COMPUTERCRIME
Submitted To: Naim. A. DewanMehreen Mahmood-1020407030Anika Rahman-1020838030March 29, 2011
	A computer crime is any unlawful activity that is done using a computer
The First Incident of Cyber CrimeThe first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology.The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
Types of Cyber CrimeViruses and WormsViruses are programs that attach 	themselves to a computer or a file. 	 	They then circulate themselves to other 	files and to other computers on a 	network.	 	Worms, unlike viruses do not need the 	host to attach themselves to. 		They merely make functional copies of 	themselves and do this repeatedly till 	they eat up all the available space on a 	computer's memory.
2. Denial-of-Service-AttacksThese attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis.3.   MalwareMalware means malicious software. It is designed to secretly access an individual’s computer without his/her permission. 	Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
4. HackingHacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
5. Software PiracyUnauthorized copying of purchased software is called software piracy. 	Making copies of the software for commercial distribution, or resale is illegal. 	However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
6. FraudOnline fraud and cheating 	is one of the most lucrativebusinesses that are growing 	today in the cyber space. 	Some of the cases of online fraud 	and cheating that have come to 	light are those relating to credit card 	crimes, bank fraud, contractual 	crimes, internet scams, identity theft, extortion etc.
7. Cyber stalkingCyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
8. Obscene or Offensive ContentIncludes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography.Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
9. HarassmentAny comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
10. TraffickingTrafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
11. Computer  Vandalism      Vandalism means deliberately destroying or damaging property of another.       These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
12. Spam	The unwanted sending of bulk e-mail for commercial purposes is called spam.Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
Prevention of Computer Crime
Top 20 countries that commit the most Cyber Crimes
A Comparison of Software Piracy Rates in the World
Software Piracy in BangladeshThe biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
COMPUTER CRIME-BANGLADESH	Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber  crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
CONCLUSIONAlthough it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.
AnyQuestions

Computer crime

  • 1.
  • 2.
    Submitted To: Naim.A. DewanMehreen Mahmood-1020407030Anika Rahman-1020838030March 29, 2011
  • 3.
    A computer crimeis any unlawful activity that is done using a computer
  • 4.
    The First Incidentof Cyber CrimeThe first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology.The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
  • 6.
    Types of CyberCrimeViruses and WormsViruses are programs that attach themselves to a computer or a file. They then circulate themselves to other files and to other computers on a network. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 7.
    2. Denial-of-Service-AttacksThese attacksoccur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis.3. MalwareMalware means malicious software. It is designed to secretly access an individual’s computer without his/her permission. Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
  • 8.
    4. HackingHacking isunauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
  • 9.
    5. Software PiracyUnauthorizedcopying of purchased software is called software piracy. Making copies of the software for commercial distribution, or resale is illegal. However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
  • 10.
    6. FraudOnline fraudand cheating is one of the most lucrativebusinesses that are growing today in the cyber space. Some of the cases of online fraud and cheating that have come to light are those relating to credit card crimes, bank fraud, contractual crimes, internet scams, identity theft, extortion etc.
  • 11.
    7. Cyber stalkingCyberstalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
  • 12.
    8. Obscene orOffensive ContentIncludes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography.Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
  • 13.
    9. HarassmentAny commentthat may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
  • 14.
    10. TraffickingTrafficking mayassume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
  • 15.
    11. Computer Vandalism Vandalism means deliberately destroying or damaging property of another. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
  • 16.
    12. Spam The unwantedsending of bulk e-mail for commercial purposes is called spam.Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
  • 17.
  • 18.
    Top 20 countriesthat commit the most Cyber Crimes
  • 19.
    A Comparison ofSoftware Piracy Rates in the World
  • 20.
    Software Piracy inBangladeshThe biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
  • 21.
    COMPUTER CRIME-BANGLADESH Basically, withthe exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
  • 22.
    CONCLUSIONAlthough it willnot be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.
  • 23.