Computer crime
Upcoming SlideShare
Loading in...5
×
 

Computer crime

on

  • 4,070 views

 

Statistics

Views

Total Views
4,070
Slideshare-icon Views on SlideShare
4,069
Embed Views
1

Actions

Likes
4
Downloads
293
Comments
0

1 Embed 1

http://darya-ld1.linkedin.biz 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

     Computer crime Computer crime Presentation Transcript

    • COMPUTER
      CRIME
    • Submitted To: Naim. A. Dewan
      Mehreen Mahmood-1020407030
      Anika Rahman-1020838030
      March 29, 2011
    • A computer crime is any unlawful activity that is done using a computer
    • The First Incident of Cyber Crime
      The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology.
      The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
    • Types of Cyber Crime
      Viruses and Worms
      Viruses are programs that attach themselves to a computer or a file.
      They then circulate themselves to other files and to other computers on a network.
      Worms, unlike viruses do not need the host to attach themselves to.
      They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
    • 2. Denial-of-Service-Attacks
      These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis.
      3. Malware
      Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission.
      Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
    • 4. Hacking
      Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
    • 5. Software Piracy
      Unauthorized copying of purchased software is called software piracy.
      Making copies of the software for commercial distribution, or resale is illegal.
      However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
    • 6. Fraud
      Online fraud and cheating
      is one of the most lucrative
      businesses that are growing
      today in the cyber space.
      Some of the cases of online fraud
      and cheating that have come to
      light are those relating to credit card
      crimes, bank fraud, contractual
      crimes, internet scams, identity theft, extortion etc.
    • 7. Cyber stalking
      Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
    • 8. Obscene or Offensive Content
      Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography.
      Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
    • 9. Harassment
      Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
    • 10. Trafficking
      Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
    • 11. Computer Vandalism
      Vandalism means deliberately destroying or damaging property of another.
      These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
    • 12. Spam
      The unwanted sending of bulk e-mail for commercial purposes is called spam.
      Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
    • Prevention of Computer Crime
    • Top 20 countries that commit the most Cyber Crimes
    • A Comparison of Software Piracy Rates in the World
    • Software Piracy in Bangladesh
      The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
    • COMPUTER CRIME-BANGLADESH
      Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
    • CONCLUSION
      Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.
    • Any
      Questions