SlideShare a Scribd company logo
1 of 21
Computer Crime
Presented By:
Tasmin Farid Tonney
Presented To:
Prof. Dr. Md. Monirul Islam
Professor, Dept. of CSE
IIUC
Things We are going to Discuss:
What is computer crime?
First Cyber Crime
Categories of computer crime and Their Description
Types of Computer Crime and Their Descriptions
Expansion of computer crime
Top 5 most notorious cyber attacks in history
Pie Chart
International Law on Cyber Space and Digital Sovereignty
Cyber Crime in Bangladesh
Cyber law in Bangladesh
Prevention and Steps to be secured
Conclusion
References
What is
Computer Crime?
Computer Crime is any
criminal activity that uses a
computer.
It is also known as cyber
crime.
Cybercrime may threaten a
person, company or a nation's
security and financial health.
First Cyber Crime
Happened in 1820
Joseph-Marie
Jacquard, a textile
manufacturer in
France, produced the
loom.
This device allowed
the repetition of a
series of steps in the
weaving of special
fabrics.
This resulted in a fear
amongst Jacquard's
employees that their
traditional employment
and livelihood were
being threatened.
They committed acts
of sabotage to
discourage Jacquard
from further use of
the new technology.
This is the first
recorded cyber crime!
Categories of Computer Crime
“There are three general categories of computer crime:
targets, means, and incidentals” (Britz, 2009, p. 51),
however these three are not necessarily mutually exclusive
of one another. Many computer crimes “involve a
multiplicity of intentions”
So, There are Three categories:
1. Targets
2. Means
3. Incidentals
Description Of The Categories
Targets: The computer is the intended target of a criminal, as may (or may
not) be the case with hacking. Ex: Hacking, DDoS Attack etc.
Means: In this instance, the computer is the means through which the
criminal can gain access of stored information. Ex: harassing, stalking, and
crimes against persons, including physical and psychological harm etc.
Crimes have occurred in both instances:
the use of the computer by the criminal
the targeted theft of information from the hacked computer system
Incidentals: Computer crimes dealing with incidentals exist when a
computer has played a minor role in an offense. Ex: Malware, Trojan horse
etc
Child
Pornograph
y
01
Creating
Malware
03
Fraud
04
Enrollment
Process
Types of Computer Crime
02
Cyberbully
Identity
Theft
Money
Laundering
Malware
Software
piracy
Phishing
Scam
Spamming
Unauthorized
Access
Doxing
Cyber
Terrorism
05
06
07
08
09
10
11
12
13
14
15
Description of The Types
Child pornography - Making or distributing child pornography.
Copyright violation - Stealing or using another person's Copyrighted material
without permission.
Cracking - Breaking or deciphering codes designed to protect data.
Cyberbullying or Cyberstalking - Harassing or stalking others online.
Creating Malware - Writing, creating, or distributing malware (e.g., viruses and
spyware.)
Cyber terrorism - Hacking, threats, and blackmailing towards a business or
person.
Description of The Types
Doxing - Releasing another person's personal information without their
permission.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
Human trafficking - Participating in the illegal act of buying or selling other
humans.
Identity theft - Pretending to be someone you are not.
Illegal sales - Buying or selling illicit goods online, including drugs, guns, and
psychotropic substances.
Scam - Tricking people into believing something that is not true.
Description of The Types
Phishing or vishing - Deceiving individuals to gain private or personal information
about that person.
Software piracy - Copying, distributing, or using software that was not purchased
by the user of the software.
Spamming - Distributed unsolicited e-mail to dozens or hundreds of different
addresses.
Unauthorized access - Gaining access to systems you have no permission to
access.
Espionage - Spying on a person or business.
Expansion of Computer Crime
List of Top 20 Countries with the
highest rate of Cybercrime:
1. United States of America
2. China
3. Germany
4. Britain
5. Brazil
6. Spain
7. Italy
8. France
9. Turkey
10. Poland
Top 5 most notorious cyber
attacks in history
1. Google China hit by cyber attack (2009)
2. Teen hacks NASA and US Defense
Department
3. Phone lines blocked to win Porsche (1995)
4. Hacker targets Scientology (2008)
5. Robert Tappan Morris and the Morris Worm
(1988)
Pie Chart
80.7%
Percentage that shows at
least one successful attack
in 2020
19.3%
Percentage that shows the
remaining portion that’s not
affected in 2020
International Law on Cyber
Space and Digital Sovereignty
The complexities and challenges of international law on
cyberspace are increasingly deprived by a recent trend
on digital sovereignty promotions. Digital sovereignty is
the idea to control and govern access, information,
communication, network, and infrastructure in digital
realm by international actors (Couture & Toupin, 2019).
It is a significant issue in Bangladesh. It has already
been seen that a glomming threat becomes visible in the
arena of information technology. Recently the hacking of
RAB website, ATM card skimming, Bangladesh Bank
heist, Terrorist Activities in social Medias are few
examples of them.
Cyber Crime in Bangladesh
Cyber Law in Bangladesh
Punishment for
tampering with computer
source documents
Section 67
Section 66
For Hacking with
computer System
Punishment for hacking
Section 68
In Bangladesh, A Draft Bill on Information and Communication
Technology has been introduced in the Parliament.
The final report on the Law on Information Technology was
approved by the Office of the Law Commission in its meeting
dated 08.09.2002.
Cyber Crime Prevention
● Use Strong Passwords
● Secure your computer:
Activate your firewall
Use anti-virus/malware software
Block spyware attacks
● Be Social-Media Savvy
● Secure your Mobile Devices
● Install the latest operating system updates
● Protect your Data
● Secure your wireless network
● Protect your e-identity
● Avoid being scammed
● Call the right person for help
What to do if you get attacked?
Don’t get panicked and don’t do like the instructions of the criminals
Keep a backup of all your data Practice smart cyber security
habits
Call the right person for help
annually lost to cybercrime as attackers are becoming increasingly
sophisticated in their approach, adopting new technologies and
leveraging black markets and digital currencies.
600 Billion
Conclusion
As much as is
We should be more careful in the world of cyber
security to eradicate dangerous losses
and to be safe.
References
● https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia-
biggest-cyber-offenders-since-2006-report-shows
● http://www.bezaspeaks.com/cybercrime/history.htm
● https://criminal.findlaw.com/criminal-charges/computer-crime.html
● https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in-
bangladesh-information-technology-essay.php
● https://www.cybercrimelaw.net/Bangladesh.html
● https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work
● https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English-
version.pdf
● https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as
_sdt=0&as_vis=1&oi=scholart
● https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer-
crimes.aspx/
● https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html
● And many more…...
Thank
you!
Be Safe
Be Secured
!!!!!

More Related Content

What's hot

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 

Similar to Computer Crime

Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 

Similar to Computer Crime (20)

Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Computer Crime

  • 1. Computer Crime Presented By: Tasmin Farid Tonney Presented To: Prof. Dr. Md. Monirul Islam Professor, Dept. of CSE IIUC
  • 2. Things We are going to Discuss: What is computer crime? First Cyber Crime Categories of computer crime and Their Description Types of Computer Crime and Their Descriptions Expansion of computer crime Top 5 most notorious cyber attacks in history Pie Chart International Law on Cyber Space and Digital Sovereignty Cyber Crime in Bangladesh Cyber law in Bangladesh Prevention and Steps to be secured Conclusion References
  • 3. What is Computer Crime? Computer Crime is any criminal activity that uses a computer. It is also known as cyber crime. Cybercrime may threaten a person, company or a nation's security and financial health.
  • 4. First Cyber Crime Happened in 1820 Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. Categories of Computer Crime “There are three general categories of computer crime: targets, means, and incidentals” (Britz, 2009, p. 51), however these three are not necessarily mutually exclusive of one another. Many computer crimes “involve a multiplicity of intentions” So, There are Three categories: 1. Targets 2. Means 3. Incidentals
  • 6. Description Of The Categories Targets: The computer is the intended target of a criminal, as may (or may not) be the case with hacking. Ex: Hacking, DDoS Attack etc. Means: In this instance, the computer is the means through which the criminal can gain access of stored information. Ex: harassing, stalking, and crimes against persons, including physical and psychological harm etc. Crimes have occurred in both instances: the use of the computer by the criminal the targeted theft of information from the hacked computer system Incidentals: Computer crimes dealing with incidentals exist when a computer has played a minor role in an offense. Ex: Malware, Trojan horse etc
  • 7. Child Pornograph y 01 Creating Malware 03 Fraud 04 Enrollment Process Types of Computer Crime 02 Cyberbully Identity Theft Money Laundering Malware Software piracy Phishing Scam Spamming Unauthorized Access Doxing Cyber Terrorism 05 06 07 08 09 10 11 12 13 14 15
  • 8. Description of The Types Child pornography - Making or distributing child pornography. Copyright violation - Stealing or using another person's Copyrighted material without permission. Cracking - Breaking or deciphering codes designed to protect data. Cyberbullying or Cyberstalking - Harassing or stalking others online. Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.) Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
  • 9. Description of The Types Doxing - Releasing another person's personal information without their permission. Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud. Human trafficking - Participating in the illegal act of buying or selling other humans. Identity theft - Pretending to be someone you are not. Illegal sales - Buying or selling illicit goods online, including drugs, guns, and psychotropic substances. Scam - Tricking people into believing something that is not true.
  • 10. Description of The Types Phishing or vishing - Deceiving individuals to gain private or personal information about that person. Software piracy - Copying, distributing, or using software that was not purchased by the user of the software. Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses. Unauthorized access - Gaining access to systems you have no permission to access. Espionage - Spying on a person or business.
  • 11. Expansion of Computer Crime List of Top 20 Countries with the highest rate of Cybercrime: 1. United States of America 2. China 3. Germany 4. Britain 5. Brazil 6. Spain 7. Italy 8. France 9. Turkey 10. Poland
  • 12. Top 5 most notorious cyber attacks in history 1. Google China hit by cyber attack (2009) 2. Teen hacks NASA and US Defense Department 3. Phone lines blocked to win Porsche (1995) 4. Hacker targets Scientology (2008) 5. Robert Tappan Morris and the Morris Worm (1988)
  • 13. Pie Chart 80.7% Percentage that shows at least one successful attack in 2020 19.3% Percentage that shows the remaining portion that’s not affected in 2020
  • 14. International Law on Cyber Space and Digital Sovereignty The complexities and challenges of international law on cyberspace are increasingly deprived by a recent trend on digital sovereignty promotions. Digital sovereignty is the idea to control and govern access, information, communication, network, and infrastructure in digital realm by international actors (Couture & Toupin, 2019).
  • 15. It is a significant issue in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website, ATM card skimming, Bangladesh Bank heist, Terrorist Activities in social Medias are few examples of them. Cyber Crime in Bangladesh
  • 16. Cyber Law in Bangladesh Punishment for tampering with computer source documents Section 67 Section 66 For Hacking with computer System Punishment for hacking Section 68 In Bangladesh, A Draft Bill on Information and Communication Technology has been introduced in the Parliament. The final report on the Law on Information Technology was approved by the Office of the Law Commission in its meeting dated 08.09.2002.
  • 17. Cyber Crime Prevention ● Use Strong Passwords ● Secure your computer: Activate your firewall Use anti-virus/malware software Block spyware attacks ● Be Social-Media Savvy ● Secure your Mobile Devices ● Install the latest operating system updates ● Protect your Data ● Secure your wireless network ● Protect your e-identity ● Avoid being scammed ● Call the right person for help
  • 18. What to do if you get attacked? Don’t get panicked and don’t do like the instructions of the criminals Keep a backup of all your data Practice smart cyber security habits Call the right person for help
  • 19. annually lost to cybercrime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 600 Billion Conclusion As much as is We should be more careful in the world of cyber security to eradicate dangerous losses and to be safe.
  • 20. References ● https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia- biggest-cyber-offenders-since-2006-report-shows ● http://www.bezaspeaks.com/cybercrime/history.htm ● https://criminal.findlaw.com/criminal-charges/computer-crime.html ● https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in- bangladesh-information-technology-essay.php ● https://www.cybercrimelaw.net/Bangladesh.html ● https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work ● https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English- version.pdf ● https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as _sdt=0&as_vis=1&oi=scholart ● https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer- crimes.aspx/ ● https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html ● And many more…...