A Denial-of-Service (DoS) attack reduces the performance of a computer or network. It’s also known as a bandwidth consumption attack or a network saturation assault. Attackers launch DoS assaults by flooding the web with a high number of protocol packets.
Cyber Crime In Pakistan
Cyber Crime in Pakistan is the newest program to fight technology-based crimes. The National Response Centre for Cyber Crime (NR3C) is the country’s first agency of its kind.
Explanation of CyberCrime:
Any action carried out using a pc, electronic devices, and connections in the cyber domain are made possible by the online platform. It can involve the remotely stealing of personal, governmental, or company information by illegally trespassing into unauthorized remote networks worldwide. It might range from stealing crores of rupees from an online account to abusing and following internet users.
Spreading bugs to other computers or publishing defamatory information are examples of cybercrime. attacking computers with a computer as a target. Using a computer as a weapon to commit fraud or engage in illicit gambling. The Computer as a tool—for storing illicit or stolen data
Cybercrime: The Facts
As a source of illegal profit, cybercrime has now overtaken illicit narcotics trafficking. Every three seconds, someone’s identity is hijacked as a consequence of cybercrime. Your unsecured Computer could become attacked within 4 minutes of going online if you don’t have an intelligent protection program.

Major Online Activities In Pakistan:
In Pakistan, online users range is from 10% to 16% of the overall population, and major people of Pakistan activities are following:
Social Media & networking, Online banking, Online Browsing, Audio & video interaction, Adventure, Virtual shopping, Location directions / GPS, Online education, Online auction, Sharing of Information, Medical Help, Online video games
Major Cyber Crime Activities:
Hacking, Identity theft, Cyber Bullying, Cyber Stalking, Financial fraud, Digital Piracy, Computer viruses and worms, Malicious Software, Intellectual property rights, Money Laundering, Denial of Service attack, Electronic Terrorism, Vandalism, and Extortion
Cyber Crime Categories:
Hacking:
Attempting to get access to computer systems to steal, corrupt, or view data illegally. Hacking is derived from “hacker,” which refers to a computer programming language and system specialist. In this context, hacking refers to extraordinarily complicated and ingenious methods to get computers to accomplish things.
However, for a long time, the popular press has used the terms “hacker” and “hacking” to refer to people who try to break into computer systems to steal, corrupt, or fraudulently examine data.
Attack on Website:
The term “website defacement” refers to an attack that alters the site’s visual look or a web page. System hackers are frequently at blame, as they break into a web server and install their website in its stead. The most common method of property theft is to use SQL Injections to log on to administrator accounts.
The defacement is usually innocent; nevertheless, it can cover more dangerous activities such as uploading malware or removing critical files from the server. Pakistan’s newest program to fight technology-based crimes, the National Response Centre for Cyber Crime in Pakistan(NR3C), is the country’s first agency of its kind.
- System hackers are frequently at blame, as they break into a web server and install their website in its stead. The most common method of property theft is to use SQL Injections to log on to administrator accounts.
- NR3C has successfully investigated cases of website theft of property.
- Children are especially vulnerable because of their trusting nature and willingness to provide personal information.
- To obtain access to confidential information, cybercriminals use the social engineering strategy.
Cyberbullying
Cyberstalking (also known as cyber-harassment) occurs when someone utilizes the Internet to threaten or harass another person. Harassment of this nature can harm the victim physically, emotionally, and psychologically.
Children are especially vulnerable because of their trusting nature and willingness to provide personal information, and this information is then utilized against them in the form of stalking. As a result, according to an NR3C official, no information should be provided via the Internet unless the person is not a trusted individual.


Stalking on the Internet: (Cyber harassment)
Threatening or making unwelcome attempts towards another person via the internet Cyberstalking (also known as cyber-harassment) is when someone threatens you over the Internet. Harassment of this nature can harm the victim physically, emotionally, and psychologically. Because of their trusting nature, children are vulnerable.
Pornography of Child:
Children have become more vulnerable to cyber crime in pakistan as the Internet has grown. Children use the Internet more now that more houses have access to it, and their chances of falling victim to child rape have increased. Children’s shyness is reduced by the ready availability of sexual content on the Internet.
Countless youngsters around the world are sexually exploited each year. These young victims will carry psychological, physical, and emotional injuries for the rest of their lives. When a recording of sexual abuse is created or posted on the Internet, it will live on in perpetuity.

Social Engineering:
To obtain access to confidential information, cybercriminals use the social engineering strategy. Social engineers use lying and trickery to get victims to provide sensitive information. The following are some of the social engineering techniques used by attackers
- It sends out messages with dangerous attachments (e.g., malware) and text encouraging users to open them.
- I pretended to be the network’s primary administrator and requested the victim’s password to perform a maintenance check.
- When a victim is told over the phone that they have won a reward, they are asked for credit card information so that the gift can be delivered.
Data Theft:
The act of taking computer-based information from an unwitting victim violates privacy.
Or get sensitive information is known as data theft. Data theft is becoming more issue for ordinary computer users and large corporations. In data theft cases, the following categories are the most common.
Password cracking:
If your machine is not password-protected or if the password is easily decrypted, attackers can get access to it and steal valuable data (weak password).
Phone tapping and recording of data sent through unsecured lines are possible. If no encryption technology is utilized, the unauthorized person will likely access your password and others. Personal information.
E-commerce:
When selling or buying products on the Internet, ensure your data is safe from public scrutiny. Carelessness may result in the disclosure of private account information.
Laptop theft:
Laptop theft from business firms is becoming more common, with the critical information saved on the laptop being sold to competitors. Carelessness and a lack of laptop data encryption can cost a company a lot of money.
Identity Theft:
Identity theft is a crime in which a person obtains and exploits another person’s personal or sensitive information with the intent of committing frauds or scams using the stolen identity. The majority of these crimes are undertaken for financial gain. By obtaining e-mail addresses and information kept on computer databases, the cybercriminal can access an individual’s data.
They capture transactions by listening in on networks. Identity theft can take many forms, including shoulder surfing, dumpster diving, spamming, spoofing, phishing, and skimming.
Financial fraud is a type of criminal activity in which a person defrauds a victim of his money by using deceptive ways. An example of financial fraud is the Internet fraud scheme, which includes imitated online sales, retail ventures, business opportunity schemes, identity theft, market manipulation schemes, and credit card scams.
A virus is a dangerous program that spreads from one computer to another as a biological virus does. The majority of viruses are developed to cause harm to programs and data as well as apply themselves. Viruses enter existing programs to change their behavior, actively delete data, and conduct activities on storage media that make the data they store inaccessible.
A worm is computer software that uses computer networks and security weaknesses to copy itself from one machine to another. It usually engages in evil behavior, such as draining computer resources and shutting down systems.
Rights to Intellectual Property:
Any act that gives access to patents, trade secrets, customer data, sales patterns, and sensitive information is considered a violation of intellectual property rights.