CYBER CRIME AND SECURITY
Department of BIOMEDICAKL ENGINEERING
Presented by:
KAZIM AHMED
CONTENTS
• Introduction
• Definition
• History
• Categories of cyber
crime
• Type of cyber crime
• Cause Studies
• Statistical Report
• Prevention
• Security
• Conclusion
INTRODUCTION TO CYBER CRIME
The internet in Bangladesh is growing
rapidly. It has given rise to new opportunities
in every field such as entertainment,
business, sports or education.
There’re two sides to a coin. Internet also has
its own disadvantages it Cyber crime-illegal
activity committed on the internet.
What is a Cyber Crime ?
Crime committed using a
Computer and the Internet.
Illegal imparts
Malicious programs.
 DEFINITION:
HISTORY
The first SPAM email took place in 1978 when it was
sent out over ARPANET.
ARPANET: Advance Research Project Agency
Network
Like spam the first VIRUS was installed on an Apple
Computer in 1982.
A 16-year old student was arrested in UK in 1994 for
doing this crime.
CATAGORIES OF CYBER CRIME
 The Computer as a target
 The Computer as a weapon
TYPE OF CYBER CRIME
Hacking
Identity theft
Malicious software
Computer vandalism
Cyber terrorism
Software piracy
HACKING
Hacking in simple terms means an illegal intrusion into a
computer system or network .
In many organizations they have to check their Internet
security protection. If not the hacking criminal uses a variety
of software to enter a person’s computer and the person may
not be aware that his computer is being accessed from a remote
location.
IDENTITY THEFT
 This has become a major problem with people using
the Internet for cash transactions and banking
services.
 In this cyber crime,a criminal accesses data about a
person’s bank account, cradit cards, Social Security,
debit card and other sensitive information to siphon
money or to buy things online in the victim’s name.
 It can result in major financial losses for the victim and
even spoil the victim’s cradit history.
VIRUS DISSEMINATION
 Malicious software that attaches itself to other
software.(Virus, worms, Trojan Horse, web-jacking,
email bombing etc)
 This type of s0ftware’s employed for you to gain access
to a system for you to take delicate information or even
data or even triggering the destruction of software
program contained in the machine.
COMPUTER VANDALISM
Damaging or destroying the data rather than stealing
or misusing.
Transmitting virus.
CYBER TERRORISM
 Use of internet based attacks in terrorists activities
against computer/networks with the intension of
causing harm.
 Cyber terrorism can also include attacks on internet
business, but when this is done for economic
motivations rather than ideological.
SOFTWARE PIRACY
Software piracy is the unauthorized or illegal coping,
distribution, or use of software. It is such a profitable
“Business” that it has caught the attention of
organized crime groups in a number of countries.
THANK YOU

CYBER CRIME AND SECURITY1.pptx

  • 1.
    CYBER CRIME ANDSECURITY Department of BIOMEDICAKL ENGINEERING Presented by: KAZIM AHMED
  • 3.
    CONTENTS • Introduction • Definition •History • Categories of cyber crime • Type of cyber crime • Cause Studies • Statistical Report • Prevention • Security • Conclusion
  • 4.
    INTRODUCTION TO CYBERCRIME The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field such as entertainment, business, sports or education. There’re two sides to a coin. Internet also has its own disadvantages it Cyber crime-illegal activity committed on the internet.
  • 5.
    What is aCyber Crime ? Crime committed using a Computer and the Internet. Illegal imparts Malicious programs.  DEFINITION:
  • 7.
    HISTORY The first SPAMemail took place in 1978 when it was sent out over ARPANET. ARPANET: Advance Research Project Agency Network Like spam the first VIRUS was installed on an Apple Computer in 1982. A 16-year old student was arrested in UK in 1994 for doing this crime.
  • 8.
    CATAGORIES OF CYBERCRIME  The Computer as a target  The Computer as a weapon
  • 9.
    TYPE OF CYBERCRIME Hacking Identity theft Malicious software Computer vandalism Cyber terrorism Software piracy
  • 10.
    HACKING Hacking in simpleterms means an illegal intrusion into a computer system or network . In many organizations they have to check their Internet security protection. If not the hacking criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 11.
    IDENTITY THEFT  Thishas become a major problem with people using the Internet for cash transactions and banking services.  In this cyber crime,a criminal accesses data about a person’s bank account, cradit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name.  It can result in major financial losses for the victim and even spoil the victim’s cradit history.
  • 12.
    VIRUS DISSEMINATION  Malicioussoftware that attaches itself to other software.(Virus, worms, Trojan Horse, web-jacking, email bombing etc)  This type of s0ftware’s employed for you to gain access to a system for you to take delicate information or even data or even triggering the destruction of software program contained in the machine.
  • 13.
    COMPUTER VANDALISM Damaging ordestroying the data rather than stealing or misusing. Transmitting virus.
  • 14.
    CYBER TERRORISM  Useof internet based attacks in terrorists activities against computer/networks with the intension of causing harm.  Cyber terrorism can also include attacks on internet business, but when this is done for economic motivations rather than ideological.
  • 15.
    SOFTWARE PIRACY Software piracyis the unauthorized or illegal coping, distribution, or use of software. It is such a profitable “Business” that it has caught the attention of organized crime groups in a number of countries.
  • 16.