SlideShare a Scribd company logo
1 of 17
CYBERCRiME
AND IT’s IMPACT iN
BANGLADESH
PRESENT BY,
Md. Abdur Rahman
15237202054
Dept of CSE
The People’s University of Bangladesh (PUB)
1
TABLE OF CONTENTs
o ABSTRACT
o PROFILE OF CYBER CRIMINALS
o CYBERCRIME
o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER
o TYPES OF CYBERCRIME
o BROAD CLASSIFICATION
o MISUSE OF INFORMATION TECHNOLOGIES
o REASONS OF CYBERCRIME
o INTRODUCTION
o IMPACT OF CYBERCRIME
o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH
o CYBER TRIBUNAL
o CONCLUSION
2
ABSTRACT
o Cyber and technology related crime is gradually increasing in Bangladesh. It has already
been seen that a glomming threat becomes visible in the arena of information technology.
Recently the hacking of RAB website and e-mail threats of former prime minister is
example for few of them.
o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are
several clauses against cybercrime. But this Information and Communication Technology
act is not the concrete one.
o So, considering these facts a comprehensive Cybercrime Protection Act should be
imposed. This presentation will focus on the impacts of cybercrime in Bangladesh.
3
INTRODUCTiON
o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime
took place in the year 1820!
o In our daily life, economic activities, and national security highly depend on stability,
safety of our cyberspace. A network brings communications and transports, power to our
homes, run our economy, and provide government various services.
But . . . .
“Ever since men began to modify their lives by using technology they
have found themselves in a series of technological traps”
4
CYBERCRiME
o In General, Cybercrime may be said to be those
offences, of which, genus is the conventional
Crime, and where either the computer is an object
or subject of the conduct online crime.
“Any criminal activity that uses a computer
either an instrumentality, target or a means
for further crimes comes within the ambit of
cybercrime”.
5
o THE COMPUTER AS A TARGET
Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
o THE COMPUTER AS A WEAPON
Using a computer to commit real world crimes.
E.g. Cyber Terrorism, Credit card frauds, Pornography etc.
CYBERCRiMES
IN TWO WAYs BASED ON
USE OF COMPUTER . .
6
TYPEs OF CYBERCRiME
o Cybercrime may be committed by creating or releasing a malicious computer
program. (E.g. computer virus, Trojan horse).
o Cybercrime may be committed by stalking in cyberspace.
o THERE ARE THREE MAJOR CLASSES OF CRIMINAL
ACTIVITIES WITH COMPUTERS
o Unauthorized use of a computer.
7
BROAD CLASSiFICATiON
THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO
THREE GROUPS. THEY ARE . . .
o AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
o AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
o AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, Online gambling, ETC.
8
o UNAUTHORIZED ACCESS & HACKING
o VIRUS DISSEMINATION
o SOFTWARE PIRACY
o CREDIT CARD FRAUD
MiSUSE OF
INFORMATiON TECHNOLOGiEs
9
o SALE OF ILLEGAL ARTICLES
o EMAIL BOMBING
o EMAIL SPOOFING
o TROJAN ATTACK
o SALAMI ATTACKS
o CYBER DEFORMATION, CYBER STALKING,EMAIL
SPAMMING, PORNOGRAPHY, ETC.
MiSUSE OF
INFORMATiON TECHNOLOGiEs
10
REASONs
OF CYBERCRiME
o LACK OF EVIDENCE
o EASY TO ACCESS
o COMPLEX
o NEGLIGENCE
o CAPACITY TO STORE DATA IN SMALL SPACE
11
o Organized hackers these kinds of hackers are mostly organized
together to fulfill certain objective.
o Professional hackers / crackers their work is motivated by the
color of money.
o Discontented employees.
PROFiLE OF CYBER CRiMINALS
o Cyber criminals is constitute of various groups/ category. This division may be justified
on the basis of the object that they have in their mind. The following are the category of
cyber criminals . . .
12
IMPACT
OF CYBERCRiME
o Cybercrimes committed against people include various
crimes like transmission of child pornography and
harassment through e-mail. The trafficking, distribution
and posting of offensive material including pornography
one of the most spreading cybercrimes known today.
o Cybercrime has already become a going concern in both
private as well as public sector in Bangladesh. Due to
unauthorized access to the system, company loses huge
confidential information which caused a large amount of
financial lose.
13
LEGAL RESPONSE
TO CYBERCRiME
IN BANGLADESH
o In order to safe e-commerce and encourage the growth of
information technology, the ICT Act, 2006 was passed
making provisions with a maximum punishment of 10
years imprisonment or fine up to taka 10 million or with
both. However, recently our Parliament approved the ICT
Act 2006, raising penalties for cybercrimes setting a
minimum of 7 years imprisonment and a maximum of 14
years or a fine of Tk. 1 core or both.
14
CYBER TRiBUNAL
o According to section 68 of the Information and
Communication Technology Act, 2006 for the speedy and
effective disposal of cases under this Act, Government shall
establish one or more cyber tribunal. The tribunal shall try
only the offences under this Act and the Government shall
determine the local jurisdiction of the tribunal. In
consultation with the Supreme Court, Government shall
appoint on Sessions Judge or Additional Sessions Judge as a
judge of Cyber Tribunal.
15
CONCLUSiON
Basically, small scale cyber crime occurs in our country . But extensive use of
computer and information technology by the financial institutions like bank,
insurance company, and other non-government organizations and individual as
well, increase the fear of commission of cybercrime. So we have to alert about
the potential threat of cybercrime.
16
THANK YOU !
17

More Related Content

What's hot

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 

What's hot (20)

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Similar to Cyber Security & Crime In Bangladesh

Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0alisondakintxt
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 

Similar to Cyber Security & Crime In Bangladesh (20)

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Cyber Security & Crime In Bangladesh

  • 1. CYBERCRiME AND IT’s IMPACT iN BANGLADESH PRESENT BY, Md. Abdur Rahman 15237202054 Dept of CSE The People’s University of Bangladesh (PUB) 1
  • 2. TABLE OF CONTENTs o ABSTRACT o PROFILE OF CYBER CRIMINALS o CYBERCRIME o CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER o TYPES OF CYBERCRIME o BROAD CLASSIFICATION o MISUSE OF INFORMATION TECHNOLOGIES o REASONS OF CYBERCRIME o INTRODUCTION o IMPACT OF CYBERCRIME o LEGAL RESPONSE TO CYBERCRIME IN BANGLADESH o CYBER TRIBUNAL o CONCLUSION 2
  • 3. ABSTRACT o Cyber and technology related crime is gradually increasing in Bangladesh. It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website and e-mail threats of former prime minister is example for few of them. o In the Information and Communication Technology Act-2006 and ICT Act-2013 there are several clauses against cybercrime. But this Information and Communication Technology act is not the concrete one. o So, considering these facts a comprehensive Cybercrime Protection Act should be imposed. This presentation will focus on the impacts of cybercrime in Bangladesh. 3
  • 4. INTRODUCTiON o Cyber-crime has had a short but highly eventful history. The past recorded cybercrime took place in the year 1820! o In our daily life, economic activities, and national security highly depend on stability, safety of our cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government various services. But . . . . “Ever since men began to modify their lives by using technology they have found themselves in a series of technological traps” 4
  • 5. CYBERCRiME o In General, Cybercrime may be said to be those offences, of which, genus is the conventional Crime, and where either the computer is an object or subject of the conduct online crime. “Any criminal activity that uses a computer either an instrumentality, target or a means for further crimes comes within the ambit of cybercrime”. 5
  • 6. o THE COMPUTER AS A TARGET Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. o THE COMPUTER AS A WEAPON Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc. CYBERCRiMES IN TWO WAYs BASED ON USE OF COMPUTER . . 6
  • 7. TYPEs OF CYBERCRiME o Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse). o Cybercrime may be committed by stalking in cyberspace. o THERE ARE THREE MAJOR CLASSES OF CRIMINAL ACTIVITIES WITH COMPUTERS o Unauthorized use of a computer. 7
  • 8. BROAD CLASSiFICATiON THE SUBJECT OF CYBER-CRIME MAY BE BROADLY CLASSIFIED INTO THREE GROUPS. THEY ARE . . . o AGAINST INDIVIDUALS A. Person & B. Property of an individual o AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. o AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, Online gambling, ETC. 8
  • 9. o UNAUTHORIZED ACCESS & HACKING o VIRUS DISSEMINATION o SOFTWARE PIRACY o CREDIT CARD FRAUD MiSUSE OF INFORMATiON TECHNOLOGiEs 9
  • 10. o SALE OF ILLEGAL ARTICLES o EMAIL BOMBING o EMAIL SPOOFING o TROJAN ATTACK o SALAMI ATTACKS o CYBER DEFORMATION, CYBER STALKING,EMAIL SPAMMING, PORNOGRAPHY, ETC. MiSUSE OF INFORMATiON TECHNOLOGiEs 10
  • 11. REASONs OF CYBERCRiME o LACK OF EVIDENCE o EASY TO ACCESS o COMPLEX o NEGLIGENCE o CAPACITY TO STORE DATA IN SMALL SPACE 11
  • 12. o Organized hackers these kinds of hackers are mostly organized together to fulfill certain objective. o Professional hackers / crackers their work is motivated by the color of money. o Discontented employees. PROFiLE OF CYBER CRiMINALS o Cyber criminals is constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals . . . 12
  • 13. IMPACT OF CYBERCRiME o Cybercrimes committed against people include various crimes like transmission of child pornography and harassment through e-mail. The trafficking, distribution and posting of offensive material including pornography one of the most spreading cybercrimes known today. o Cybercrime has already become a going concern in both private as well as public sector in Bangladesh. Due to unauthorized access to the system, company loses huge confidential information which caused a large amount of financial lose. 13
  • 14. LEGAL RESPONSE TO CYBERCRiME IN BANGLADESH o In order to safe e-commerce and encourage the growth of information technology, the ICT Act, 2006 was passed making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or with both. However, recently our Parliament approved the ICT Act 2006, raising penalties for cybercrimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 core or both. 14
  • 15. CYBER TRiBUNAL o According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. The tribunal shall try only the offences under this Act and the Government shall determine the local jurisdiction of the tribunal. In consultation with the Supreme Court, Government shall appoint on Sessions Judge or Additional Sessions Judge as a judge of Cyber Tribunal. 15
  • 16. CONCLUSiON Basically, small scale cyber crime occurs in our country . But extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations and individual as well, increase the fear of commission of cybercrime. So we have to alert about the potential threat of cybercrime. 16