………………………………………………………...064. Significance………………………………………………………………………………065. Hypotheses…………………...…………………………………………………………..066. Literature Review…………….…………………………………………………………..067. Data Collection……………………..…………………………………………………….078. Data Analysis……………………………………………………………………………..089. Summary………………………………………………………………………………….1710. Conclusion………………………………………………………………………………1811. Recommendations………………………………………………………………………18

a) Appendices………………………………………………………………………….19b) Bibliography………………………………………..……………………………….24c) Index………………………………………………………………………………..

Page | 3

Page 5: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

INTRODUCTION:A lot of us have limited knowledge of crime occurring in cyberspace which is known as “cybercrime”, which happen on computers and internet. This research is conducted for the purpose to analyze the cybercrimes, nature of cybercrimes, its causes for cyber users, and its harm on society. It also examine that how these cyber criminals are using different techniques to harm the users. The title of the project is revealing the whole analysis of the cybercrimes and criminals using different tactics to gain profit and to achieve evil dedications. It is enlightening the harmful policies and tactics that are using to attempt cybercrimes. In this project it is conducted that what type of cybercrimes are being attempting in our society and what methods criminals are using to attempt these crimes. The purpose to conduct a research on the cybercrimes is to investigate the different patterns and practices using for harm the society and to gain evil profits. In this research it is obtained that how government agencies evaluate the different crimes, how they make policies and laws to protect the society from these crimes. This research also enlightened the methods of protection from these crimes. This research also conducted for the solution of the major issues facing by society in doing cyber activities.

BACKGROUND:

Page | 4

Page 6: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

Modern society is defined by the internet: over a quarter of the world's population is wired into the net - and this number is growing every day. The internet is a source of information, communication, entertainment and education, and it is impossible for many of us to imagine a functioning world without it. Unfortunately however, as with most technological advances, the internet also has a dark side - and the evolution of the internet has been paralleled by an evolution in crime. (2013, UNICRI)

The advent of new internet technology has resulted in the corresponding advent of both new forms of crime, and new ways to commit old forms of crime. For instance, phenomena such as phishing, pharming, and the diffusion of viruses and worms were completely non-existent before the arrival of the internet, while long existing crimes such as fraud, theft, and even terrorism can now all be committed in new (and sometimes easier) ways in the cyber world. Due to its decentralized structure, users of the internet can enjoy high levels of anonymity, with little risk of being traced. Consequently, the internet is a magnet for all sorts of common criminals - after all, cybercrime is just a regular crime with an "online" or "computer" aspect. (2013, UNICRI)

In a recent survey conducted by Symantec Corporation, it was found that 65% of internet users had been a victim of some kind of cybercrime, including viruses and malware attacks, online scams, phishing attacks, hacking of social-networking profiles, credit card fraud and sexual predation. Cybercrime has become a more lucrative criminal industry then the illicit drugs trade, and generates over $US 100 billion dollars annually. There is no doubt - cybercrime is rife, and is spreading at an alarming rate. (2013, UNICRI)

Similarly crimes through wireless communication devices are also increasing by the advancement in technology. Crimes through wireless devices include calls recording, calls taping and use of mobile to threaten someone for the evil intention of the criminals.

UNICRI is working on the field of cybercrime to achieve a better understanding of the phenomenon, in order to formulate ad hoc prevention policies, develop security methodologies and techniques, and strengthen the capacities of the actors involved in investigating and prosecuting cybercrimes. (2013, UNICRI)

The basic purpose to analyze the cybercrimes is to determine the different practices to prevent the users from such crimes, policies that make criminals to be alert. The reason why cybercrimes analysis conducting will be a better understanding of what different agencies are doing for protection of cyber users, how crackers and hackers are making insecurity, how they are

Page | 5

Page 7: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

harming the users all over the world, what techniques they are using to make such crimes.

TYPES OF CYBERCRIME:

Financial Fraud Hacking Sale of illegal articles E-mail spoofing Unauthorized access to network Theft of information contained Virus/worm attack Cyber pornography Forgery (copying pictures or documents) Internet time theft Trojan attack Password cracking

RESEARCH OBJECTIVES: To identify the cybercrimes. To find out the impact and effects of cybercrimes on society. To find out the protection policies. To find out reasons for not reporting to law enforcement To find out types of attack

SIGNIFICANCE: This study will definitely add value to the existing knowledge base and

at the same time give us ability and motivation to indulge in further advance researches in the field of management sciences.

This study will help the agencies to better understand the victims of cybercrimes.

Page | 6

Page 8: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

This study is also useful to direct the top agencies to formulate strategies and processes keeping in view the harms, causes, and impacts of cybercrime in society.

This study will aware the internet users how to fight back with cybercriminals.

HYPOTHESES:Cybercrimes have negative effects on society. This crime is increasing problem in Pakistan in most field like IT profession, Business, personal (Social network and mailing). We come to know that the main reason to go towards this crime is that a criminal mind person may feel the need of extra money in easy way. In Social environment more people do this for their entertainment. More that cybercrime is going to hurt or harm users.

LITERATURE REVIEW:In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher ‟computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). From this humble beginning the internet has expanded far beyond the expectations of the individuals who created it.According to Kleinrock (2008), one of chief scientists on the ARPANET, “What I clearly missed was the fact that my 99-year-old mother (now deceased) would be on the Internet; that is, I did not foresee the powerful community side of the Internet and its impact on every aspect of our society”.Computers and the internet have become intertwined into our daily lives. One reason why individuals use the internet is because they can gather and share information with other individuals no matter where on the globe they are located.This advancement in the way individuals can communicate with one another, as well as the decreasing cost and size of computers, are some of the reasons why internet use has grown so rapidly.“Today, the top three websites Google, Microsoft, and Facebook Each have over 300 million unique Users” (Nielson ratings, 2011).

Page | 7

Page 9: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

The internet allows Individuals to easily find information, stay in touch with others, and has even resulted in new ways to conduct business. People’s use of the internet and computers continues to Grow as more and more people have access to this technology. However, while this new technology has brought with it much advancement which makes our lives easier, it has also led to advancements in crime.Virtually non-existent two decades ago, cybercrime has become one of the fastest growing criminal enterprises around the world. Estimates peg the global cost of crimes ranging from malware to data theft at about $100 billion a year. And it’s growing. Efforts to combat the problem have taken on urgency, but, there is growing debate on how best to foil hi-tech offenders.

It doesn’t matter who you are or where you live – if you have access to a computer, you are a potential target for cyber criminals. And it’s not just individuals at risk.

METHODOLOGY:DATA COLLECTION SOURCES:

Primary Sources:

The data for this project is created through different sources. For this descriptive research the data is collected fromobservation and questionnaire.

Secondary Sources:

The secondary sources which are used for this research are newspaper articles, journal articles, company’s reports, research journals, documents review, and newspaper editorials. These all sources are used as secondary sources for this project.

DATA COLLECTION TOOLS:

Page | 8

Page 10: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

Tools through which data is collected include questionnaire based on closed ended questions, document review, observations, different articles, newspaper editorials, research journal, web sites, internal and external records, meetings.

SAMPLING:

Sample Size:

Sample size is actually the number of units selected from the population by the researcher that are to be studied the characteristics of the population. The sample size is consisting on 12cyber users who responded the questionnaire.

Sampling Technique

For this research simple random sampling technique is used.

DATA ANALYSIS:1. How often do you use a computer?

58%

8%

25%

8%

EverydayOnce a weekSeveral times per weekOnce a monthSeveral times per month

2. Do you use a computer for personal or business purposes?

Page | 9

Page 11: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

83%

8%

8%

PersonalBusinessBoth

3. Do you have internet connection?

83%

17%

YesNo

4. How often do you use an internet?

58%

17%

25%

EverydayOnce a weekSeveral times per weekOnce a monthSeveral times per month

5. Of the following sources, do you think most cybercrime comes from?

Page | 10

Page 12: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

58%

42%Individual Organized crimeOtherUnsure

6. Have you, or someone you know been victim of cybercrime?

8%

25%

58%

8%

Yes meYes someone elseYes bothNo I don’t Know, but this Happened

7. Do you use anti-virus software on your computer?

92%

8%

YesNo

8. Is that mainly because…( who do not use anti-virus software)

Page | 11

Page 13: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

100%

Your computer is safe without itYou can’t afford itYou have not taken the time to install itIt would slow down your computerIt interfere with other programs in computer

9. Do you ever pretend to be someone else (e.g., different age, or appearance) in chat, instant message, or email?

25%

75%

YesNo

10. Had someone give you false information about themselves in an email or instant message?

75%

25%

YesNo

11. Do you use your credit card on the internet as a payment method?

Page | 12

Page 14: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

8%

92%

YesNo

12. Do you use the internet for?

8%

8%

83%

Internet/Online BankingShopping (Amazon.com, eBay.com etc.).Research and general informationE-mails, Instant Messaging3 and 4

13. Have you ever had a problem with:

8%

8%

83%

VirusesSpyware/ AdWareHackers All of the above

14. Are you familiar with social networking?

Page | 13

Page 15: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

92%

8%

YesNo

15. IF you had one of the pre mentioned application on your computer, do you know where they came from?

58%

8%

33%

Peer-2-Peer Network (Kazaa, WinMX etc.) Freeware Program (Download Accelerator, Toolbars etc.) Via E-mail From general surfing Others

16. Have you reported this crime?

92%

8%

YesNo

17. In general, how do you feel about internet advertising?

Page | 14

Page 16: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

17%

8%

17%

33%

25%

Sometimes it is usefulBest way to promote productsIt is a headache for usersHarmful for PCIt contains viruses

18. Have you ever been hacked?

67%

33%

Yes No

19. What is the reason for not reporting to law enforcement?

Page | 15

Page 17: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

83%

8%

8%

No access I don’t know how to reportI don’t know where I should report

20. Why people are going towards cybercrime?In the answer of the above question it is said by most of the cyber users that cybercrimes have some benefits that is why people are going towards cybercrimes.

21. What are the responsibilities of Government is actually doing to protect our society from these crimes?

When it is asked from the users they said government should establish a separate institution for the prevention of these crimes. Some users said that government has actually established laws and policies for such criminals but there is no enforcement of these laws in Pakistan but in the other countries there is.

22. What government should do for cyber criminals?In the answer of the above question most of the respondents replied that government should strictly enforce the law for cyber criminals and should impose penalty upon them.

DIFFERENTIATION CHARTS:

Page | 16

Page 18: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 200

20

40

60

80

100

120

ACCORDING TO GENDER

MaleFemale

College University0%

10%

20%

30%

40%

50%

60%

70%

80%

EDUCATION

Page | 17

Page 19: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

Below 18 20-25 26-30 31-35 35-above0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

AGE OF INTERNET USERS

Analysis:After all the data collection and its determination it has been analyzed that cybercrimes are very harmful for our society. All cyber users are bothered from such crimes and they want protection from such crimes.High level internet users who are young. Many of them said that medically, it’s possible to survive without water and without food but couldn’t live without the internet especially social network.

On December 31, 2007 the Ex-president Pervez Musharrafpromulgates a law called “The prevention of Electronic Crimes ordinance (PECO) 2007”, however this bill was not passed by then parliament. It is still in pending.Pakistan that is run without any cyber laws. FIA has openly said in past that they can’t investigate any cybercrime since there is no law in the country to keep check on cyber offences. Government is also encouraging agencies to prevent these crimes but the actions taken by the government are so slow than the criminal’s acts.

Page | 18

Page 20: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

SUMMARY:Cybercrime continuous to diverge down different path with each new technology. In 2013, cybercriminals are changing the way they organize and targeting new users and new platforms, online transaction-based activities continue to be exploited and hacktivism related attacks continue to rise.

In the age of modernization where the world is going advance day by day some crooks are taking the benefit in wrong ways. Almost all organizations are depending upon the use of cyber resources for the achievement of objectives.Theirmission and their vision are all depend on the mass technology. And for this purpose cyber business is going advance rapidly.

On the other side some organizations are also going advance rapidly but their objectives are different. They are cybercriminal and their purpose is to harm the society. They are attemptingsuch crimes for some benefits such as money profit, grab of important and useful information, to harm some organization or an individual, to destroy the systems of different intelligence agencies, and of course harm the society.Cyber users are facing such crimes and want the protection of their data, useful information and privacy. They want to prevent these crimes but they don’t have access to suchcriminals.They want government to make systems to get rid of these criminals.To make the society safe and protected governments of different countries are also enforcing cyber laws and implementing these all over the world but unfortunately in our country the access to such criminals is hard for the agencies. They have access to criminals but no such law and order to make penalties for the crimes and prevent them.As cyber users we all want to stop these crimes and recommend government agencies to make strict laws and punishment for these crimes and want to safe the society from the crimes.

CONCLUSION:Page | 19

Page 21: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

After all the research it is analyzed that cybercrimes are harmful for the society and for the personal life of the people.They are creating serious issues and problems for the systems of different organization and institutions. They should be stop by the law enforcement. To report cybercrimes cases and demands that Government put in place laws, policies and technologies to control cybercrime. There is need to gain political support. This could be from the government or political parties, interest group and private sectors etc. Since cybercrime is a global problem andit will be more beneficial to be an advanced and modern world if these types of crimes can be curbing.

RECOMMENDATIONS:How to fight back:

Governments have been relatively powerless to stop it and there is no central government agency in any country that can prevent the spread of cybercrime. Organizations need to take protective steps to prevent the spread of crime ware among its users and customers. It is also incumbent upon an organization to educate its users about security best practices, while creating adequate enforceable mechanisms for security policy violations.

Families should make sure their House Rules include guideline on :

Time limits Safe websites Download and online purchases Online friends

Parents need to be aware that kids are going to want privacy as the develop their own online identity, but they should also talk to them about dangers of visiting inappropriate sites and sharing personal thoughts and information online. Parents must keep dialogue open in the house. And as well as setting parental controls, families should have a safe-site browser tool and make sure that younger’s understand how this works and why it’s important. Parents should explain how accidental clicks and spam can lead to unpleasant surprise and inappropriate site. Kids who feel their parents will openly and honestly help them are more likely to go to them in crisis. Having Page | 20

Page 22: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

software and virus protection can help against accidental inappropriate behavior

APPENDIXQuestionnaire:

QUESTIONNAIR FOR

Page | 21

Page 23: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

CYBER CRIME-PREVENTION AND PROTECTION IN PAKISTANHello…!Thank you for allowing us to communicate with you. We sincerely request you to fill in important information in this questionnaire. Please answer the question as honest as possible. We appreciate your time and generosity.MasroorChandio and HiraQureshiName _____________________________________________________________________Father’s Name ______________________________________________________________Date of birth _________________________ Gender ________________ Age____________E-mail __________________________________ Occupation _________________________College/University ___________________________________________________________Additional Comment and suggestion ________________________________________________________________________________________________________________________ ___________________________________________________________________________

1. How often do you use a computer?o Everydayo Once a weeko Several times per weeko Once a montho Several times per month

2. Do you use a computer for personal or business purposes?o Personalo Business

Page | 22

Page 24: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

o Both3. Do you have internet connection?

o Yeso No

4. How often do you use an internet?o Everydayo Once a weeko Several times per weeko Once a montho Several times per month

5. Of the following sources, do you think most cybercrime come from?o Individual computer hackerso Organized crimeo Othero Unsure

6. Have you, or someone you know been victim of cybercrime?o Yes meo Yes someone elseo Yes botho No o I don’t Know, but this Happened

7. Do you use anti-virus software on your computer?o Yeso No

8. Is that mainly because…( who do not use anti-virus software)o Your computer is safe without ito You can’t afford ito You have not taken the time to install ito It would slow down your computero It interfere with other programs in computer

9. Do you ever pretend to be someone else (e.g., different age, or appearance) in chat, instant message, or email?o Yeso No

10. Had someone give you false information about themselves in an email or instant message?o Yeso No

11. Do you play interactive combat or adventure games (e.g., Quake, Tomb Raider) on the Internet?o Yes

Page | 23

Page 25: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

o No12. Do you use your credit card on the internet as a payment

method?o Yeso No

13. Do you use the internet for?o Internet/Online Bankingo Shopping (Amazon.com, eBay.com etc.).o Research and general informationo E-mails, Instant Messagingo Only for work

14. Have you ever had a problem with:o Viruseso Spyware/ AdWareo Hackers

15. Are you familiar with social networking?o Yeso No

16. IF you had one of the pre mentioned application on your computer, do you know where they came from? o Peer-2-Peer Network (Kazaa, WinMX etc.) o Freeware Program (Download Accelerator, Toolbars etc.)o Via E-mailo From general surfingo Others

17. Have you report this crime?o Yeso No

18. In general, how do you feel about internet advertising? o Sometimes it is usefulo Best way to promote productso It is a headache for userso Harmful for PCo It contains viruses

19. Have you been fraud by hackers?o Yeso No

20. What is the reason for not reporting to law enforcement?

Page | 24

Page 26: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

Ans:____________________________________________________________________________________________________________________________________________________________________________________________________________________21. Why people are going towards cybercrime?Ans:____________________________________________________________________________________________________________________________________________________________________________________________________________________

22. What are the responsibilities of Government is actually doing to protect our society from these crimes?

Ans:____________________________________________________________________________________________________________________________________________________________________________________________________________________23. What government should do for cyber criminals?Ans:__________________________________________________________________________________________________________________________________________________________________________________

Page | 25

Page 27: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

References:

BIBLOGRAPHY

Websites

1. Policing - An International Journal of Police Strategies and Management. [On line] Available http://www.unicri.it/special_topics/cyber_threats/cyber_crime/

2. [On line]. Available http://legacy.kctcs.edu3. [On line]. Availablehttp://books.google.com.pk/books?

id=Y5nYlNf5yLgC&printsec=frontcover&dq=cyber+crime:+preventions+and+protections&hl=en&sa=X&ei=4-YRUr2CMIffswbq2ICgCQ&ved=0CDsQ6AEwAw#v=onepage&q=cyber%20crime%3A%20preventions%20and%20protections&f=false

4. [On line]. Availablehttp://books.google.com.pk/books?id=SiG-zE6yteMC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=LegRUoiaPIvMswbP24GAAw&ved=0CCsQ6AEwAA#v=onepage&q=cyber%20crime&f=false

5. [On line]. Availablehttp://books.google.com.pk/books?id=KQhLW0NQPdsC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=LegRUoiaPIvMswbP24GAAw&ved=0CFMQ6AEwBw#v=onepage&q=cyber%20crime&f=false

6. [On line]. Availablehttp://books.google.com.pk/books?id=fJVcgl8IJs4C&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=YugRUv7KLcXTtQbRy4CYDQ&ved=0CFYQ6AEwCDgK#v=onepage&q=cyber%20crime&f=false

7. [On line]. Availablehttp://books.google.com.pk/books?id=cWOQWx4QPFYC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=YugRUv7KLcXTtQbRy4CYDQ&ved=0CFwQ6AEwCTgK#v=onepage&q=cyber%20crime&f=false

8. [On line]. Availablehttp://books.google.com.pk/books?id=stkL4CQ2W20C&printsec=frontcover&dq=cyber+crime&hl=en&sa=X

Page | 26

Page 28: CYBERCRIMES - PREVENTION AND PROTECTION IN file · Web viewThese cyber criminals usually called hacker crackers etc. and they are not one person or two they are also a huge network

&ei=ougRUsiJLcfVtAb6oYCgCw&ved=0CE4Q6AEwBzgU#v=onepage&q=cyber%20crime&f=false

9. [On line]. Availablehttp://books.google.com.pk/books?id=A7Tr3ztALBAC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=ougRUsiJLcfVtAb6oYCgCw&ved=0CFoQ6AEwCTgU#v=onepage&q=cyber%20crime&f=false

10. [On line]. Availablehttp://books.google.com.pk/books?id=AUUERdg6b94C&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=tOIRUvWLMY3VsgaV04G4CQ&sqi=2&ved=0CDEQ6AEwAQ#v=onepage&q=cyber%20crime&f=false

11. [On line]. Availablehttp://books.google.com.pk/books?id=JVPnCqEuTksC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=tOIRUvWLMY3VsgaV04G4CQ&sqi=2&ved=0CEMQ6AEwBA#v=onepage&q=cyber%20crime&f=false

12. [On line]. Availablehttp://books.google.com.pk/books?id=MDziocPjoz0C&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=tOIRUvWLMY3VsgaV04G4CQ&sqi=2&ved=0CE4Q6AEwBg#v=onepage&q=cyber%20crime&f=false

13. [On line]. Availablehttp://books.google.com.pk/books?id=UNqchpUYgJMC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=tOIRUvWLMY3VsgaV04G4CQ&sqi=2&ved=0CGAQ6AEwCQ#v=onepage&q&f=false

14. [On line]. Availablehttp://books.google.com.pk/books?id=JVPnCqEuTksC&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=tOIRUvWLMY3VsgaV04G4CQ&sqi=2&ved=0CEMQ6AEwBA#v=onepage&q=cyber%20crime&f=false

15. [On line]. Availablehttp://books.google.com.pk/books?id=AUUERdg6b94C&printsec=frontcover&dq=cyber+crime&hl=en&sa=X&ei=tOIRUvWLMY3VsgaV04G4CQ&sqi=2&ved=0CDEQ6AEwAQ#v=onepage&q=cyber%20crime&f=false

16. [On line]. Availablehttp://zallp.com/cybercrime.html17. [On line]. Availablehttp://studentsofpakistan.com/pakistani-girls-victim-

of-cyber-crime-in-pakistan/18. [On line].

Availablehttp://www.supremecourt.gov.pk/ijc/Articles/10/5.pdf

Page | 27