SlideShare ist ein Scribd-Unternehmen logo
1 von 17
CYBERCRiME
AND IT’s IMPACT iN
BANGLADESH
PRESENT BY,
SAHA, MRIDUL
BUSHRA, KANIZ FATEMA
& JOTHY, MD FUAD HASSAN
TABLE OF CONTENTs
o ABSTRACT
o PROFILE OF CYBER CRIMINALS
o CYBERCRIME
o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER
o TYPES OF CYBERCRIME
o BROAD CLASSIFICATION
o MISUSE OF INFORMATION TECHNOLOGIES
o REASONS OF CYBERCRIME
o INTRODUCTION
o IMPACT OF CYBERCRIME
o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH
o NECESSARY POLICIES TO TACKLE CYBERCRIME IN BANGLADESH
o CYBER TRIBUNAL
o CONCLUSION
ABSTRACT
o Cyber and technology related crime is gradually increasing in Bangladesh. It has already
been seen that a glomming threat becomes visible in the arena of information technology.
Recently the hacking of RAB website and e-mail threats of former prime minister is
example for few of them.
o In the Information and Communication Technology Act-2006 and ICT (Amendment) Act-
2013 there are several clauses against cybercrime. But this Information and
Communication Technology act is not the concrete one.
o So, considering these facts a comprehensive Cybercrime Protection Act should be
imposed. This presentation will focus on the impacts of cybercrime in Bangladesh
especially focuses on the area of Personal life, Workplace as well as Policy making Bodies
or thinkers. We believe that this presentation would help you and all relevant concerns and
policy makers.
INTRODUCTiON
o Cyber-crime has had a short but highly eventful history. Observing the history of
cybercrime would give the individual and society the opportunity to avoid the mistake
made in past. The past recorded cybercrime took place in the year 1820!
o In our daily life, economic activities, and national security highly depend on stability,
safety of our cyberspace. A network brings communications and transports, power to our
homes, run our economy, and provide government various services.
But . . . .
“Ever since men began to modify their lives by using technology they
have found themselves in a series of technological traps”
CYBERCRIME
o In General, Cybercrime may be said to be those
offences, of which, genus is the conventional
Crime, and where either the computer is an object
or subject of the conduct online crime.
“Any criminal activity that uses a computer
either an instrumentality, target or a means
for perpetuating further crimes comes
within the ambit of cybercrime”.
CYBERCRiMES
IN TWO WAYs BASED ON
USE OF COMPUTER . .
o THE COMPUTER AS A TARGET
Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
o THE COMPUTER AS A WEAPON
Using a computer to commit real world crimes.
E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
TYPEs OF CYBERCRiME
o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES
WITH COMPUTERS
o Unauthorized use of a computer.
o Cybercrime may be committed by creating or releasing a malicious computer program.
(E.g. computer virus, worm. Trojan horse).
o Cybercrime may be committed by harassment and stalking in cyberspace.
BROAD CLASSiFICATiON
THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED UNDER THIS
FOLLOWING THREE GROUPS. THEY ARE . . .
o AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
o AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
o AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, Online gambling, ETC.
MiSUSE OF
INFORMATiON TECHNOLOGiEs
o UNAUTHORIZED ACCESS & HACKING
Hacking is a simple term means illegal intrusion into a computer system without the
permission of the computer owner/user.
o VIRUS DISSEMINATION
Virus itself is software that attacks other software. It may cause for data loss, deduction of
bandwidth speed, hardware damage etc. Trojan horse, Time Bomb, Logic Bomb, ETC.
o SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or distribution of
products intended to pass for the original.
o CREDIT CARD FRAUD
You simply have to type credit card number into www page of the vendor for online
transaction. If electronic transactions are not secured the credit card numbers can be stolen
by the hackers who can misuse that card.
o SALE OF ILLEGAL ARTICLES
weapons, wild life etc. are sold by posting information on websites, or simply by using
email communication. Many of auction sites are believed to be selling cocaine in the name
of money.
o EMAIL BOMBING
Email bombing can be committed by sending huge number of emails to the victim resulting
in the victim’s email account crashes.
o EMAIL SPOOFING
A spoofed email is one that appears to originate from one source but actually has been sent
from another source.
o TROJAN ATTACK
The program that act like something useful but do the things that are quiet damping. The
programs of this kind are called as Trojans.
o SALAMI ATTACKS
For the commission of financial crimes salami attacks are used.
o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING,
PORNOGRAPHY, ETC.
REASONs
OF CYBERCRiME
o LACK OF EVIDENCE
o EASY TO ACCESS
The problem encountered in guarding a computer system
from unauthorized access is that there is every possibility
of breach not due to human error but due to the complex
technology.
o COMPLEX
Due to complex computing system it is very hard to find
out the cyber criminal.
o NEGLIGENCE
Negligence is very closely connected with human conduct.
Which provides a cybercriminal to gain access and control
over the computer system.
o CAPACITY TO STORE DATA IN SMALL SPACE
PROFiLE OF CYBER CRiMINALS
o Cyber criminals is constitute of various groups/ category. This division may be justified on
the basis of the object that they have in their mind. The following are the category of cyber
criminals . . .
o Organized hackers these kinds of hackers are mostly organized
together to fulfill certain objective.
o Professional hackers / crackers their work is motivated by the
color of money.
o Discontented employees. This group includes those people who have
been either dismissed from their job or are dissatisfied with their job.
IMPACT
OF CYBERCRiME
o Cybercrimes committed against people include various
crimes like transmission of child pornography and harassment
through e-mail. The trafficking, distribution, posting, and
dissemination of obscene material including pornography
constitute one of the most important cybercrimes known
today. Cyber harassment is a distinct cybercrime. Harassment
can be sexual, racial, religious, or other. fraud & cheating,
web jacking, pirated software are increasing day by day via
cybercriminals.
o Cybercrime has already become a going concern in both
private as well as public sector in Bangladesh. During the
last decade private and public sector has done a revolution
with the use of technical enhancement. Due to
unauthorized access to the system, company loses huge
confidential information which caused a large amount of
financial lose.
LEGAL RESPONSE
TO CYBERCRiME
IN BANGLADESH
o In order to safe e-commerce and encourage the growth of
information technology, the ICT Act, 2006 was passed
making provisions with a maximum punishment of 10
years imprisonment or fine up to taka 10 million or with
both. However, recently our Parliament approved the ICT
Act 2006, raising penalties for cybercrimes setting a
minimum of 7 years imprisonment and a maximum of 14
years or a fine of Tk. 1 core or both.
CYBER TRIBUNAL
o According to section 68 of the Information and
Communication Technology Act, 2006 for the speedy and
effective disposal of cases under this Act, Government shall
establish one or more cyber tribunal. The tribunal shall try
only the offences under this Act and the Government shall
determine the local jurisdiction of the tribunal. In
consultation with the Supreme Court, Government shall
appoint on Sessions Judge or Additional Sessions Judge as a
judge of Cyber Tribunal.
CONCLUSiON
o Basically, no notable cybercrime has yet been committed in Bangladesh. The gradual
dependence and extensive use of computer and information technology by the financial
institutions like bank, insurance company, and other non-government organizations
increase the fear of commission of cybercrime here but we have to alert about the
potential threat of cybercrime.
THANK YOU !

Weitere ähnliche Inhalte

Was ist angesagt?

Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladeshBank Alfalah Limited
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 

Was ist angesagt? (20)

Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 

Andere mochten auch

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Bangladesh Cyber Incident Trends 2012 & bdCERT Update
Bangladesh Cyber Incident Trends 2012 & bdCERT UpdateBangladesh Cyber Incident Trends 2012 & bdCERT Update
Bangladesh Cyber Incident Trends 2012 & bdCERT UpdateFakrul Alam
 
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )Md Raffiqunnabi Rumman
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Andere mochten auch (9)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Bangladesh Cyber Incident Trends 2012 & bdCERT Update
Bangladesh Cyber Incident Trends 2012 & bdCERT UpdateBangladesh Cyber Incident Trends 2012 & bdCERT Update
Bangladesh Cyber Incident Trends 2012 & bdCERT Update
 
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
 
End of HR
 End of HR  End of HR
End of HR
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Ähnlich wie Cybercrime ppt

Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 

Ähnlich wie Cybercrime ppt (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
English in written
English in writtenEnglish in written
English in written
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 

Mehr von Grant Thornton Bangladesh

Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyGrant Thornton Bangladesh
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaGrant Thornton Bangladesh
 
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankGrant Thornton Bangladesh
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Grant Thornton Bangladesh
 
Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Grant Thornton Bangladesh
 

Mehr von Grant Thornton Bangladesh (19)

Technical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDTTechnical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDT
 
Report of Banking Company
Report of Banking CompanyReport of Banking Company
Report of Banking Company
 
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio Analysis
 
Louis Vuitton
Louis VuittonLouis Vuitton
Louis Vuitton
 
Horizontal Communication
Horizontal CommunicationHorizontal Communication
Horizontal Communication
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of Lankabangla
 
Insurance
Insurance Insurance
Insurance
 
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City Bank
 
Agricultural revolution. 1ppt
Agricultural revolution. 1pptAgricultural revolution. 1ppt
Agricultural revolution. 1ppt
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Management
ManagementManagement
Management
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)
 
Louis vuitton
Louis vuittonLouis vuitton
Louis vuitton
 
principle of management
principle of managementprinciple of management
principle of management
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2
 
Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1
 

Kürzlich hochgeladen

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Kürzlich hochgeladen (20)

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Cybercrime ppt

  • 1. CYBERCRiME AND IT’s IMPACT iN BANGLADESH PRESENT BY, SAHA, MRIDUL BUSHRA, KANIZ FATEMA & JOTHY, MD FUAD HASSAN
  • 2. TABLE OF CONTENTs o ABSTRACT o PROFILE OF CYBER CRIMINALS o CYBERCRIME o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER o TYPES OF CYBERCRIME o BROAD CLASSIFICATION o MISUSE OF INFORMATION TECHNOLOGIES o REASONS OF CYBERCRIME o INTRODUCTION o IMPACT OF CYBERCRIME o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH o NECESSARY POLICIES TO TACKLE CYBERCRIME IN BANGLADESH o CYBER TRIBUNAL o CONCLUSION
  • 3. ABSTRACT o Cyber and technology related crime is gradually increasing in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website and e-mail threats of former prime minister is example for few of them. o In the Information and Communication Technology Act-2006 and ICT (Amendment) Act- 2013 there are several clauses against cybercrime. But this Information and Communication Technology act is not the concrete one. o So, considering these facts a comprehensive Cybercrime Protection Act should be imposed. This presentation will focus on the impacts of cybercrime in Bangladesh especially focuses on the area of Personal life, Workplace as well as Policy making Bodies or thinkers. We believe that this presentation would help you and all relevant concerns and policy makers.
  • 4. INTRODUCTiON o Cyber-crime has had a short but highly eventful history. Observing the history of cybercrime would give the individual and society the opportunity to avoid the mistake made in past. The past recorded cybercrime took place in the year 1820! o In our daily life, economic activities, and national security highly depend on stability, safety of our cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government various services. But . . . . “Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps”
  • 5. CYBERCRIME o In General, Cybercrime may be said to be those offences, of which, genus is the conventional Crime, and where either the computer is an object or subject of the conduct online crime. “Any criminal activity that uses a computer either an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cybercrime”.
  • 6. CYBERCRiMES IN TWO WAYs BASED ON USE OF COMPUTER . . o THE COMPUTER AS A TARGET Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. o THE COMPUTER AS A WEAPON Using a computer to commit real world crimes. E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 7. TYPEs OF CYBERCRiME o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES WITH COMPUTERS o Unauthorized use of a computer. o Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, worm. Trojan horse). o Cybercrime may be committed by harassment and stalking in cyberspace.
  • 8. BROAD CLASSiFICATiON THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED UNDER THIS FOLLOWING THREE GROUPS. THEY ARE . . . o AGAINST INDIVIDUALS A. Person & B. Property of an individual o AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. o AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, Online gambling, ETC.
  • 9. MiSUSE OF INFORMATiON TECHNOLOGiEs o UNAUTHORIZED ACCESS & HACKING Hacking is a simple term means illegal intrusion into a computer system without the permission of the computer owner/user. o VIRUS DISSEMINATION Virus itself is software that attacks other software. It may cause for data loss, deduction of bandwidth speed, hardware damage etc. Trojan horse, Time Bomb, Logic Bomb, ETC. o SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or distribution of products intended to pass for the original. o CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse that card.
  • 10. o SALE OF ILLEGAL ARTICLES weapons, wild life etc. are sold by posting information on websites, or simply by using email communication. Many of auction sites are believed to be selling cocaine in the name of money. o EMAIL BOMBING Email bombing can be committed by sending huge number of emails to the victim resulting in the victim’s email account crashes. o EMAIL SPOOFING A spoofed email is one that appears to originate from one source but actually has been sent from another source. o TROJAN ATTACK The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. o SALAMI ATTACKS For the commission of financial crimes salami attacks are used. o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING, PORNOGRAPHY, ETC.
  • 11. REASONs OF CYBERCRiME o LACK OF EVIDENCE o EASY TO ACCESS The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. o COMPLEX Due to complex computing system it is very hard to find out the cyber criminal. o NEGLIGENCE Negligence is very closely connected with human conduct. Which provides a cybercriminal to gain access and control over the computer system. o CAPACITY TO STORE DATA IN SMALL SPACE
  • 12. PROFiLE OF CYBER CRiMINALS o Cyber criminals is constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals . . . o Organized hackers these kinds of hackers are mostly organized together to fulfill certain objective. o Professional hackers / crackers their work is motivated by the color of money. o Discontented employees. This group includes those people who have been either dismissed from their job or are dissatisfied with their job.
  • 13. IMPACT OF CYBERCRiME o Cybercrimes committed against people include various crimes like transmission of child pornography and harassment through e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography constitute one of the most important cybercrimes known today. Cyber harassment is a distinct cybercrime. Harassment can be sexual, racial, religious, or other. fraud & cheating, web jacking, pirated software are increasing day by day via cybercriminals. o Cybercrime has already become a going concern in both private as well as public sector in Bangladesh. During the last decade private and public sector has done a revolution with the use of technical enhancement. Due to unauthorized access to the system, company loses huge confidential information which caused a large amount of financial lose.
  • 14. LEGAL RESPONSE TO CYBERCRiME IN BANGLADESH o In order to safe e-commerce and encourage the growth of information technology, the ICT Act, 2006 was passed making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or with both. However, recently our Parliament approved the ICT Act 2006, raising penalties for cybercrimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 core or both.
  • 15. CYBER TRIBUNAL o According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. The tribunal shall try only the offences under this Act and the Government shall determine the local jurisdiction of the tribunal. In consultation with the Supreme Court, Government shall appoint on Sessions Judge or Additional Sessions Judge as a judge of Cyber Tribunal.
  • 16. CONCLUSiON o Basically, no notable cybercrime has yet been committed in Bangladesh. The gradual dependence and extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations increase the fear of commission of cybercrime here but we have to alert about the potential threat of cybercrime.