SlideShare ist ein Scribd-Unternehmen logo
1 von 17
CYBERCRiME
AND IT’s IMPACT iN
BANGLADESH
PRESENT BY,
SAHA, MRIDUL
BUSHRA, KANIZ FATEMA
& JOTHY, MD FUAD HASSAN
TABLE OF CONTENTs
o ABSTRACT
o PROFILE OF CYBER CRIMINALS
o CYBERCRIME
o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER
o TYPES OF CYBERCRIME
o BROAD CLASSIFICATION
o MISUSE OF INFORMATION TECHNOLOGIES
o REASONS OF CYBERCRIME
o INTRODUCTION
o IMPACT OF CYBERCRIME
o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH
o CYBER TRIBUNAL
o CONCLUSION
ABSTRACT
o Cyber and technology related crime is gradually increasing in Bangladesh. It has already
been seen that a glomming threat becomes visible in the arena of information technology.
Recently the hacking of RAB website and e-mail threats of former prime minister is
example for few of them.
o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are
several clauses against cybercrime. But this Information and Communication Technology
act is not the concrete one.
o So, considering these facts a comprehensive Cybercrime Protection Act should be
imposed. This presentation will focus on the impacts of cybercrime in Bangladesh.
INTRODUCTiON
o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime
took place in the year 1820!
o In our daily life, economic activities, and national security highly depend on stability,
safety of our cyberspace. A network brings communications and transports, power to our
homes, run our economy, and provide government various services.
But . . . .
“Ever since men began to modify their lives by using technology they
have found themselves in a series of technological traps”
CYBERCRiME
o In General, Cybercrime may be said to be those
offences, of which, genus is the conventional
Crime, and where either the computer is an object
or subject of the conduct online crime.
“Any criminal activity that uses a computer
either an instrumentality, target or a means
for further crimes comes within the ambit
of cybercrime”.
o THE COMPUTER AS A TARGET
Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
o THE COMPUTER AS A WEAPON
Using a computer to commit real world crimes.
E.g. Cyber Terrorism, Credit card frauds, Pornography etc.
CYBERCRiMES
IN TWO WAYs BASED ON
USE OF COMPUTER . .
TYPEs OF CYBERCRiME
o Cybercrime may be committed by creating or releasing a malicious computer
program. (E.g. computer virus, Trojan horse).
o Cybercrime may be committed by stalking in cyberspace.
o THERE ARE THREE MAJOR CLASSES OF CRIMINAL
ACTIVITIES WITH COMPUTERS
o Unauthorized use of a computer.
BROAD CLASSiFICATiON
THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO THREE
GROUPS. THEY ARE . . .
o AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
o AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
o AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, Online gambling, ETC.
o UNAUTHORIZED ACCESS & HACKING
o VIRUS DISSEMINATION
o SOFTWARE PIRACY
o CREDIT CARD FRAUD
MiSUSE OF
INFORMATiON TECHNOLOGiEs
o SALE OF ILLEGAL ARTICLES
o EMAIL BOMBING
o EMAIL SPOOFING
o TROJAN ATTACK
o SALAMI ATTACKS
o CYBER DEFORMATION, CYBER STALKING,EMAIL
SPAMMING, PORNOGRAPHY, ETC.
MiSUSE OF
INFORMATiON TECHNOLOGiEs
REASONs
OF CYBERCRiME
o LACK OF EVIDENCE
o EASY TO ACCESS
o COMPLEX
o NEGLIGENCE
o CAPACITY TO STORE DATA IN SMALL SPACE
o Organized hackers these kinds of hackers are mostly organized
together to fulfill certain objective.
o Professional hackers / crackers their work is motivated by the
color of money.
o Discontented employees.
PROFiLE OF CYBER CRiMINALS
o Cyber criminals is constitute of various groups/ category. This division may be justified
on the basis of the object that they have in their mind. The following are the category of
cyber criminals . . .
IMPACT
OF CYBERCRiME
o Cybercrimes committed against people include various
crimes like transmission of child pornography and
harassment through e-mail. The trafficking, distribution
and posting of offensive material including pornography
one of the most spreading cybercrimes known today.
o Cybercrime has already become a going concern in both
private as well as public sector in Bangladesh. Due to
unauthorized access to the system, company loses huge
confidential information which caused a large amount of
financial lose.
LEGAL RESPONSE
TO CYBERCRiME
IN BANGLADESH
o In order to safe e-commerce and encourage the growth of
information technology, the ICT Act, 2006 was passed
making provisions with a maximum punishment of 10
years imprisonment or fine up to taka 10 million or with
both. However, recently our Parliament approved the ICT
Act 2006, raising penalties for cybercrimes setting a
minimum of 7 years imprisonment and a maximum of 14
years or a fine of Tk. 1 core or both.
CYBER TRiBUNAL
o According to section 68 of the Information and
Communication Technology Act, 2006 for the speedy and
effective disposal of cases under this Act, Government shall
establish one or more cyber tribunal. The tribunal shall try
only the offences under this Act and the Government shall
determine the local jurisdiction of the tribunal. In
consultation with the Supreme Court, Government shall
appoint on Sessions Judge or Additional Sessions Judge as a
judge of Cyber Tribunal.
CONCLUSiON
Basically, small scale cyber crime occurs in our country . But extensive use of
computer and information technology by the financial institutions like bank,
insurance company, and other non-government organizations and individual as
well, increase the fear of commission of cybercrime. So we have to alert about
the potential threat of cybercrime.
THANK YOU !

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 

Andere mochten auch

Juvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An AppraisalJuvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An AppraisalAbsar Aftab Absar
 
Female Criminality in Bangladesh
Female Criminality in BangladeshFemale Criminality in Bangladesh
Female Criminality in BangladeshA K DAS's | Law
 
Theories of female criminality
Theories of female criminalityTheories of female criminality
Theories of female criminalityA K DAS's | Law
 
Juvenile Delinquency
Juvenile DelinquencyJuvenile Delinquency
Juvenile Delinquencyguest544226
 
Juvenile delinquency
Juvenile delinquencyJuvenile delinquency
Juvenile delinquencyAbino David
 
juvenile delinquency
juvenile delinquencyjuvenile delinquency
juvenile delinquencyMuhammad Afiq
 

Andere mochten auch (6)

Juvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An AppraisalJuvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An Appraisal
 
Female Criminality in Bangladesh
Female Criminality in BangladeshFemale Criminality in Bangladesh
Female Criminality in Bangladesh
 
Theories of female criminality
Theories of female criminalityTheories of female criminality
Theories of female criminality
 
Juvenile Delinquency
Juvenile DelinquencyJuvenile Delinquency
Juvenile Delinquency
 
Juvenile delinquency
Juvenile delinquencyJuvenile delinquency
Juvenile delinquency
 
juvenile delinquency
juvenile delinquencyjuvenile delinquency
juvenile delinquency
 

Ähnlich wie Cybercrime final-ppt

Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0alisondakintxt
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 

Ähnlich wie Cybercrime final-ppt (20)

Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 

Mehr von Grant Thornton Bangladesh

Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyGrant Thornton Bangladesh
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaGrant Thornton Bangladesh
 
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankGrant Thornton Bangladesh
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Grant Thornton Bangladesh
 
Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Grant Thornton Bangladesh
 

Mehr von Grant Thornton Bangladesh (20)

Technical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDTTechnical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDT
 
Report of Banking Company
Report of Banking CompanyReport of Banking Company
Report of Banking Company
 
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio Analysis
 
Louis Vuitton
Louis VuittonLouis Vuitton
Louis Vuitton
 
Horizontal Communication
Horizontal CommunicationHorizontal Communication
Horizontal Communication
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of Lankabangla
 
Insurance
Insurance Insurance
Insurance
 
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City Bank
 
Agricultural revolution. 1ppt
Agricultural revolution. 1pptAgricultural revolution. 1ppt
Agricultural revolution. 1ppt
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Management
ManagementManagement
Management
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)
 
Louis vuitton
Louis vuittonLouis vuitton
Louis vuitton
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
principle of management
principle of managementprinciple of management
principle of management
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2
 
Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1
 

Kürzlich hochgeladen

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Kürzlich hochgeladen (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cybercrime final-ppt

  • 1. CYBERCRiME AND IT’s IMPACT iN BANGLADESH PRESENT BY, SAHA, MRIDUL BUSHRA, KANIZ FATEMA & JOTHY, MD FUAD HASSAN
  • 2. TABLE OF CONTENTs o ABSTRACT o PROFILE OF CYBER CRIMINALS o CYBERCRIME o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER o TYPES OF CYBERCRIME o BROAD CLASSIFICATION o MISUSE OF INFORMATION TECHNOLOGIES o REASONS OF CYBERCRIME o INTRODUCTION o IMPACT OF CYBERCRIME o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH o CYBER TRIBUNAL o CONCLUSION
  • 3. ABSTRACT o Cyber and technology related crime is gradually increasing in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website and e-mail threats of former prime minister is example for few of them. o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are several clauses against cybercrime. But this Information and Communication Technology act is not the concrete one. o So, considering these facts a comprehensive Cybercrime Protection Act should be imposed. This presentation will focus on the impacts of cybercrime in Bangladesh.
  • 4. INTRODUCTiON o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime took place in the year 1820! o In our daily life, economic activities, and national security highly depend on stability, safety of our cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government various services. But . . . . “Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps”
  • 5. CYBERCRiME o In General, Cybercrime may be said to be those offences, of which, genus is the conventional Crime, and where either the computer is an object or subject of the conduct online crime. “Any criminal activity that uses a computer either an instrumentality, target or a means for further crimes comes within the ambit of cybercrime”.
  • 6. o THE COMPUTER AS A TARGET Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. o THE COMPUTER AS A WEAPON Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc. CYBERCRiMES IN TWO WAYs BASED ON USE OF COMPUTER . .
  • 7. TYPEs OF CYBERCRiME o Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse). o Cybercrime may be committed by stalking in cyberspace. o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES WITH COMPUTERS o Unauthorized use of a computer.
  • 8. BROAD CLASSiFICATiON THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO THREE GROUPS. THEY ARE . . . o AGAINST INDIVIDUALS A. Person & B. Property of an individual o AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. o AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, Online gambling, ETC.
  • 9. o UNAUTHORIZED ACCESS & HACKING o VIRUS DISSEMINATION o SOFTWARE PIRACY o CREDIT CARD FRAUD MiSUSE OF INFORMATiON TECHNOLOGiEs
  • 10. o SALE OF ILLEGAL ARTICLES o EMAIL BOMBING o EMAIL SPOOFING o TROJAN ATTACK o SALAMI ATTACKS o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING, PORNOGRAPHY, ETC. MiSUSE OF INFORMATiON TECHNOLOGiEs
  • 11. REASONs OF CYBERCRiME o LACK OF EVIDENCE o EASY TO ACCESS o COMPLEX o NEGLIGENCE o CAPACITY TO STORE DATA IN SMALL SPACE
  • 12. o Organized hackers these kinds of hackers are mostly organized together to fulfill certain objective. o Professional hackers / crackers their work is motivated by the color of money. o Discontented employees. PROFiLE OF CYBER CRiMINALS o Cyber criminals is constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals . . .
  • 13. IMPACT OF CYBERCRiME o Cybercrimes committed against people include various crimes like transmission of child pornography and harassment through e-mail. The trafficking, distribution and posting of offensive material including pornography one of the most spreading cybercrimes known today. o Cybercrime has already become a going concern in both private as well as public sector in Bangladesh. Due to unauthorized access to the system, company loses huge confidential information which caused a large amount of financial lose.
  • 14. LEGAL RESPONSE TO CYBERCRiME IN BANGLADESH o In order to safe e-commerce and encourage the growth of information technology, the ICT Act, 2006 was passed making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or with both. However, recently our Parliament approved the ICT Act 2006, raising penalties for cybercrimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 core or both.
  • 15. CYBER TRiBUNAL o According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. The tribunal shall try only the offences under this Act and the Government shall determine the local jurisdiction of the tribunal. In consultation with the Supreme Court, Government shall appoint on Sessions Judge or Additional Sessions Judge as a judge of Cyber Tribunal.
  • 16. CONCLUSiON Basically, small scale cyber crime occurs in our country . But extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations and individual as well, increase the fear of commission of cybercrime. So we have to alert about the potential threat of cybercrime.