Computer crime


Published on

Published in: Technology
1 Comment
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer crime

  1. 1. COMPUTER<br />CRIME<br />
  2. 2. Submitted To: Naim. A. Dewan<br />Mehreen Mahmood-1020407030<br />Anika Rahman-1020838030<br />March 29, 2011<br />
  3. 3. A computer crime is any unlawful activity that is done using a computer<br />
  4. 4. The First Incident of Cyber Crime<br />The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology.<br />The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.<br />
  5. 5.
  6. 6. Types of Cyber Crime<br />Viruses and Worms<br />Viruses are programs that attach themselves to a computer or a file. <br /> They then circulate themselves to other files and to other computers on a network.<br /> Worms, unlike viruses do not need the host to attach themselves to. <br /> They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.<br />
  7. 7. 2. Denial-of-Service-Attacks<br />These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis.<br />3. Malware<br />Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission. <br /> Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.<br />
  8. 8. 4. Hacking<br />Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.<br />
  9. 9. 5. Software Piracy<br />Unauthorized copying of purchased software is called software piracy. <br /> Making copies of the software for commercial distribution, or resale is illegal. <br /> However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.<br />
  10. 10. 6. Fraud<br />Online fraud and cheating <br /> is one of the most lucrative<br />businesses that are growing <br /> today in the cyber space. <br /> Some of the cases of online fraud <br /> and cheating that have come to <br /> light are those relating to credit card <br /> crimes, bank fraud, contractual <br /> crimes, internet scams, identity theft, extortion etc.<br />
  11. 11. 7. Cyber stalking<br />Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.<br />
  12. 12. 8. Obscene or Offensive Content<br />Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography.<br />Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts. <br />
  13. 13. 9. Harassment<br />Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.<br />
  14. 14. 10. Trafficking<br />Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology. <br />
  15. 15. 11. Computer Vandalism<br /> Vandalism means deliberately destroying or damaging property of another. <br /> These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals. <br />
  16. 16. 12. Spam<br /> The unwanted sending of bulk e-mail for commercial purposes is called spam.<br />Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails. <br />
  17. 17. Prevention of Computer Crime<br />
  18. 18. Top 20 countries that commit the most Cyber Crimes<br />
  19. 19. A Comparison of Software Piracy Rates in the World<br />
  20. 20. Software Piracy in Bangladesh<br />The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.<br />
  21. 21. COMPUTER CRIME-BANGLADESH<br /> Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.<br />
  22. 22. CONCLUSION<br />Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.<br />
  23. 23. Any<br />Questions<br />