Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Crime


Published on

Cyber Crime Types and Recommendations

Published in: Education
  • Login to see the comments

Cyber Crime

  1. 1. Cyber Crime
  2. 2. Group Member Israt Zahan Islam (17121002) Anika Tahsin Raonak (17121014) Mehjabin Chowdhury (17121024) Ashraful Alam (17121031) Sunmoyee Das (17121037)
  3. 3. • About Cyber Crime • History of Cyber Crime • Types of Cyber Crime • Safety tips to cyber crime
  4. 4. Cyber Crime  computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).  Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes.  Criminals who perform these illegal activities are often referred to as hackers.
  5. 5. History of Cyber Crime First recorded of it took place in 1820 The first spam e-mail took place in 1976 The first virus was installed on an Apple computer in 1982
  6. 6. Types of Cyber Crimes  Hacking  Theft  Cyber Stalking  Identity Theft  Malicious Software  Cyber Defamation  E-mail spoofing  Child soliciting and abuse
  7. 7.  Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access  This is different from ethical hacking, which many organizations use to check their Internet security protection  Example: Using password cracking algorithm to gain access to system Types (Hacking)
  8. 8. Types (Theft)  This crime occurs when a person violates copyrights and downloads music, movies, games and software  There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI  Currently, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading
  9. 9. Types (Cyber Stalking)  This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.  Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk  However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims' lives more miserable.
  10. 10. In this cyber crime, a criminal accesses data about a person's bank account, credit cards, social security, debit card and other sensitive information to siphon money or to buy things online in the victim's name. It can result in major financial losses for the victim and even spoil the victim's credit history. Type(Identity Theft)
  11. 11. Types ( Malicious Software)  These are Internet-based software or programs that are used to disrupt a network  The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
  12. 12. This occurs when defamation takes place with the help of computers and or the Internet e.g. someone publishes defamatory matter(s) about someone on websites or sends e-mail to his friends containing defamatory information.
  13. 13. Types ( E-mail Spoofing) A spoofed email is that email which appears to originate from one source but actually has been sent from another source This can also be termed as e-mail forging.
  14. 14. Types (Child Soliciting and Abuse) This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
  15. 15. Perpetrators of Cyber Crime Not just hackers (company’s seeking competitors trade secret) The internet should be viewed as another medium in which criminals can conduct illegal acts
  16. 16. Victims Companies (No security awareness) Society as a whole Individuals 1) Unaware individuals 2)Do not care individuals
  17. 17. International perspective on cyber crime USA - to protect the interests of internet businesses, the US Congress has enacted new laws to regulate activities on the internet the US has established a number of regulations on cybercrime 1) "National Infrastructure Protection Act of 1996“ 2) "Cyberspace Electronic Security Act of 1999“ 3) "Patriot Act of 2001“
  18. 18. Continuing… England – Two cyber crimes related Acts have been passed by the British Parliament 1) the Data Protection Act of 1984 2) the Computer Misuse Act of 1990 Canada – in 2001, the Canadian Parliament passed the Criminal Law Amendment Act
  19. 19. Cyber Crime In Bangladesh • The biggest cyber crime we came across in Bangladesh is the Bank heist of the central bank • Hackers stole $100 million from the central bank of Bangladesh  Money was Transferred via SWIFT  But the bank reportedly managed to block a further transfer of $870 million initiated by attackers.  Finance Minister Abul Mal Abul Muhith says his government holds the New York Fed responsible for any unrecovered losses  Information security experts say appears to be one of the largest bank heists in history
  20. 20. In order to facilitate e-commerce and encourage the growth of information technology, the Information and Communication Technology (ICT) Act, 2006 was enacted making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or both However, recently the National Parliament amended the ICT Act 2006, raising penalties for cyber crimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 crore or both The ICT Act, 2006 as amended in 2013 is obviously a brilliant achievement of Bangladesh in the field of cyber law Legal response to cyber crime in Bangladesh
  21. 21. Tips to Protect from Cybercrime  Create Strong Passwords  Keep Private Information Private  Lock the Computer  Protect Your Computer  Do Business with Reputable Vendors  Report Suspicious Activity  Use anti virus software  Uninstall unnecessary software  Maintain backup  Check security settings  Never give your full name or address to anyone
  22. 22. Conclusion  It is highly necessary for everyone of us to create awareness among us  There is a whole other world that exists in cyberspace. One needs to make sure that the information is passing safely.
  23. 23. References law-in-bangladesh threat-in-digital-marketplace/28940
  24. 24. Thank You!!!!!!!