cybercrime final-ppt

17
CYBERCRiME AND IT’s IMPACT iN BANGLADESH PRESENT BY, SAHA, MRIDUL BUSHRA, KANIZ FATEMA & JOTHY, MD FUAD HASSAN

Upload: mridulsaha3088

Post on 12-Jan-2017

171 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Cybercrime final-ppt

CYBERCRiMEAND IT’s IMPACT iN BANGLADESH

PRESENT BY, SAHA, MRIDULBUSHRA, KANIZ FATEMA& JOTHY, MD FUAD HASSAN

Page 2: Cybercrime final-ppt

TABLE OF CONTENTso ABSTRACT

o PROFILE OF CYBER CRIMINALS

o CYBERCRIME o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER o TYPES OF CYBERCRIME o BROAD CLASSIFICATION o MISUSE OF INFORMATION TECHNOLOGIES o REASONS OF CYBERCRIME

o INTRODUCTION

o IMPACT OF CYBERCRIME o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH o CYBER TRIBUNAL o CONCLUSION

Page 3: Cybercrime final-ppt

ABSTRACT o Cyber and technology related crime is gradually increasing in Bangladesh. It has already

been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website and e-mail threats of former prime minister is example for few of them.

o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are several clauses against cybercrime. But this Information and Communication Technology act is not the concrete one.

o So, considering these facts a comprehensive Cybercrime Protection Act should be imposed. This presentation will focus on the impacts of cybercrime in Bangladesh.

Page 4: Cybercrime final-ppt

INTRODUCTiON

o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime took place in the year 1820!

o In our daily life, economic activities, and national security highly depend on stability,

safety of our cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government various services. But . . . .

“Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps”

Page 5: Cybercrime final-ppt

CYBERCRiME o In General, Cybercrime may be said to be those

offences, of which, genus is the conventional Crime, and where either the computer is an object or subject of the conduct online crime.

“Any criminal activity that uses a computer either an instrumentality, target or a means for further crimes comes within the ambit of cybercrime”.

Page 6: Cybercrime final-ppt

o THE COMPUTER AS A TARGET Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc.

o THE COMPUTER AS A WEAPON Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc.

CYBERCRiMES IN TWO WAYs BASED ONUSE OF COMPUTER . .

Page 7: Cybercrime final-ppt

TYPEs OF CYBERCRiME

o Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse).

o Cybercrime may be committed by stalking in cyberspace.

o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES WITH COMPUTERS

o Unauthorized use of a computer.

Page 8: Cybercrime final-ppt

BROAD CLASSiFICATiON THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO THREE GROUPS. THEY ARE . . .

o AGAINST INDIVIDUALS A. Person & B. Property of an individual

o AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals.

o AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure.B. Pornography C. Financial crimes. D. Sale of illegal articles, Online gambling, ETC.

Page 9: Cybercrime final-ppt

o UNAUTHORIZED ACCESS & HACKING

o VIRUS DISSEMINATION

o SOFTWARE PIRACY

o CREDIT CARD FRAUD

MiSUSE OF INFORMATiON TECHNOLOGiEs

Page 10: Cybercrime final-ppt

o SALE OF ILLEGAL ARTICLES

o EMAIL BOMBING

o EMAIL SPOOFING

o TROJAN ATTACK

o SALAMI ATTACKS

o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING, PORNOGRAPHY, ETC.

MiSUSE OF INFORMATiON TECHNOLOGiEs

Page 11: Cybercrime final-ppt

REASONs OF CYBERCRiME

o LACK OF EVIDENCE

o EASY TO ACCESS

o COMPLEX

o NEGLIGENCE

o CAPACITY TO STORE DATA IN SMALL SPACE

Page 12: Cybercrime final-ppt

o Organized hackers these kinds of hackers are mostly organized together to fulfill certain objective.

o Professional hackers / crackers their work is motivated by the color of money.

o Discontented employees.

PROFiLE OF CYBER CRiMINALS o Cyber criminals is constitute of various groups/ category. This division may be justified

on the basis of the object that they have in their mind. The following are the category of cyber criminals . . .

Page 13: Cybercrime final-ppt

IMPACT OF CYBERCRiME o Cybercrimes committed against people include various

crimes like transmission of child pornography and harassment through e-mail. The trafficking, distribution and posting of offensive material including pornography one of the most spreading cybercrimes known today.

o Cybercrime has already become a going concern in both private as well as public sector in Bangladesh. Due to unauthorized access to the system, company loses huge confidential information which caused a large amount of financial lose.

Page 14: Cybercrime final-ppt

LEGAL RESPONSE TO CYBERCRiME

IN BANGLADESH o In order to safe e-commerce and encourage the growth of

information technology, the ICT Act, 2006 was passed making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or with both. However, recently our Parliament approved the ICT Act 2006, raising penalties for cybercrimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 core or both.

Page 15: Cybercrime final-ppt

CYBER TRiBUNAL

o According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. The tribunal shall try only the offences under this Act and the Government shall determine the local jurisdiction of the tribunal. In consultation with the Supreme Court, Government shall appoint on Sessions Judge or Additional Sessions Judge as a judge of Cyber Tribunal.

Page 16: Cybercrime final-ppt

CONCLUSiONBasically, small scale cyber crime occurs in our country . But extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations and individual as well, increase the fear of commission of cybercrime. So we have to alert about the potential threat of cybercrime.

Page 17: Cybercrime final-ppt

THANK YOU !