SlideShare a Scribd company logo
1 of 16
Presentation Topic
Present Trend of Cyber Crime
Content
1. Introduction
2. What is Cyber Crime?
3. Types of Cyber Crime
4. Present Trend of Cyber Crime
5. Impact of Cyber Crime
6. Reasons of Cyber Crime
7. Cyber Law in Bangladesh
8. Conclusion
Introduction
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts where in
the computer either a tool or target or both.
 What is Cyber Crime?
Cyber crime is an ‘umbrella’ term for lots of different types of
crimes which either take place online or where technology is a
means and/or target for the attack.
It is one of the fastest growing criminal activities across the world,
and can affect both individuals and businesses
 Examples of Cyber Crime:
 E-Mail bombing
Malware
Spam
Copyright Infringement
Piracy
Cyber extortion Identity
Theft Phishing Carding
viruses
For comparison’s sake, let’s start with the largest
component and drill down:
World Wide Web (WWW) – The internet as accessible
through a web browser.
Surface Web – Portions of www that *are* indexed
by search engines, and thus, make up most of the
Internet that most of us use on a daily basis.
Deep Web – Portions of www that are globally
accessible, but not indexed by search engines.
Dark Web – Dark net services and sites that are only
accessible when using dark net networks. Also
known as “hidden services.”
Cyber crime
Surface web crime Dark web crime
Types of Cyber Crime :
What is Bitcoin?
Bitcoin is a new currency
that was created in 2009 by
an unknown person using
the alias Satoshi Nakamoto.
Transactions are made with
no middle men – meaning,
no banks! Bit-coin can be
used to book hotels on
Expedia, shop for furniture
on Overstock and buy Xbox
games. But much of the
hype is about getting rich by
trading it.
21.5
40
44
100
60
0
20
40
60
80
100
120
2007 2008 2009 2010 2011
Chart Largest Bandwidth Attacks of Bangladesh
Graph--
2007 2008 2009 2010 2011
 Misuse of Information Technology
Unauthorized access and hacking
Virus dissemination
Software piracy
Credit card fraud
Illegal sales of articles
Email bombing
Email spoofing
Cyber deformation
Email spamming
Pornography
 Present Trend of Cyber Crime:
1.Bangladesh Bank Heist 2016
2. Skype Scandal over International War Crime Tribunal
3. Bangladesh Computer society website hacked in 2012
4. Stealing the transaction report of Dhaka Stock Exchange
5.Partho threatening prime minister Sheikh Hasina through
email in 2004
6.Inserting porn movies to the Bangladesh National
Parliament website.
 Impact of cyber crime:
1. Impact against individual
2. Impact against individuals property
3. Impact against organization
4. Impact against government
5. Impact against society
 Reasons of cyber crime:
1. Easy to access
2. Weak security
3. Negligence
4. Loss of evidence
5. Weak gateway security
6. Bad intention of uses Internet
7. Unfamiliarity of technology
8. Absence of proper filter
& Others
 Cyber Law in Bangladesh:
1.Bangladesh plans for strict Cyber-Crime laws
2.The Information and Communication
Technology Act, 2006
3.Drafted Act
1. The Digital Security Act, 2016
Conclusion .
Thanks to All

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 

Similar to Cyber crime

Similar to Cyber crime (20)

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
English in written
English in writtenEnglish in written
English in written
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Computer crime
 Computer crime Computer crime
Computer crime
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Cyber crime

  • 2. Content 1. Introduction 2. What is Cyber Crime? 3. Types of Cyber Crime 4. Present Trend of Cyber Crime 5. Impact of Cyber Crime 6. Reasons of Cyber Crime 7. Cyber Law in Bangladesh 8. Conclusion
  • 3. Introduction Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts where in the computer either a tool or target or both.
  • 4.  What is Cyber Crime? Cyber crime is an ‘umbrella’ term for lots of different types of crimes which either take place online or where technology is a means and/or target for the attack. It is one of the fastest growing criminal activities across the world, and can affect both individuals and businesses
  • 5.  Examples of Cyber Crime:  E-Mail bombing Malware Spam Copyright Infringement Piracy Cyber extortion Identity Theft Phishing Carding viruses
  • 6. For comparison’s sake, let’s start with the largest component and drill down: World Wide Web (WWW) – The internet as accessible through a web browser. Surface Web – Portions of www that *are* indexed by search engines, and thus, make up most of the Internet that most of us use on a daily basis. Deep Web – Portions of www that are globally accessible, but not indexed by search engines. Dark Web – Dark net services and sites that are only accessible when using dark net networks. Also known as “hidden services.”
  • 7. Cyber crime Surface web crime Dark web crime Types of Cyber Crime :
  • 8. What is Bitcoin? Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! Bit-coin can be used to book hotels on Expedia, shop for furniture on Overstock and buy Xbox games. But much of the hype is about getting rich by trading it.
  • 9. 21.5 40 44 100 60 0 20 40 60 80 100 120 2007 2008 2009 2010 2011 Chart Largest Bandwidth Attacks of Bangladesh Graph-- 2007 2008 2009 2010 2011
  • 10.  Misuse of Information Technology Unauthorized access and hacking Virus dissemination Software piracy Credit card fraud Illegal sales of articles Email bombing Email spoofing Cyber deformation Email spamming Pornography
  • 11.  Present Trend of Cyber Crime: 1.Bangladesh Bank Heist 2016 2. Skype Scandal over International War Crime Tribunal 3. Bangladesh Computer society website hacked in 2012 4. Stealing the transaction report of Dhaka Stock Exchange 5.Partho threatening prime minister Sheikh Hasina through email in 2004 6.Inserting porn movies to the Bangladesh National Parliament website.
  • 12.  Impact of cyber crime: 1. Impact against individual 2. Impact against individuals property 3. Impact against organization 4. Impact against government 5. Impact against society
  • 13.  Reasons of cyber crime: 1. Easy to access 2. Weak security 3. Negligence 4. Loss of evidence 5. Weak gateway security 6. Bad intention of uses Internet 7. Unfamiliarity of technology 8. Absence of proper filter & Others
  • 14.  Cyber Law in Bangladesh: 1.Bangladesh plans for strict Cyber-Crime laws 2.The Information and Communication Technology Act, 2006 3.Drafted Act 1. The Digital Security Act, 2016