SlideShare a Scribd company logo
1 of 23
COMPUTER CRIME
Submitted To: Naim. A. Dewan Mehreen Mahmood-1020407030 Anika Rahman-1020838030 March 29, 2011
	A computer crime is any unlawful activity that is done using a computer
The First Incident of Cyber Crime The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology. The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
Types of Cyber Crime Viruses and Worms Viruses are programs that attach 	themselves to a computer or a file.  	 	They then circulate themselves to other 	files and to other computers on a 	network. 	 	Worms, unlike viruses do not need the 	host to attach themselves to.  		They merely make functional copies of 	themselves and do this repeatedly till 	they eat up all the available space on a 	computer's memory.
2. Denial-of-Service-Attacks These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis. 3.   Malware Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission.  	Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
4. Hacking Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
5. Software Piracy Unauthorized copying of purchased software is called software piracy.  	Making copies of the software for commercial distribution, or resale is illegal.  	However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
6. Fraud Online fraud and cheating  	is one of the most lucrative businesses that are growing  	today in the cyber space.  	Some of the cases of online fraud  	and cheating that have come to  	light are those relating to credit card  	crimes, bank fraud, contractual  	crimes, internet scams, identity theft, extortion etc.
7. Cyber stalking Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
8. Obscene or Offensive Content Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography. Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
9. Harassment Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
10. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
11. Computer  Vandalism       Vandalism means deliberately destroying or damaging property of another.        These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
12. Spam 	The unwanted sending of bulk e-mail for commercial purposes is called spam. Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
Prevention of Computer Crime
Top 20 countries that commit the most Cyber Crimes
A Comparison of Software Piracy Rates in the World
Software Piracy in Bangladesh The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
COMPUTER CRIME-BANGLADESH 	Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber  crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
CONCLUSION Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.
Any Questions

More Related Content

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Security threats
Security threatsSecurity threats
Security threats
 
Data security
Data securityData security
Data security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Computer security and
Computer security andComputer security and
Computer security and
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 

Viewers also liked

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer assisted instruction
Computer assisted instructionComputer assisted instruction
Computer assisted instructionVinci Viveka
 
Computer Assisted Instruction
Computer Assisted InstructionComputer Assisted Instruction
Computer Assisted Instructionnancyd0703
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 

Viewers also liked (7)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer assisted instruction
Computer assisted instructionComputer assisted instruction
Computer assisted instruction
 
Computer as a teachers tool
Computer as a teachers toolComputer as a teachers tool
Computer as a teachers tool
 
Computer Assisted Instruction
Computer Assisted InstructionComputer Assisted Instruction
Computer Assisted Instruction
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Similar to Computer crime

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 

Similar to Computer crime (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 

Recently uploaded

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 

Recently uploaded (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Computer crime

  • 2. Submitted To: Naim. A. Dewan Mehreen Mahmood-1020407030 Anika Rahman-1020838030 March 29, 2011
  • 3. A computer crime is any unlawful activity that is done using a computer
  • 4. The First Incident of Cyber Crime The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology. The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
  • 5.
  • 6. Types of Cyber Crime Viruses and Worms Viruses are programs that attach themselves to a computer or a file. They then circulate themselves to other files and to other computers on a network. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 7. 2. Denial-of-Service-Attacks These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis. 3. Malware Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission. Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
  • 8. 4. Hacking Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
  • 9. 5. Software Piracy Unauthorized copying of purchased software is called software piracy. Making copies of the software for commercial distribution, or resale is illegal. However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
  • 10. 6. Fraud Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. Some of the cases of online fraud and cheating that have come to light are those relating to credit card crimes, bank fraud, contractual crimes, internet scams, identity theft, extortion etc.
  • 11. 7. Cyber stalking Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
  • 12. 8. Obscene or Offensive Content Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography. Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
  • 13. 9. Harassment Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
  • 14. 10. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
  • 15. 11. Computer Vandalism Vandalism means deliberately destroying or damaging property of another. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
  • 16. 12. Spam The unwanted sending of bulk e-mail for commercial purposes is called spam. Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
  • 18. Top 20 countries that commit the most Cyber Crimes
  • 19. A Comparison of Software Piracy Rates in the World
  • 20. Software Piracy in Bangladesh The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
  • 21. COMPUTER CRIME-BANGLADESH Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
  • 22. CONCLUSION Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.