SlideShare a Scribd company logo
1 of 21
Computer Crime
Presented By:
Tasmin Farid Tonney
Presented To:
Prof. Dr. Md. Monirul Islam
Professor, Dept. of CSE
IIUC
Things We are going to Discuss:
What is computer crime?
First Cyber Crime
Categories of computer crime and Their Description
Types of Computer Crime and Their Descriptions
Expansion of computer crime
Top 5 most notorious cyber attacks in history
Pie Chart
International Law on Cyber Space and Digital Sovereignty
Cyber Crime in Bangladesh
Cyber law in Bangladesh
Prevention and Steps to be secured
Conclusion
References
What is
Computer Crime?
Computer Crime is any
criminal activity that uses a
computer.
It is also known as cyber
crime.
Cybercrime may threaten a
person, company or a nation's
security and financial health.
First Cyber Crime
Happened in 1820
Joseph-Marie
Jacquard, a textile
manufacturer in
France, produced the
loom.
This device allowed
the repetition of a
series of steps in the
weaving of special
fabrics.
This resulted in a fear
amongst Jacquard's
employees that their
traditional employment
and livelihood were
being threatened.
They committed acts
of sabotage to
discourage Jacquard
from further use of
the new technology.
This is the first
recorded cyber crime!
Categories of Computer Crime
“There are three general categories of computer crime:
targets, means, and incidentals” (Britz, 2009, p. 51),
however these three are not necessarily mutually exclusive
of one another. Many computer crimes “involve a
multiplicity of intentions”
So, There are Three categories:
1. Targets
2. Means
3. Incidentals
Description Of The Categories
Targets: The computer is the intended target of a criminal, as may (or may
not) be the case with hacking. Ex: Hacking, DDoS Attack etc.
Means: In this instance, the computer is the means through which the
criminal can gain access of stored information. Ex: harassing, stalking, and
crimes against persons, including physical and psychological harm etc.
Crimes have occurred in both instances:
the use of the computer by the criminal
the targeted theft of information from the hacked computer system
Incidentals: Computer crimes dealing with incidentals exist when a
computer has played a minor role in an offense. Ex: Malware, Trojan horse
etc
Child
Pornograph
y
01
Creating
Malware
03
Fraud
04
Enrollment
Process
Types of Computer Crime
02
Cyberbully
Identity
Theft
Money
Laundering
Malware
Software
piracy
Phishing
Scam
Spamming
Unauthorized
Access
Doxing
Cyber
Terrorism
05
06
07
08
09
10
11
12
13
14
15
Description of The Types
Child pornography - Making or distributing child pornography.
Copyright violation - Stealing or using another person's Copyrighted material
without permission.
Cracking - Breaking or deciphering codes designed to protect data.
Cyberbullying or Cyberstalking - Harassing or stalking others online.
Creating Malware - Writing, creating, or distributing malware (e.g., viruses and
spyware.)
Cyber terrorism - Hacking, threats, and blackmailing towards a business or
person.
Description of The Types
Doxing - Releasing another person's personal information without their
permission.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
Human trafficking - Participating in the illegal act of buying or selling other
humans.
Identity theft - Pretending to be someone you are not.
Illegal sales - Buying or selling illicit goods online, including drugs, guns, and
psychotropic substances.
Scam - Tricking people into believing something that is not true.
Description of The Types
Phishing or vishing - Deceiving individuals to gain private or personal information
about that person.
Software piracy - Copying, distributing, or using software that was not purchased
by the user of the software.
Spamming - Distributed unsolicited e-mail to dozens or hundreds of different
addresses.
Unauthorized access - Gaining access to systems you have no permission to
access.
Espionage - Spying on a person or business.
Expansion of Computer Crime
List of Top 20 Countries with the
highest rate of Cybercrime:
1. United States of America
2. China
3. Germany
4. Britain
5. Brazil
6. Spain
7. Italy
8. France
9. Turkey
10. Poland
Top 5 most notorious cyber
attacks in history
1. Google China hit by cyber attack (2009)
2. Teen hacks NASA and US Defense
Department
3. Phone lines blocked to win Porsche (1995)
4. Hacker targets Scientology (2008)
5. Robert Tappan Morris and the Morris Worm
(1988)
Pie Chart
80.7%
Percentage that shows at
least one successful attack
in 2020
19.3%
Percentage that shows the
remaining portion that’s not
affected in 2020
International Law on Cyber
Space and Digital Sovereignty
The complexities and challenges of international law on
cyberspace are increasingly deprived by a recent trend
on digital sovereignty promotions. Digital sovereignty is
the idea to control and govern access, information,
communication, network, and infrastructure in digital
realm by international actors (Couture & Toupin, 2019).
It is a significant issue in Bangladesh. It has already
been seen that a glomming threat becomes visible in the
arena of information technology. Recently the hacking of
RAB website, ATM card skimming, Bangladesh Bank
heist, Terrorist Activities in social Medias are few
examples of them.
Cyber Crime in Bangladesh
Cyber Law in Bangladesh
Punishment for
tampering with computer
source documents
Section 67
Section 66
For Hacking with
computer System
Punishment for hacking
Section 68
In Bangladesh, A Draft Bill on Information and Communication
Technology has been introduced in the Parliament.
The final report on the Law on Information Technology was
approved by the Office of the Law Commission in its meeting
dated 08.09.2002.
Cyber Crime Prevention
● Use Strong Passwords
● Secure your computer:
Activate your firewall
Use anti-virus/malware software
Block spyware attacks
● Be Social-Media Savvy
● Secure your Mobile Devices
● Install the latest operating system updates
● Protect your Data
● Secure your wireless network
● Protect your e-identity
● Avoid being scammed
● Call the right person for help
What to do if you get attacked?
Don’t get panicked and don’t do like the instructions of the criminals
Keep a backup of all your data Practice smart cyber security
habits
Call the right person for help
annually lost to cybercrime as attackers are becoming increasingly
sophisticated in their approach, adopting new technologies and
leveraging black markets and digital currencies.
600 Billion
Conclusion
As much as is
We should be more careful in the world of cyber
security to eradicate dangerous losses
and to be safe.
References
● https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia-
biggest-cyber-offenders-since-2006-report-shows
● http://www.bezaspeaks.com/cybercrime/history.htm
● https://criminal.findlaw.com/criminal-charges/computer-crime.html
● https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in-
bangladesh-information-technology-essay.php
● https://www.cybercrimelaw.net/Bangladesh.html
● https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work
● https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English-
version.pdf
● https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as
_sdt=0&as_vis=1&oi=scholart
● https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer-
crimes.aspx/
● https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html
● And many more…...
Thank
you!
Be Safe
Be Secured
!!!!!

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

What's hot (20)

Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 

Similar to Computer Crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 

Similar to Computer Crime (20)

Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Computer Crime

  • 1. Computer Crime Presented By: Tasmin Farid Tonney Presented To: Prof. Dr. Md. Monirul Islam Professor, Dept. of CSE IIUC
  • 2. Things We are going to Discuss: What is computer crime? First Cyber Crime Categories of computer crime and Their Description Types of Computer Crime and Their Descriptions Expansion of computer crime Top 5 most notorious cyber attacks in history Pie Chart International Law on Cyber Space and Digital Sovereignty Cyber Crime in Bangladesh Cyber law in Bangladesh Prevention and Steps to be secured Conclusion References
  • 3. What is Computer Crime? Computer Crime is any criminal activity that uses a computer. It is also known as cyber crime. Cybercrime may threaten a person, company or a nation's security and financial health.
  • 4. First Cyber Crime Happened in 1820 Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. Categories of Computer Crime “There are three general categories of computer crime: targets, means, and incidentals” (Britz, 2009, p. 51), however these three are not necessarily mutually exclusive of one another. Many computer crimes “involve a multiplicity of intentions” So, There are Three categories: 1. Targets 2. Means 3. Incidentals
  • 6. Description Of The Categories Targets: The computer is the intended target of a criminal, as may (or may not) be the case with hacking. Ex: Hacking, DDoS Attack etc. Means: In this instance, the computer is the means through which the criminal can gain access of stored information. Ex: harassing, stalking, and crimes against persons, including physical and psychological harm etc. Crimes have occurred in both instances: the use of the computer by the criminal the targeted theft of information from the hacked computer system Incidentals: Computer crimes dealing with incidentals exist when a computer has played a minor role in an offense. Ex: Malware, Trojan horse etc
  • 7. Child Pornograph y 01 Creating Malware 03 Fraud 04 Enrollment Process Types of Computer Crime 02 Cyberbully Identity Theft Money Laundering Malware Software piracy Phishing Scam Spamming Unauthorized Access Doxing Cyber Terrorism 05 06 07 08 09 10 11 12 13 14 15
  • 8. Description of The Types Child pornography - Making or distributing child pornography. Copyright violation - Stealing or using another person's Copyrighted material without permission. Cracking - Breaking or deciphering codes designed to protect data. Cyberbullying or Cyberstalking - Harassing or stalking others online. Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.) Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
  • 9. Description of The Types Doxing - Releasing another person's personal information without their permission. Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud. Human trafficking - Participating in the illegal act of buying or selling other humans. Identity theft - Pretending to be someone you are not. Illegal sales - Buying or selling illicit goods online, including drugs, guns, and psychotropic substances. Scam - Tricking people into believing something that is not true.
  • 10. Description of The Types Phishing or vishing - Deceiving individuals to gain private or personal information about that person. Software piracy - Copying, distributing, or using software that was not purchased by the user of the software. Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses. Unauthorized access - Gaining access to systems you have no permission to access. Espionage - Spying on a person or business.
  • 11. Expansion of Computer Crime List of Top 20 Countries with the highest rate of Cybercrime: 1. United States of America 2. China 3. Germany 4. Britain 5. Brazil 6. Spain 7. Italy 8. France 9. Turkey 10. Poland
  • 12. Top 5 most notorious cyber attacks in history 1. Google China hit by cyber attack (2009) 2. Teen hacks NASA and US Defense Department 3. Phone lines blocked to win Porsche (1995) 4. Hacker targets Scientology (2008) 5. Robert Tappan Morris and the Morris Worm (1988)
  • 13. Pie Chart 80.7% Percentage that shows at least one successful attack in 2020 19.3% Percentage that shows the remaining portion that’s not affected in 2020
  • 14. International Law on Cyber Space and Digital Sovereignty The complexities and challenges of international law on cyberspace are increasingly deprived by a recent trend on digital sovereignty promotions. Digital sovereignty is the idea to control and govern access, information, communication, network, and infrastructure in digital realm by international actors (Couture & Toupin, 2019).
  • 15. It is a significant issue in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website, ATM card skimming, Bangladesh Bank heist, Terrorist Activities in social Medias are few examples of them. Cyber Crime in Bangladesh
  • 16. Cyber Law in Bangladesh Punishment for tampering with computer source documents Section 67 Section 66 For Hacking with computer System Punishment for hacking Section 68 In Bangladesh, A Draft Bill on Information and Communication Technology has been introduced in the Parliament. The final report on the Law on Information Technology was approved by the Office of the Law Commission in its meeting dated 08.09.2002.
  • 17. Cyber Crime Prevention ● Use Strong Passwords ● Secure your computer: Activate your firewall Use anti-virus/malware software Block spyware attacks ● Be Social-Media Savvy ● Secure your Mobile Devices ● Install the latest operating system updates ● Protect your Data ● Secure your wireless network ● Protect your e-identity ● Avoid being scammed ● Call the right person for help
  • 18. What to do if you get attacked? Don’t get panicked and don’t do like the instructions of the criminals Keep a backup of all your data Practice smart cyber security habits Call the right person for help
  • 19. annually lost to cybercrime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 600 Billion Conclusion As much as is We should be more careful in the world of cyber security to eradicate dangerous losses and to be safe.
  • 20. References ● https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia- biggest-cyber-offenders-since-2006-report-shows ● http://www.bezaspeaks.com/cybercrime/history.htm ● https://criminal.findlaw.com/criminal-charges/computer-crime.html ● https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in- bangladesh-information-technology-essay.php ● https://www.cybercrimelaw.net/Bangladesh.html ● https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work ● https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English- version.pdf ● https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as _sdt=0&as_vis=1&oi=scholart ● https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer- crimes.aspx/ ● https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html ● And many more…...