Cyber Crime
Group Member
Israt Zahan Islam (17121002)
Anika Tahsin Raonak (17121014)
Mehjabin Chowdhury (17121024)
Ashraful Alam (17121031)
Sunmoyee Das (17121037)
• About Cyber Crime
• History of Cyber Crime
• Types of Cyber Crime
• Safety tips to cyber crime
Cyber Crime
 computer is the object of the crime (hacking, phishing, spamming) or is
used as a tool to commit an offense (child pornography, hate crimes).
 Cybercriminals may use computer technology to access personal
information, business trade secrets, or use the Internet for exploitive or
malicious purposes.
 Criminals who perform these illegal activities are often referred to as
hackers.
History of Cyber Crime
First recorded of it took place in 1820
The first spam e-mail took place in 1976
The first virus was installed on an Apple computer in 1982
Types of Cyber Crimes
 Hacking
 Theft
 Cyber Stalking
 Identity Theft
 Malicious Software
 Cyber Defamation
 E-mail spoofing
 Child soliciting and abuse
 Hacking is identifying weakness in computer systems or networks to
exploit its weaknesses to gain access
 This is different from ethical hacking, which many organizations use to
check their Internet security protection
 Example:
Using password cracking algorithm to gain access to system
Types (Hacking)
Types (Theft)
 This crime occurs when a person violates copyrights and downloads music, movies,
games and software
 There are even peer sharing websites which encourage software piracy and many of
these websites are now being targeted by the FBI
 Currently, the justice system is addressing this cyber crime and there are laws that
prevent people from illegal downloading
Types (Cyber Stalking)
 This is a kind of online harassment wherein the victim is subjected to a
barrage of online messages and emails.
 Typically, these stalkers know their victims and instead of resorting to
offline stalking, they use the Internet to stalk
 However, if they notice that cyber stalking is not having the desired
effect, they begin offline stalking along with cyber stalking to make the
victims' lives more miserable.
In this cyber crime, a criminal accesses data about a person's bank account,
credit cards, social security, debit card and other sensitive information to
siphon money or to buy things online in the victim's name.
It can result in major financial losses for the victim and even spoil the
victim's credit history.
Type(Identity Theft)
Types ( Malicious Software)
 These are Internet-based software or programs that are used to disrupt a
network
 The software is used to gain access to a system to steal sensitive
information or data or causing damage to software present in the system.
This occurs when defamation takes place with the
help of computers and or the Internet e.g.
someone publishes defamatory matter(s) about
someone on websites or sends e-mail to his
friends containing defamatory information.
Types ( E-mail Spoofing)
A spoofed email is that email which appears to originate from one
source but actually has been sent from another source
This can also be termed as e-mail forging.
Types (Child Soliciting and Abuse)
This is also a type of cyber crime wherein criminals solicit minors via chat
rooms for the purpose of child pornography
The FBI has been spending a lot of time monitoring chat rooms frequented
by children with the hopes of reducing and preventing child abuse and
soliciting.
Perpetrators of Cyber Crime
Not just hackers (company’s seeking competitors trade secret)
The internet should be viewed as another medium in which
criminals can conduct illegal acts
Victims
Companies (No security awareness)
Society as a whole
Individuals
1) Unaware individuals
2)Do not care individuals
International perspective on cyber crime
USA - to protect the interests of internet businesses, the US Congress has
enacted new laws to regulate activities on the internet
the US has established a number of regulations on cybercrime
1) "National Infrastructure Protection Act of 1996“
2) "Cyberspace Electronic Security Act of 1999“
3) "Patriot Act of 2001“
Continuing…
England –
Two cyber crimes related Acts have been
passed by the British Parliament
1) the Data Protection Act of 1984
2) the Computer Misuse Act of 1990
Canada –
in 2001, the Canadian Parliament
passed the Criminal Law Amendment
Act
Cyber Crime In Bangladesh
• The biggest cyber crime we came across in Bangladesh is the Bank
heist of the central bank
• Hackers stole $100 million from the central bank of Bangladesh
 Money was Transferred via SWIFT
 But the bank reportedly managed to block a further transfer of $870
million initiated by attackers.
 Finance Minister Abul Mal Abul Muhith says his government holds
the New York Fed responsible for any unrecovered losses
 Information security experts say appears to be one of the largest
bank heists in history
In order to facilitate e-commerce and encourage the growth of information
technology, the Information and Communication Technology (ICT) Act,
2006 was enacted making provisions with a maximum punishment of 10
years imprisonment or fine up to taka 10 million or both
However, recently the National Parliament amended the ICT Act 2006,
raising penalties for cyber crimes setting a minimum of 7 years
imprisonment and a maximum of 14 years or a fine of Tk. 1 crore or both
The ICT Act, 2006 as amended in 2013 is obviously a brilliant achievement
of Bangladesh in the field of cyber law
Legal response to cyber crime in
Bangladesh
Tips to Protect from Cybercrime
 Create Strong Passwords
 Keep Private Information Private
 Lock the Computer
 Protect Your Computer
 Do Business with Reputable Vendors
 Report Suspicious Activity
 Use anti virus software
 Uninstall unnecessary software
 Maintain backup
 Check security settings
 Never give your full name or address to anyone
Conclusion
 It is highly necessary for everyone of us to create awareness
among us
 There is a whole other world that exists in cyberspace. One
needs to make sure that the information is passing safely.
References
http://thedailynewnation.com/m/news/100355/cyber-crime-and-cyber-
law-in-bangladesh
http://www.thedailystar.net/frontpage/new-law-curb-cybercrime-1274128
http://www.risingbd.com/english/cyber-crime-in-bangladesh-a-growing-
threat-in-digital-marketplace/28940
Thank You!!!!!!!

Cyber Crime

  • 1.
  • 2.
    Group Member Israt ZahanIslam (17121002) Anika Tahsin Raonak (17121014) Mehjabin Chowdhury (17121024) Ashraful Alam (17121031) Sunmoyee Das (17121037)
  • 3.
    • About CyberCrime • History of Cyber Crime • Types of Cyber Crime • Safety tips to cyber crime
  • 4.
    Cyber Crime  computeris the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).  Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes.  Criminals who perform these illegal activities are often referred to as hackers.
  • 5.
    History of CyberCrime First recorded of it took place in 1820 The first spam e-mail took place in 1976 The first virus was installed on an Apple computer in 1982
  • 6.
    Types of CyberCrimes  Hacking  Theft  Cyber Stalking  Identity Theft  Malicious Software  Cyber Defamation  E-mail spoofing  Child soliciting and abuse
  • 7.
     Hacking isidentifying weakness in computer systems or networks to exploit its weaknesses to gain access  This is different from ethical hacking, which many organizations use to check their Internet security protection  Example: Using password cracking algorithm to gain access to system Types (Hacking)
  • 8.
    Types (Theft)  Thiscrime occurs when a person violates copyrights and downloads music, movies, games and software  There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI  Currently, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading
  • 9.
    Types (Cyber Stalking) This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.  Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk  However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims' lives more miserable.
  • 10.
    In this cybercrime, a criminal accesses data about a person's bank account, credit cards, social security, debit card and other sensitive information to siphon money or to buy things online in the victim's name. It can result in major financial losses for the victim and even spoil the victim's credit history. Type(Identity Theft)
  • 11.
    Types ( MaliciousSoftware)  These are Internet-based software or programs that are used to disrupt a network  The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
  • 12.
    This occurs whendefamation takes place with the help of computers and or the Internet e.g. someone publishes defamatory matter(s) about someone on websites or sends e-mail to his friends containing defamatory information.
  • 13.
    Types ( E-mailSpoofing) A spoofed email is that email which appears to originate from one source but actually has been sent from another source This can also be termed as e-mail forging.
  • 14.
    Types (Child Solicitingand Abuse) This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
  • 15.
    Perpetrators of CyberCrime Not just hackers (company’s seeking competitors trade secret) The internet should be viewed as another medium in which criminals can conduct illegal acts
  • 16.
    Victims Companies (No securityawareness) Society as a whole Individuals 1) Unaware individuals 2)Do not care individuals
  • 17.
    International perspective oncyber crime USA - to protect the interests of internet businesses, the US Congress has enacted new laws to regulate activities on the internet the US has established a number of regulations on cybercrime 1) "National Infrastructure Protection Act of 1996“ 2) "Cyberspace Electronic Security Act of 1999“ 3) "Patriot Act of 2001“
  • 18.
    Continuing… England – Two cybercrimes related Acts have been passed by the British Parliament 1) the Data Protection Act of 1984 2) the Computer Misuse Act of 1990 Canada – in 2001, the Canadian Parliament passed the Criminal Law Amendment Act
  • 19.
    Cyber Crime InBangladesh • The biggest cyber crime we came across in Bangladesh is the Bank heist of the central bank • Hackers stole $100 million from the central bank of Bangladesh  Money was Transferred via SWIFT  But the bank reportedly managed to block a further transfer of $870 million initiated by attackers.  Finance Minister Abul Mal Abul Muhith says his government holds the New York Fed responsible for any unrecovered losses  Information security experts say appears to be one of the largest bank heists in history
  • 20.
    In order tofacilitate e-commerce and encourage the growth of information technology, the Information and Communication Technology (ICT) Act, 2006 was enacted making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or both However, recently the National Parliament amended the ICT Act 2006, raising penalties for cyber crimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 crore or both The ICT Act, 2006 as amended in 2013 is obviously a brilliant achievement of Bangladesh in the field of cyber law Legal response to cyber crime in Bangladesh
  • 21.
    Tips to Protectfrom Cybercrime  Create Strong Passwords  Keep Private Information Private  Lock the Computer  Protect Your Computer  Do Business with Reputable Vendors  Report Suspicious Activity  Use anti virus software  Uninstall unnecessary software  Maintain backup  Check security settings  Never give your full name or address to anyone
  • 22.
    Conclusion  It ishighly necessary for everyone of us to create awareness among us  There is a whole other world that exists in cyberspace. One needs to make sure that the information is passing safely.
  • 23.
  • 25.