CYBER-CRIME
DON’T BE A VICTIM
Presenter:
Mahmudul Hasan
Contains:CybercrimeinBangladesh.
• Definition of cybercrime.
• Reasons of cybercrime.
• Overall scenario of cyber
crime.
• Punishment for cybercrime.
• conclusion
TechnicalDefinitionofCYBER-CRIME.
When Internet was developed, the founding
fathers of Internet hardly had any inclination that
Internet could also be misused for criminal
activities.Today, there are many disturbing things
happening in cyberspace. Cybercrime refers to all
the activities done with criminal intent in
cyberspace.
Cyber crime refers to any crime that involves a
computer/mobile and a network.The computer
may have been used in the commission of a crime,
or it may be the target.
What is Cyber-Crime?
SimpleTheory-
When you purchase a home it comes with a
door and a lock. You always ensure that the
door/lock exist and working properly.You may
even purchase security systems.
Well, why would you not secure your
investments?
Likewise,Your System is your home and
security tools are your door/lock and security
tools.
 So if someone breaches into your
home’s(System), accesses all your personal
accounts and tampers your data, is the
criminal who is committing the crime.
 And committed crime is known as cyber-
crime.
 That means more precisely we can say that-
 Cyber crime is an illegal activity committed
on the internet.
ExamplesOfcyber-Crime:
Reasonsofcybercrime
Capacity to store data in
comparatively small space.
Easy to access.
Complex.
Negligence.
Loss of evidence.
Reasonsofcybercrime
Capacity to store data in comparatively small space
the computer has unique characteristic of storing data
in a very small space
Easy to access the problem encountered in guarding a
computer system from unauthorized access is that
there is every possibility of breach not due to human
error but due to the complex technology.
Reasonsofcybercrime
Complex the computers work on operating systems
and these operating systems in turn are composed of
millions of codes.
Negligence is very closely connected with human
conduct.
Loss of evidence Loss of evidence is a very common &
obvious problem as all the data are routinely
destroyed.
OVERALLSCENARIOOFCYBERCRIMEIN
BANGLADESH
 Enter into the computer system in legal
procedure.
 Causes great harm by theft of Bank accounts.
 Transferring civil information to the
opponent.
 Crime ii not controlled by law.
 Bangladesh ICT act-2006 has added list as
crimes.
Act2006describethecrimebothcivil&criminalmatters:
 Hacking with computer system
 Tampering computer source discount document.
 Using a forget electronic record
 Publishing false digital certificate.
 Introduction to virus
 Using a forged Electronic record
 Publication of digital signature certificate for the
fraudulent purpose.
 Unauthorized copying.
Thefollowingshallbetreatedalsoascrime.
 Damage and disruption to computer system
 Denial of access to authorized person to
computer
 Providing assistance to make possible to commit
to crime
 Electronic forger for the purpose of cheating and
harming reputation
 Using a forged Electronic record
 Confiscation of computer, network etc
PunishmentinBangladeshiLaw
 Given penalty of maximum 3 years imprison or
fined 3 lacs taka under section 54,Act-2006.
 Punished of maximum 3 years imprison or fined
up to 1 crore taka for commits hacking under this
act.
 Punished maximum 10 years imprison or fined 1
crore taka, commits such crime under 57 of this
act.
 2 years imprison or fined up to 2 lacs taka for
digital signature certificate.
Howto Tackle SuchActivities??
 Awareness is the first step in protecting
yourself, your family and your business.
 Invest in Anti-virus, Firewall, and SPAM
blocking software for your PC.
 Detect secure websites when conducting
transactions online.
 Do NOT respond or act on emails sent
from unknown sources.
Conclusion
 The key to protecting yourself is being
aware.
 Not all cybercriminals are “hackers.”
 There is a whole other world that exists in
cyberspace… make sure that your
information travels safely.
 Stay Secure, Stay
Thank You

Cyber crime-140128140443-phpapp02

  • 1.
    CYBER-CRIME DON’T BE AVICTIM Presenter: Mahmudul Hasan
  • 2.
    Contains:CybercrimeinBangladesh. • Definition ofcybercrime. • Reasons of cybercrime. • Overall scenario of cyber crime. • Punishment for cybercrime. • conclusion
  • 3.
    TechnicalDefinitionofCYBER-CRIME. When Internet wasdeveloped, the founding fathers of Internet hardly had any inclination that Internet could also be misused for criminal activities.Today, there are many disturbing things happening in cyberspace. Cybercrime refers to all the activities done with criminal intent in cyberspace. Cyber crime refers to any crime that involves a computer/mobile and a network.The computer may have been used in the commission of a crime, or it may be the target.
  • 4.
    What is Cyber-Crime? SimpleTheory- Whenyou purchase a home it comes with a door and a lock. You always ensure that the door/lock exist and working properly.You may even purchase security systems. Well, why would you not secure your investments? Likewise,Your System is your home and security tools are your door/lock and security tools.
  • 5.
     So ifsomeone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.  And committed crime is known as cyber- crime.  That means more precisely we can say that-  Cyber crime is an illegal activity committed on the internet.
  • 6.
  • 7.
    Reasonsofcybercrime Capacity to storedata in comparatively small space. Easy to access. Complex. Negligence. Loss of evidence.
  • 8.
    Reasonsofcybercrime Capacity to storedata in comparatively small space the computer has unique characteristic of storing data in a very small space Easy to access the problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology.
  • 9.
    Reasonsofcybercrime Complex the computerswork on operating systems and these operating systems in turn are composed of millions of codes. Negligence is very closely connected with human conduct. Loss of evidence Loss of evidence is a very common & obvious problem as all the data are routinely destroyed.
  • 10.
    OVERALLSCENARIOOFCYBERCRIMEIN BANGLADESH  Enter intothe computer system in legal procedure.  Causes great harm by theft of Bank accounts.  Transferring civil information to the opponent.  Crime ii not controlled by law.  Bangladesh ICT act-2006 has added list as crimes.
  • 11.
    Act2006describethecrimebothcivil&criminalmatters:  Hacking withcomputer system  Tampering computer source discount document.  Using a forget electronic record  Publishing false digital certificate.  Introduction to virus  Using a forged Electronic record  Publication of digital signature certificate for the fraudulent purpose.  Unauthorized copying.
  • 12.
    Thefollowingshallbetreatedalsoascrime.  Damage anddisruption to computer system  Denial of access to authorized person to computer  Providing assistance to make possible to commit to crime  Electronic forger for the purpose of cheating and harming reputation  Using a forged Electronic record  Confiscation of computer, network etc
  • 13.
    PunishmentinBangladeshiLaw  Given penaltyof maximum 3 years imprison or fined 3 lacs taka under section 54,Act-2006.  Punished of maximum 3 years imprison or fined up to 1 crore taka for commits hacking under this act.  Punished maximum 10 years imprison or fined 1 crore taka, commits such crime under 57 of this act.  2 years imprison or fined up to 2 lacs taka for digital signature certificate.
  • 14.
    Howto Tackle SuchActivities?? Awareness is the first step in protecting yourself, your family and your business.  Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.  Detect secure websites when conducting transactions online.  Do NOT respond or act on emails sent from unknown sources.
  • 15.
    Conclusion  The keyto protecting yourself is being aware.  Not all cybercriminals are “hackers.”  There is a whole other world that exists in cyberspace… make sure that your information travels safely.  Stay Secure, Stay
  • 16.