+ All Categories
Home > Education > Cyber crime-140128140443-phpapp02

Cyber crime-140128140443-phpapp02

Date post: 08-Apr-2017
Category:
Upload: mahmudul-hasan
View: 78 times
Download: 0 times
Share this document with a friend
16
CYBER-CRIME DON’T BE A VICTIM Presenter: Mahmudul Hasan BBA Stamford university ( 01625323426)
Transcript

CYBER-CRIME DON’T BE A VICTIM

Presenter:Mahmudul Hasan BBA Stamford university ( 01625323426)

Contains: Cyber crime in Bangladesh.

• Definition of cybercrime.

• Reasons of cybercrime.

• Overall scenario of cyber crime.

• Punishment for cybercrime.

• conclusion

Technical Definition of CYBER-CRIME.

When Internet was developed, the founding fathers of Internet hardly had

any inclination that Internet could also be misused for criminal activities. Today,

there are many disturbing things happening in cyberspace. Cybercrime

refers to all the activities done with criminal intent in cyberspace.

Cyber crime refers to any crime that involves a computer/mobile and a

network. The computer may have been used in the commission of a crime, or it

may be the target.

What is Cyber-Crime?Simple Theory-

When you purchase a home it comes with a door and a lock. You

always ensure that the door/lock exist and working properly. You may

even purchase security systems.

Well, why would you not secure your investments?

Likewise, Your System is your home and security tools are your door/lock

and security tools.

So if someone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.

And committed crime is known as cyber-crime.

That means more precisely we can say that-

Cyber crime is an illegal activity committed on the internet.

Examples Of cyber-Crime:

Reasons of cybercrimeCapacity to store

data in comparatively small space.

Easy to access.

Complex.

Negligence.

Loss of evidence.

Reasons of cyber crime

Capacity to store data in comparatively small space the computer has unique characteristic of storing data in a very small spaceEasy to access the problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology.

Reasons of cyber crime

Complex the computers work on operating systems and these operating systems in turn are composed of millions of codes.

Negligence is very closely connected with human conduct.

Loss of evidence Loss of evidence is a very common & obvious problem as all the data are routinely destroyed.

OVERALL SCENARIO OF CYBER CRIME IN BANGLADESH Enter into the computer system in legal

procedure. Causes great harm by theft of Bank

accounts. Transferring civil information to the

opponent. Crime ii not controlled by law. Bangladesh ICT act-2006 has added list

as crimes.

Act 2006 describe the crime both civil& criminal matters: Hacking with computer system Tampering computer source discount

document. Using a forget electronic record Publishing false digital certificate. Introduction to virus Using a forged Electronic record Publication of digital signature certificate for

the fraudulent purpose. Unauthorized copying.

The following shall be treated also as crime. Damage and disruption to computer system Denial of access to authorized person to

computer Providing assistance to make possible to

commit to crime Electronic forger for the purpose of cheating

and harming reputation Using a forged Electronic record Confiscation of computer, network etc

Punishment in Bangladeshi Law

Given penalty of maximum 3 years imprison or fined 3 lacs taka under section 54,Act-2006.

Punished of maximum 3 years imprison or fined up to 1 crore taka for commits hacking under this act.

Punished maximum 10 years imprison or fined 1 crore taka, commits such crime under 57 of this act.

2 years imprison or fined up to 2 lacs taka for digital signature certificate.

How to Tackle Such Activities??

Awareness is the first step in protecting yourself, your family and your business.

Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.

Detect secure websites when conducting transactions online.

Do NOT respond or act on emails sent from unknown sources.

Conclusion

The key to protecting yourself is being aware.

Not all cybercriminals are “hackers.”

There is a whole other world that exists in cyberspace… make sure that your information travels safely.

Stay Secure, Stay

Thank You


Recommended