SlideShare a Scribd company logo
CYBERCRiME
AND IT’s IMPACT iN
BANGLADESH
PRESENT BY,
SAHA, MRIDUL
BUSHRA, KANIZ FATEMA
& JOTHY, MD FUAD HASSAN
TABLE OF CONTENTs
o ABSTRACT
o PROFILE OF CYBER CRIMINALS
o CYBERCRIME
o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER
o TYPES OF CYBERCRIME
o BROAD CLASSIFICATION
o MISUSE OF INFORMATION TECHNOLOGIES
o REASONS OF CYBERCRIME
o INTRODUCTION
o IMPACT OF CYBERCRIME
o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH
o CYBER TRIBUNAL
o CONCLUSION
ABSTRACT
o Cyber and technology related crime is gradually increasing in Bangladesh. It has already
been seen that a glomming threat becomes visible in the arena of information technology.
Recently the hacking of RAB website and e-mail threats of former prime minister is
example for few of them.
o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are
several clauses against cybercrime. But this Information and Communication Technology
act is not the concrete one.
o So, considering these facts a comprehensive Cybercrime Protection Act should be
imposed. This presentation will focus on the impacts of cybercrime in Bangladesh.
INTRODUCTiON
o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime
took place in the year 1820!
o In our daily life, economic activities, and national security highly depend on stability,
safety of our cyberspace. A network brings communications and transports, power to our
homes, run our economy, and provide government various services.
But . . . .
“Ever since men began to modify their lives by using technology they
have found themselves in a series of technological traps”
CYBERCRiME
o In General, Cybercrime may be said to be those
offences, of which, genus is the conventional
Crime, and where either the computer is an object
or subject of the conduct online crime.
“Any criminal activity that uses a computer
either an instrumentality, target or a means
for further crimes comes within the ambit
of cybercrime”.
o THE COMPUTER AS A TARGET
Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
o THE COMPUTER AS A WEAPON
Using a computer to commit real world crimes.
E.g. Cyber Terrorism, Credit card frauds, Pornography etc.
CYBERCRiMES
IN TWO WAYs BASED ON
USE OF COMPUTER . .
TYPEs OF CYBERCRiME
o Cybercrime may be committed by creating or releasing a malicious computer
program. (E.g. computer virus, Trojan horse).
o Cybercrime may be committed by stalking in cyberspace.
o THERE ARE THREE MAJOR CLASSES OF CRIMINAL
ACTIVITIES WITH COMPUTERS
o Unauthorized use of a computer.
BROAD CLASSiFICATiON
THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO THREE
GROUPS. THEY ARE . . .
o AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
o AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
o AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, Online gambling, ETC.
o UNAUTHORIZED ACCESS & HACKING
o VIRUS DISSEMINATION
o SOFTWARE PIRACY
o CREDIT CARD FRAUD
MiSUSE OF
INFORMATiON TECHNOLOGiEs
o SALE OF ILLEGAL ARTICLES
o EMAIL BOMBING
o EMAIL SPOOFING
o TROJAN ATTACK
o SALAMI ATTACKS
o CYBER DEFORMATION, CYBER STALKING,EMAIL
SPAMMING, PORNOGRAPHY, ETC.
MiSUSE OF
INFORMATiON TECHNOLOGiEs
REASONs
OF CYBERCRiME
o LACK OF EVIDENCE
o EASY TO ACCESS
o COMPLEX
o NEGLIGENCE
o CAPACITY TO STORE DATA IN SMALL SPACE
o Organized hackers these kinds of hackers are mostly organized
together to fulfill certain objective.
o Professional hackers / crackers their work is motivated by the
color of money.
o Discontented employees.
PROFiLE OF CYBER CRiMINALS
o Cyber criminals is constitute of various groups/ category. This division may be justified
on the basis of the object that they have in their mind. The following are the category of
cyber criminals . . .
IMPACT
OF CYBERCRiME
o Cybercrimes committed against people include various
crimes like transmission of child pornography and
harassment through e-mail. The trafficking, distribution
and posting of offensive material including pornography
one of the most spreading cybercrimes known today.
o Cybercrime has already become a going concern in both
private as well as public sector in Bangladesh. Due to
unauthorized access to the system, company loses huge
confidential information which caused a large amount of
financial lose.
LEGAL RESPONSE
TO CYBERCRiME
IN BANGLADESH
o In order to safe e-commerce and encourage the growth of
information technology, the ICT Act, 2006 was passed
making provisions with a maximum punishment of 10
years imprisonment or fine up to taka 10 million or with
both. However, recently our Parliament approved the ICT
Act 2006, raising penalties for cybercrimes setting a
minimum of 7 years imprisonment and a maximum of 14
years or a fine of Tk. 1 core or both.
CYBER TRiBUNAL
o According to section 68 of the Information and
Communication Technology Act, 2006 for the speedy and
effective disposal of cases under this Act, Government shall
establish one or more cyber tribunal. The tribunal shall try
only the offences under this Act and the Government shall
determine the local jurisdiction of the tribunal. In
consultation with the Supreme Court, Government shall
appoint on Sessions Judge or Additional Sessions Judge as a
judge of Cyber Tribunal.
CONCLUSiON
Basically, small scale cyber crime occurs in our country . But extensive use of
computer and information technology by the financial institutions like bank,
insurance company, and other non-government organizations and individual as
well, increase the fear of commission of cybercrime. So we have to alert about
the potential threat of cybercrime.
THANK YOU !

More Related Content

What's hot

Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
mahrukh rafique
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
Digital Marketing Evangelist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
Malu704065
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Uday Bhaskarwar
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Abir Rahman
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 

What's hot (20)

Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 

Viewers also liked

Juvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An AppraisalJuvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An Appraisal
Absar Aftab Absar
 
Female Criminality in Bangladesh
Female Criminality in BangladeshFemale Criminality in Bangladesh
Female Criminality in Bangladesh
A K DAS's | Law
 
Theories of female criminality
Theories of female criminalityTheories of female criminality
Theories of female criminality
A K DAS's | Law
 
Juvenile Delinquency
Juvenile DelinquencyJuvenile Delinquency
Juvenile Delinquency
guest544226
 
Juvenile delinquency
Juvenile delinquencyJuvenile delinquency
Juvenile delinquency
Abino David
 
juvenile delinquency
juvenile delinquencyjuvenile delinquency
juvenile delinquencyMuhammad Afiq
 

Viewers also liked (6)

Juvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An AppraisalJuvenile Justice system in Bangladesh - An Appraisal
Juvenile Justice system in Bangladesh - An Appraisal
 
Female Criminality in Bangladesh
Female Criminality in BangladeshFemale Criminality in Bangladesh
Female Criminality in Bangladesh
 
Theories of female criminality
Theories of female criminalityTheories of female criminality
Theories of female criminality
 
Juvenile Delinquency
Juvenile DelinquencyJuvenile Delinquency
Juvenile Delinquency
 
Juvenile delinquency
Juvenile delinquencyJuvenile delinquency
Juvenile delinquency
 
juvenile delinquency
juvenile delinquencyjuvenile delinquency
juvenile delinquency
 

Similar to Cybercrime final-ppt

Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
alisondakintxt
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
poulterbarbara
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
gertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
adkinspaige22
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
Md Nazmul Hossain Mir
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
 

Similar to Cybercrime final-ppt (20)

Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 

More from Grant Thornton Bangladesh

Technical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDTTechnical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDT
Grant Thornton Bangladesh
 
Report of Banking Company
Report of Banking CompanyReport of Banking Company
Report of Banking Company
Grant Thornton Bangladesh
 
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Grant Thornton Bangladesh
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Louis Vuitton
Louis VuittonLouis Vuitton
Horizontal Communication
Horizontal CommunicationHorizontal Communication
Horizontal Communication
Grant Thornton Bangladesh
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
Grant Thornton Bangladesh
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of Lankabangla
Grant Thornton Bangladesh
 
Insurance
Insurance Insurance
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City Bank
Grant Thornton Bangladesh
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
Grant Thornton Bangladesh
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
Grant Thornton Bangladesh
 
Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)
Grant Thornton Bangladesh
 
Louis vuitton
Louis vuittonLouis vuitton
Cyber crime
Cyber crimeCyber crime
principle of management
principle of managementprinciple of management
principle of management
Grant Thornton Bangladesh
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2
Grant Thornton Bangladesh
 
Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1
Grant Thornton Bangladesh
 

More from Grant Thornton Bangladesh (20)

Technical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDTTechnical & Fundamental Analysis of USD/BDT
Technical & Fundamental Analysis of USD/BDT
 
Report of Banking Company
Report of Banking CompanyReport of Banking Company
Report of Banking Company
 
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL CompanyAnalysis of IFIC, South-East, BRAC, EBL, DBBL Company
Analysis of IFIC, South-East, BRAC, EBL, DBBL Company
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio Analysis
 
Louis Vuitton
Louis VuittonLouis Vuitton
Louis Vuitton
 
Horizontal Communication
Horizontal CommunicationHorizontal Communication
Horizontal Communication
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Fundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of LankabanglaFundamental & Technicla analysis of Lankabangla
Fundamental & Technicla analysis of Lankabangla
 
Insurance
Insurance Insurance
Insurance
 
Fundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City BankFundamental and Technical Analysis of City Bank
Fundamental and Technical Analysis of City Bank
 
Agricultural revolution. 1ppt
Agricultural revolution. 1pptAgricultural revolution. 1ppt
Agricultural revolution. 1ppt
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Management
ManagementManagement
Management
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)Bussiness plan (mrinmoy)
Bussiness plan (mrinmoy)
 
Louis vuitton
Louis vuittonLouis vuitton
Louis vuitton
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
principle of management
principle of managementprinciple of management
principle of management
 
Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2Spring 16 introduction to business lecture 2
Spring 16 introduction to business lecture 2
 
Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1Spring 16 introduction to business lecture 1
Spring 16 introduction to business lecture 1
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 

Cybercrime final-ppt

  • 1. CYBERCRiME AND IT’s IMPACT iN BANGLADESH PRESENT BY, SAHA, MRIDUL BUSHRA, KANIZ FATEMA & JOTHY, MD FUAD HASSAN
  • 2. TABLE OF CONTENTs o ABSTRACT o PROFILE OF CYBER CRIMINALS o CYBERCRIME o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER o TYPES OF CYBERCRIME o BROAD CLASSIFICATION o MISUSE OF INFORMATION TECHNOLOGIES o REASONS OF CYBERCRIME o INTRODUCTION o IMPACT OF CYBERCRIME o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH o CYBER TRIBUNAL o CONCLUSION
  • 3. ABSTRACT o Cyber and technology related crime is gradually increasing in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website and e-mail threats of former prime minister is example for few of them. o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are several clauses against cybercrime. But this Information and Communication Technology act is not the concrete one. o So, considering these facts a comprehensive Cybercrime Protection Act should be imposed. This presentation will focus on the impacts of cybercrime in Bangladesh.
  • 4. INTRODUCTiON o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime took place in the year 1820! o In our daily life, economic activities, and national security highly depend on stability, safety of our cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government various services. But . . . . “Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps”
  • 5. CYBERCRiME o In General, Cybercrime may be said to be those offences, of which, genus is the conventional Crime, and where either the computer is an object or subject of the conduct online crime. “Any criminal activity that uses a computer either an instrumentality, target or a means for further crimes comes within the ambit of cybercrime”.
  • 6. o THE COMPUTER AS A TARGET Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. o THE COMPUTER AS A WEAPON Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc. CYBERCRiMES IN TWO WAYs BASED ON USE OF COMPUTER . .
  • 7. TYPEs OF CYBERCRiME o Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse). o Cybercrime may be committed by stalking in cyberspace. o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES WITH COMPUTERS o Unauthorized use of a computer.
  • 8. BROAD CLASSiFICATiON THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO THREE GROUPS. THEY ARE . . . o AGAINST INDIVIDUALS A. Person & B. Property of an individual o AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. o AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, Online gambling, ETC.
  • 9. o UNAUTHORIZED ACCESS & HACKING o VIRUS DISSEMINATION o SOFTWARE PIRACY o CREDIT CARD FRAUD MiSUSE OF INFORMATiON TECHNOLOGiEs
  • 10. o SALE OF ILLEGAL ARTICLES o EMAIL BOMBING o EMAIL SPOOFING o TROJAN ATTACK o SALAMI ATTACKS o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING, PORNOGRAPHY, ETC. MiSUSE OF INFORMATiON TECHNOLOGiEs
  • 11. REASONs OF CYBERCRiME o LACK OF EVIDENCE o EASY TO ACCESS o COMPLEX o NEGLIGENCE o CAPACITY TO STORE DATA IN SMALL SPACE
  • 12. o Organized hackers these kinds of hackers are mostly organized together to fulfill certain objective. o Professional hackers / crackers their work is motivated by the color of money. o Discontented employees. PROFiLE OF CYBER CRiMINALS o Cyber criminals is constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals . . .
  • 13. IMPACT OF CYBERCRiME o Cybercrimes committed against people include various crimes like transmission of child pornography and harassment through e-mail. The trafficking, distribution and posting of offensive material including pornography one of the most spreading cybercrimes known today. o Cybercrime has already become a going concern in both private as well as public sector in Bangladesh. Due to unauthorized access to the system, company loses huge confidential information which caused a large amount of financial lose.
  • 14. LEGAL RESPONSE TO CYBERCRiME IN BANGLADESH o In order to safe e-commerce and encourage the growth of information technology, the ICT Act, 2006 was passed making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or with both. However, recently our Parliament approved the ICT Act 2006, raising penalties for cybercrimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 core or both.
  • 15. CYBER TRiBUNAL o According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. The tribunal shall try only the offences under this Act and the Government shall determine the local jurisdiction of the tribunal. In consultation with the Supreme Court, Government shall appoint on Sessions Judge or Additional Sessions Judge as a judge of Cyber Tribunal.
  • 16. CONCLUSiON Basically, small scale cyber crime occurs in our country . But extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations and individual as well, increase the fear of commission of cybercrime. So we have to alert about the potential threat of cybercrime.