Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Cybercrime ppt
1. CYBERCRiME
AND IT’s IMPACT iN
BANGLADESH
PRESENT BY,
SAHA, MRIDUL
BUSHRA, KANIZ FATEMA
& JOTHY, MD FUAD HASSAN
2. TABLE OF CONTENTs
o ABSTRACT
o PROFILE OF CYBER CRIMINALS
o CYBERCRIME
o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER
o TYPES OF CYBERCRIME
o BROAD CLASSIFICATION
o MISUSE OF INFORMATION TECHNOLOGIES
o REASONS OF CYBERCRIME
o INTRODUCTION
o IMPACT OF CYBERCRIME
o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH
o NECESSARY POLICIES TO TACKLE CYBERCRIME IN BANGLADESH
o CYBER TRIBUNAL
o CONCLUSION
3. ABSTRACT
o Cyber and technology related crime is gradually increasing in Bangladesh. It has already
been seen that a glomming threat becomes visible in the arena of information technology.
Recently the hacking of RAB website and e-mail threats of former prime minister is
example for few of them.
o In the Information and Communication Technology Act-2006 and ICT (Amendment) Act-
2013 there are several clauses against cybercrime. But this Information and
Communication Technology act is not the concrete one.
o So, considering these facts a comprehensive Cybercrime Protection Act should be
imposed. This presentation will focus on the impacts of cybercrime in Bangladesh
especially focuses on the area of Personal life, Workplace as well as Policy making Bodies
or thinkers. We believe that this presentation would help you and all relevant concerns and
policy makers.
4. INTRODUCTiON
o Cyber-crime has had a short but highly eventful history. Observing the history of
cybercrime would give the individual and society the opportunity to avoid the mistake
made in past. The past recorded cybercrime took place in the year 1820!
o In our daily life, economic activities, and national security highly depend on stability,
safety of our cyberspace. A network brings communications and transports, power to our
homes, run our economy, and provide government various services.
But . . . .
“Ever since men began to modify their lives by using technology they
have found themselves in a series of technological traps”
5. CYBERCRIME
o In General, Cybercrime may be said to be those
offences, of which, genus is the conventional
Crime, and where either the computer is an object
or subject of the conduct online crime.
“Any criminal activity that uses a computer
either an instrumentality, target or a means
for perpetuating further crimes comes
within the ambit of cybercrime”.
6. CYBERCRiMES
IN TWO WAYs BASED ON
USE OF COMPUTER . .
o THE COMPUTER AS A TARGET
Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
o THE COMPUTER AS A WEAPON
Using a computer to commit real world crimes.
E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
7. TYPEs OF CYBERCRiME
o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES
WITH COMPUTERS
o Unauthorized use of a computer.
o Cybercrime may be committed by creating or releasing a malicious computer program.
(E.g. computer virus, worm. Trojan horse).
o Cybercrime may be committed by harassment and stalking in cyberspace.
8. BROAD CLASSiFICATiON
THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED UNDER THIS
FOLLOWING THREE GROUPS. THEY ARE . . .
o AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
o AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
o AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, Online gambling, ETC.
9. MiSUSE OF
INFORMATiON TECHNOLOGiEs
o UNAUTHORIZED ACCESS & HACKING
Hacking is a simple term means illegal intrusion into a computer system without the
permission of the computer owner/user.
o VIRUS DISSEMINATION
Virus itself is software that attacks other software. It may cause for data loss, deduction of
bandwidth speed, hardware damage etc. Trojan horse, Time Bomb, Logic Bomb, ETC.
o SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or distribution of
products intended to pass for the original.
o CREDIT CARD FRAUD
You simply have to type credit card number into www page of the vendor for online
transaction. If electronic transactions are not secured the credit card numbers can be stolen
by the hackers who can misuse that card.
10. o SALE OF ILLEGAL ARTICLES
weapons, wild life etc. are sold by posting information on websites, or simply by using
email communication. Many of auction sites are believed to be selling cocaine in the name
of money.
o EMAIL BOMBING
Email bombing can be committed by sending huge number of emails to the victim resulting
in the victim’s email account crashes.
o EMAIL SPOOFING
A spoofed email is one that appears to originate from one source but actually has been sent
from another source.
o TROJAN ATTACK
The program that act like something useful but do the things that are quiet damping. The
programs of this kind are called as Trojans.
o SALAMI ATTACKS
For the commission of financial crimes salami attacks are used.
o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING,
PORNOGRAPHY, ETC.
11. REASONs
OF CYBERCRiME
o LACK OF EVIDENCE
o EASY TO ACCESS
The problem encountered in guarding a computer system
from unauthorized access is that there is every possibility
of breach not due to human error but due to the complex
technology.
o COMPLEX
Due to complex computing system it is very hard to find
out the cyber criminal.
o NEGLIGENCE
Negligence is very closely connected with human conduct.
Which provides a cybercriminal to gain access and control
over the computer system.
o CAPACITY TO STORE DATA IN SMALL SPACE
12. PROFiLE OF CYBER CRiMINALS
o Cyber criminals is constitute of various groups/ category. This division may be justified on
the basis of the object that they have in their mind. The following are the category of cyber
criminals . . .
o Organized hackers these kinds of hackers are mostly organized
together to fulfill certain objective.
o Professional hackers / crackers their work is motivated by the
color of money.
o Discontented employees. This group includes those people who have
been either dismissed from their job or are dissatisfied with their job.
13. IMPACT
OF CYBERCRiME
o Cybercrimes committed against people include various
crimes like transmission of child pornography and harassment
through e-mail. The trafficking, distribution, posting, and
dissemination of obscene material including pornography
constitute one of the most important cybercrimes known
today. Cyber harassment is a distinct cybercrime. Harassment
can be sexual, racial, religious, or other. fraud & cheating,
web jacking, pirated software are increasing day by day via
cybercriminals.
o Cybercrime has already become a going concern in both
private as well as public sector in Bangladesh. During the
last decade private and public sector has done a revolution
with the use of technical enhancement. Due to
unauthorized access to the system, company loses huge
confidential information which caused a large amount of
financial lose.
14. LEGAL RESPONSE
TO CYBERCRiME
IN BANGLADESH
o In order to safe e-commerce and encourage the growth of
information technology, the ICT Act, 2006 was passed
making provisions with a maximum punishment of 10
years imprisonment or fine up to taka 10 million or with
both. However, recently our Parliament approved the ICT
Act 2006, raising penalties for cybercrimes setting a
minimum of 7 years imprisonment and a maximum of 14
years or a fine of Tk. 1 core or both.
15. CYBER TRIBUNAL
o According to section 68 of the Information and
Communication Technology Act, 2006 for the speedy and
effective disposal of cases under this Act, Government shall
establish one or more cyber tribunal. The tribunal shall try
only the offences under this Act and the Government shall
determine the local jurisdiction of the tribunal. In
consultation with the Supreme Court, Government shall
appoint on Sessions Judge or Additional Sessions Judge as a
judge of Cyber Tribunal.
16. CONCLUSiON
o Basically, no notable cybercrime has yet been committed in Bangladesh. The gradual
dependence and extensive use of computer and information technology by the financial
institutions like bank, insurance company, and other non-government organizations
increase the fear of commission of cybercrime here but we have to alert about the
potential threat of cybercrime.