2. Things We are going to Discuss:
What is computer crime?
First Cyber Crime
Categories of computer crime and Their Description
Types of Computer Crime and Their Descriptions
Expansion of computer crime
Top 5 most notorious cyber attacks in history
Pie Chart
International Law on Cyber Space and Digital Sovereignty
Cyber Crime in Bangladesh
Cyber law in Bangladesh
Prevention and Steps to be secured
Conclusion
References
3. What is
Computer Crime?
Computer Crime is any
criminal activity that uses a
computer.
It is also known as cyber
crime.
Cybercrime may threaten a
person, company or a nation's
security and financial health.
4. First Cyber Crime
Happened in 1820
Joseph-Marie
Jacquard, a textile
manufacturer in
France, produced the
loom.
This device allowed
the repetition of a
series of steps in the
weaving of special
fabrics.
This resulted in a fear
amongst Jacquard's
employees that their
traditional employment
and livelihood were
being threatened.
They committed acts
of sabotage to
discourage Jacquard
from further use of
the new technology.
This is the first
recorded cyber crime!
5. Categories of Computer Crime
“There are three general categories of computer crime:
targets, means, and incidentals” (Britz, 2009, p. 51),
however these three are not necessarily mutually exclusive
of one another. Many computer crimes “involve a
multiplicity of intentions”
So, There are Three categories:
1. Targets
2. Means
3. Incidentals
6. Description Of The Categories
Targets: The computer is the intended target of a criminal, as may (or may
not) be the case with hacking. Ex: Hacking, DDoS Attack etc.
Means: In this instance, the computer is the means through which the
criminal can gain access of stored information. Ex: harassing, stalking, and
crimes against persons, including physical and psychological harm etc.
Crimes have occurred in both instances:
the use of the computer by the criminal
the targeted theft of information from the hacked computer system
Incidentals: Computer crimes dealing with incidentals exist when a
computer has played a minor role in an offense. Ex: Malware, Trojan horse
etc
8. Description of The Types
Child pornography - Making or distributing child pornography.
Copyright violation - Stealing or using another person's Copyrighted material
without permission.
Cracking - Breaking or deciphering codes designed to protect data.
Cyberbullying or Cyberstalking - Harassing or stalking others online.
Creating Malware - Writing, creating, or distributing malware (e.g., viruses and
spyware.)
Cyber terrorism - Hacking, threats, and blackmailing towards a business or
person.
9. Description of The Types
Doxing - Releasing another person's personal information without their
permission.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
Human trafficking - Participating in the illegal act of buying or selling other
humans.
Identity theft - Pretending to be someone you are not.
Illegal sales - Buying or selling illicit goods online, including drugs, guns, and
psychotropic substances.
Scam - Tricking people into believing something that is not true.
10. Description of The Types
Phishing or vishing - Deceiving individuals to gain private or personal information
about that person.
Software piracy - Copying, distributing, or using software that was not purchased
by the user of the software.
Spamming - Distributed unsolicited e-mail to dozens or hundreds of different
addresses.
Unauthorized access - Gaining access to systems you have no permission to
access.
Espionage - Spying on a person or business.
11. Expansion of Computer Crime
List of Top 20 Countries with the
highest rate of Cybercrime:
1. United States of America
2. China
3. Germany
4. Britain
5. Brazil
6. Spain
7. Italy
8. France
9. Turkey
10. Poland
12. Top 5 most notorious cyber
attacks in history
1. Google China hit by cyber attack (2009)
2. Teen hacks NASA and US Defense
Department
3. Phone lines blocked to win Porsche (1995)
4. Hacker targets Scientology (2008)
5. Robert Tappan Morris and the Morris Worm
(1988)
13. Pie Chart
80.7%
Percentage that shows at
least one successful attack
in 2020
19.3%
Percentage that shows the
remaining portion that’s not
affected in 2020
14. International Law on Cyber
Space and Digital Sovereignty
The complexities and challenges of international law on
cyberspace are increasingly deprived by a recent trend
on digital sovereignty promotions. Digital sovereignty is
the idea to control and govern access, information,
communication, network, and infrastructure in digital
realm by international actors (Couture & Toupin, 2019).
15. It is a significant issue in Bangladesh. It has already
been seen that a glomming threat becomes visible in the
arena of information technology. Recently the hacking of
RAB website, ATM card skimming, Bangladesh Bank
heist, Terrorist Activities in social Medias are few
examples of them.
Cyber Crime in Bangladesh
16. Cyber Law in Bangladesh
Punishment for
tampering with computer
source documents
Section 67
Section 66
For Hacking with
computer System
Punishment for hacking
Section 68
In Bangladesh, A Draft Bill on Information and Communication
Technology has been introduced in the Parliament.
The final report on the Law on Information Technology was
approved by the Office of the Law Commission in its meeting
dated 08.09.2002.
17. Cyber Crime Prevention
● Use Strong Passwords
● Secure your computer:
Activate your firewall
Use anti-virus/malware software
Block spyware attacks
● Be Social-Media Savvy
● Secure your Mobile Devices
● Install the latest operating system updates
● Protect your Data
● Secure your wireless network
● Protect your e-identity
● Avoid being scammed
● Call the right person for help
18. What to do if you get attacked?
Don’t get panicked and don’t do like the instructions of the criminals
Keep a backup of all your data Practice smart cyber security
habits
Call the right person for help
19. annually lost to cybercrime as attackers are becoming increasingly
sophisticated in their approach, adopting new technologies and
leveraging black markets and digital currencies.
600 Billion
Conclusion
As much as is
We should be more careful in the world of cyber
security to eradicate dangerous losses
and to be safe.