SlideShare a Scribd company logo
1 of 23
COMPUTER CRIME
Submitted To: Naim. A. Dewan Mehreen Mahmood-1020407030 Anika Rahman-1020838030 March 29, 2011
	A computer crime is any unlawful activity that is done using a computer
The First Incident of Cyber Crime The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology. The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
Types of Cyber Crime Viruses and Worms Viruses are programs that attach 	themselves to a computer or a file.  	 	They then circulate themselves to other 	files and to other computers on a 	network. 	 	Worms, unlike viruses do not need the 	host to attach themselves to.  		They merely make functional copies of 	themselves and do this repeatedly till 	they eat up all the available space on a 	computer's memory.
2. Denial-of-Service-Attacks These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis. 3.   Malware Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission.  	Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
4. Hacking Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
5. Software Piracy Unauthorized copying of purchased software is called software piracy.  	Making copies of the software for commercial distribution, or resale is illegal.  	However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
6. Fraud Online fraud and cheating  	is one of the most lucrative businesses that are growing  	today in the cyber space.  	Some of the cases of online fraud  	and cheating that have come to  	light are those relating to credit card  	crimes, bank fraud, contractual  	crimes, internet scams, identity theft, extortion etc.
7. Cyber stalking Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
8. Obscene or Offensive Content Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography. Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
9. Harassment Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
10. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
11. Computer  Vandalism       Vandalism means deliberately destroying or damaging property of another.        These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
12. Spam 	The unwanted sending of bulk e-mail for commercial purposes is called spam. Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
Prevention of Computer Crime
Top 20 countries that commit the most Cyber Crimes
A Comparison of Software Piracy Rates in the World
Software Piracy in Bangladesh The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
COMPUTER CRIME-BANGLADESH 	Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber  crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
CONCLUSION Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.
Any Questions

More Related Content

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
Incident response process
Incident response processIncident response process
Incident response process
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Viewers also liked

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer assisted instruction
Computer assisted instructionComputer assisted instruction
Computer assisted instructionVinci Viveka
 
Computer Assisted Instruction
Computer Assisted InstructionComputer Assisted Instruction
Computer Assisted Instructionnancyd0703
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 

Viewers also liked (7)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer assisted instruction
Computer assisted instructionComputer assisted instruction
Computer assisted instruction
 
Computer as a teachers tool
Computer as a teachers toolComputer as a teachers tool
Computer as a teachers tool
 
Computer Assisted Instruction
Computer Assisted InstructionComputer Assisted Instruction
Computer Assisted Instruction
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Similar to Computer crime

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 

Similar to Computer crime (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Recently uploaded (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Computer crime

  • 2. Submitted To: Naim. A. Dewan Mehreen Mahmood-1020407030 Anika Rahman-1020838030 March 29, 2011
  • 3. A computer crime is any unlawful activity that is done using a computer
  • 4. The First Incident of Cyber Crime The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology. The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
  • 5.
  • 6. Types of Cyber Crime Viruses and Worms Viruses are programs that attach themselves to a computer or a file. They then circulate themselves to other files and to other computers on a network. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 7. 2. Denial-of-Service-Attacks These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis. 3. Malware Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission. Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
  • 8. 4. Hacking Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
  • 9. 5. Software Piracy Unauthorized copying of purchased software is called software piracy. Making copies of the software for commercial distribution, or resale is illegal. However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
  • 10. 6. Fraud Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. Some of the cases of online fraud and cheating that have come to light are those relating to credit card crimes, bank fraud, contractual crimes, internet scams, identity theft, extortion etc.
  • 11. 7. Cyber stalking Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
  • 12. 8. Obscene or Offensive Content Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography. Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
  • 13. 9. Harassment Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
  • 14. 10. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
  • 15. 11. Computer Vandalism Vandalism means deliberately destroying or damaging property of another. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
  • 16. 12. Spam The unwanted sending of bulk e-mail for commercial purposes is called spam. Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
  • 18. Top 20 countries that commit the most Cyber Crimes
  • 19. A Comparison of Software Piracy Rates in the World
  • 20. Software Piracy in Bangladesh The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
  • 21. COMPUTER CRIME-BANGLADESH Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
  • 22. CONCLUSION Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.