SlideShare a Scribd company logo
1 of 21
Computer Crime
Presented By:
Tasmin Farid Tonney
Presented To:
Prof. Dr. Md. Monirul Islam
Professor, Dept. of CSE
IIUC
Things We are going to Discuss:
What is computer crime?
First Cyber Crime
Categories of computer crime and Their Description
Types of Computer Crime and Their Descriptions
Expansion of computer crime
Top 5 most notorious cyber attacks in history
Pie Chart
International Law on Cyber Space and Digital Sovereignty
Cyber Crime in Bangladesh
Cyber law in Bangladesh
Prevention and Steps to be secured
Conclusion
References
What is
Computer Crime?
Computer Crime is any
criminal activity that uses a
computer.
It is also known as cyber
crime.
Cybercrime may threaten a
person, company or a nation's
security and financial health.
First Cyber Crime
Happened in 1820
Joseph-Marie
Jacquard, a textile
manufacturer in
France, produced the
loom.
This device allowed
the repetition of a
series of steps in the
weaving of special
fabrics.
This resulted in a fear
amongst Jacquard's
employees that their
traditional employment
and livelihood were
being threatened.
They committed acts
of sabotage to
discourage Jacquard
from further use of
the new technology.
This is the first
recorded cyber crime!
Categories of Computer Crime
“There are three general categories of computer crime:
targets, means, and incidentals” (Britz, 2009, p. 51),
however these three are not necessarily mutually exclusive
of one another. Many computer crimes “involve a
multiplicity of intentions”
So, There are Three categories:
1. Targets
2. Means
3. Incidentals
Description Of The Categories
Targets: The computer is the intended target of a criminal, as may (or may
not) be the case with hacking. Ex: Hacking, DDoS Attack etc.
Means: In this instance, the computer is the means through which the
criminal can gain access of stored information. Ex: harassing, stalking, and
crimes against persons, including physical and psychological harm etc.
Crimes have occurred in both instances:
the use of the computer by the criminal
the targeted theft of information from the hacked computer system
Incidentals: Computer crimes dealing with incidentals exist when a
computer has played a minor role in an offense. Ex: Malware, Trojan horse
etc
Child
Pornograph
y
01
Creating
Malware
03
Fraud
04
Enrollment
Process
Types of Computer Crime
02
Cyberbully
Identity
Theft
Money
Laundering
Malware
Software
piracy
Phishing
Scam
Spamming
Unauthorized
Access
Doxing
Cyber
Terrorism
05
06
07
08
09
10
11
12
13
14
15
Description of The Types
Child pornography - Making or distributing child pornography.
Copyright violation - Stealing or using another person's Copyrighted material
without permission.
Cracking - Breaking or deciphering codes designed to protect data.
Cyberbullying or Cyberstalking - Harassing or stalking others online.
Creating Malware - Writing, creating, or distributing malware (e.g., viruses and
spyware.)
Cyber terrorism - Hacking, threats, and blackmailing towards a business or
person.
Description of The Types
Doxing - Releasing another person's personal information without their
permission.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
Human trafficking - Participating in the illegal act of buying or selling other
humans.
Identity theft - Pretending to be someone you are not.
Illegal sales - Buying or selling illicit goods online, including drugs, guns, and
psychotropic substances.
Scam - Tricking people into believing something that is not true.
Description of The Types
Phishing or vishing - Deceiving individuals to gain private or personal information
about that person.
Software piracy - Copying, distributing, or using software that was not purchased
by the user of the software.
Spamming - Distributed unsolicited e-mail to dozens or hundreds of different
addresses.
Unauthorized access - Gaining access to systems you have no permission to
access.
Espionage - Spying on a person or business.
Expansion of Computer Crime
List of Top 20 Countries with the
highest rate of Cybercrime:
1. United States of America
2. China
3. Germany
4. Britain
5. Brazil
6. Spain
7. Italy
8. France
9. Turkey
10. Poland
Top 5 most notorious cyber
attacks in history
1. Google China hit by cyber attack (2009)
2. Teen hacks NASA and US Defense
Department
3. Phone lines blocked to win Porsche (1995)
4. Hacker targets Scientology (2008)
5. Robert Tappan Morris and the Morris Worm
(1988)
Pie Chart
80.7%
Percentage that shows at
least one successful attack
in 2020
19.3%
Percentage that shows the
remaining portion that’s not
affected in 2020
International Law on Cyber
Space and Digital Sovereignty
The complexities and challenges of international law on
cyberspace are increasingly deprived by a recent trend
on digital sovereignty promotions. Digital sovereignty is
the idea to control and govern access, information,
communication, network, and infrastructure in digital
realm by international actors (Couture & Toupin, 2019).
It is a significant issue in Bangladesh. It has already
been seen that a glomming threat becomes visible in the
arena of information technology. Recently the hacking of
RAB website, ATM card skimming, Bangladesh Bank
heist, Terrorist Activities in social Medias are few
examples of them.
Cyber Crime in Bangladesh
Cyber Law in Bangladesh
Punishment for
tampering with computer
source documents
Section 67
Section 66
For Hacking with
computer System
Punishment for hacking
Section 68
In Bangladesh, A Draft Bill on Information and Communication
Technology has been introduced in the Parliament.
The final report on the Law on Information Technology was
approved by the Office of the Law Commission in its meeting
dated 08.09.2002.
Cyber Crime Prevention
● Use Strong Passwords
● Secure your computer:
Activate your firewall
Use anti-virus/malware software
Block spyware attacks
● Be Social-Media Savvy
● Secure your Mobile Devices
● Install the latest operating system updates
● Protect your Data
● Secure your wireless network
● Protect your e-identity
● Avoid being scammed
● Call the right person for help
What to do if you get attacked?
Don’t get panicked and don’t do like the instructions of the criminals
Keep a backup of all your data Practice smart cyber security
habits
Call the right person for help
annually lost to cybercrime as attackers are becoming increasingly
sophisticated in their approach, adopting new technologies and
leveraging black markets and digital currencies.
600 Billion
Conclusion
As much as is
We should be more careful in the world of cyber
security to eradicate dangerous losses
and to be safe.
References
● https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia-
biggest-cyber-offenders-since-2006-report-shows
● http://www.bezaspeaks.com/cybercrime/history.htm
● https://criminal.findlaw.com/criminal-charges/computer-crime.html
● https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in-
bangladesh-information-technology-essay.php
● https://www.cybercrimelaw.net/Bangladesh.html
● https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work
● https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English-
version.pdf
● https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as
_sdt=0&as_vis=1&oi=scholart
● https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer-
crimes.aspx/
● https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html
● And many more…...
Thank
you!
Be Safe
Be Secured
!!!!!

More Related Content

What's hot

Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 

Similar to Computer Crime

Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Similar to Computer Crime (20)

Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Computer Crime

  • 1. Computer Crime Presented By: Tasmin Farid Tonney Presented To: Prof. Dr. Md. Monirul Islam Professor, Dept. of CSE IIUC
  • 2. Things We are going to Discuss: What is computer crime? First Cyber Crime Categories of computer crime and Their Description Types of Computer Crime and Their Descriptions Expansion of computer crime Top 5 most notorious cyber attacks in history Pie Chart International Law on Cyber Space and Digital Sovereignty Cyber Crime in Bangladesh Cyber law in Bangladesh Prevention and Steps to be secured Conclusion References
  • 3. What is Computer Crime? Computer Crime is any criminal activity that uses a computer. It is also known as cyber crime. Cybercrime may threaten a person, company or a nation's security and financial health.
  • 4. First Cyber Crime Happened in 1820 Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. Categories of Computer Crime “There are three general categories of computer crime: targets, means, and incidentals” (Britz, 2009, p. 51), however these three are not necessarily mutually exclusive of one another. Many computer crimes “involve a multiplicity of intentions” So, There are Three categories: 1. Targets 2. Means 3. Incidentals
  • 6. Description Of The Categories Targets: The computer is the intended target of a criminal, as may (or may not) be the case with hacking. Ex: Hacking, DDoS Attack etc. Means: In this instance, the computer is the means through which the criminal can gain access of stored information. Ex: harassing, stalking, and crimes against persons, including physical and psychological harm etc. Crimes have occurred in both instances: the use of the computer by the criminal the targeted theft of information from the hacked computer system Incidentals: Computer crimes dealing with incidentals exist when a computer has played a minor role in an offense. Ex: Malware, Trojan horse etc
  • 7. Child Pornograph y 01 Creating Malware 03 Fraud 04 Enrollment Process Types of Computer Crime 02 Cyberbully Identity Theft Money Laundering Malware Software piracy Phishing Scam Spamming Unauthorized Access Doxing Cyber Terrorism 05 06 07 08 09 10 11 12 13 14 15
  • 8. Description of The Types Child pornography - Making or distributing child pornography. Copyright violation - Stealing or using another person's Copyrighted material without permission. Cracking - Breaking or deciphering codes designed to protect data. Cyberbullying or Cyberstalking - Harassing or stalking others online. Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.) Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
  • 9. Description of The Types Doxing - Releasing another person's personal information without their permission. Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud. Human trafficking - Participating in the illegal act of buying or selling other humans. Identity theft - Pretending to be someone you are not. Illegal sales - Buying or selling illicit goods online, including drugs, guns, and psychotropic substances. Scam - Tricking people into believing something that is not true.
  • 10. Description of The Types Phishing or vishing - Deceiving individuals to gain private or personal information about that person. Software piracy - Copying, distributing, or using software that was not purchased by the user of the software. Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses. Unauthorized access - Gaining access to systems you have no permission to access. Espionage - Spying on a person or business.
  • 11. Expansion of Computer Crime List of Top 20 Countries with the highest rate of Cybercrime: 1. United States of America 2. China 3. Germany 4. Britain 5. Brazil 6. Spain 7. Italy 8. France 9. Turkey 10. Poland
  • 12. Top 5 most notorious cyber attacks in history 1. Google China hit by cyber attack (2009) 2. Teen hacks NASA and US Defense Department 3. Phone lines blocked to win Porsche (1995) 4. Hacker targets Scientology (2008) 5. Robert Tappan Morris and the Morris Worm (1988)
  • 13. Pie Chart 80.7% Percentage that shows at least one successful attack in 2020 19.3% Percentage that shows the remaining portion that’s not affected in 2020
  • 14. International Law on Cyber Space and Digital Sovereignty The complexities and challenges of international law on cyberspace are increasingly deprived by a recent trend on digital sovereignty promotions. Digital sovereignty is the idea to control and govern access, information, communication, network, and infrastructure in digital realm by international actors (Couture & Toupin, 2019).
  • 15. It is a significant issue in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website, ATM card skimming, Bangladesh Bank heist, Terrorist Activities in social Medias are few examples of them. Cyber Crime in Bangladesh
  • 16. Cyber Law in Bangladesh Punishment for tampering with computer source documents Section 67 Section 66 For Hacking with computer System Punishment for hacking Section 68 In Bangladesh, A Draft Bill on Information and Communication Technology has been introduced in the Parliament. The final report on the Law on Information Technology was approved by the Office of the Law Commission in its meeting dated 08.09.2002.
  • 17. Cyber Crime Prevention ● Use Strong Passwords ● Secure your computer: Activate your firewall Use anti-virus/malware software Block spyware attacks ● Be Social-Media Savvy ● Secure your Mobile Devices ● Install the latest operating system updates ● Protect your Data ● Secure your wireless network ● Protect your e-identity ● Avoid being scammed ● Call the right person for help
  • 18. What to do if you get attacked? Don’t get panicked and don’t do like the instructions of the criminals Keep a backup of all your data Practice smart cyber security habits Call the right person for help
  • 19. annually lost to cybercrime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 600 Billion Conclusion As much as is We should be more careful in the world of cyber security to eradicate dangerous losses and to be safe.
  • 20. References ● https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia- biggest-cyber-offenders-since-2006-report-shows ● http://www.bezaspeaks.com/cybercrime/history.htm ● https://criminal.findlaw.com/criminal-charges/computer-crime.html ● https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in- bangladesh-information-technology-essay.php ● https://www.cybercrimelaw.net/Bangladesh.html ● https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work ● https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English- version.pdf ● https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as _sdt=0&as_vis=1&oi=scholart ● https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer- crimes.aspx/ ● https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html ● And many more…...