Easy presentation on Computer crime, expansions and prevention.
Size: 1.47 MB
Language: en
Added: Aug 05, 2021
Slides: 21 pages
Slide Content
Computer Crime Presented By: Tasmin Farid Tonney Presented To: Prof. Dr. M d. Mo nirul Islam Professor, Dept. of CSE IIUC
Things We are going to Discuss: What is computer crime? First Cyber Crime Categories of computer crime and Their Description Types of Computer Crime and Their Descriptions Expansion of computer crime Top 5 most notorious cyber attacks in history Pie Chart International Law on Cyber Space and Digital Sovereignty Cyber Crime in Bangladesh Cyber law in Bangladesh Prevention and Steps to be secured Conclusion References
What is Computer Crime? Computer Crime is any criminal activity that uses a computer. It is also known as cyber crime. Cybercrime may threaten a person, company or a nation's security and financial health.
First Cyber Crime Happened in 1820 Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
Categories of Computer Crime “ There are three general categories of computer crime: targets, means, and incidentals” (Britz, 2009, p. 51), however these three are not necessarily mutually exclusive of one another. Many computer crimes “involve a multiplicity of intentions ” So, There are Three categories: Targets Means Incidentals
Description Of The Categories Targets: The computer is the intended target of a criminal, as may (or may not) be the case with hacking. Ex: Hacking, DDoS Attack etc. Means: In this instance, the computer is the means through which the criminal can gain access of stored information. Ex: harassing, stalking, and crimes against persons, including physical and psychological harm etc. Crimes have occurred in both instances : the use of the computer by the criminal t he targeted theft of information from the hacked computer system Incidentals: Computer crimes dealing with incidentals exist when a computer has played a minor role in an offense. Ex: Malware, Trojan horse etc
Description of The Types Child pornography - Making or distributing child pornography. Copyright violation - Stealing or using another person's Copyrighted material without permission. Cracking - Breaking or deciphering codes designed to protect data. Cyberbullying or Cyberstalking - Harassing or stalking others online. Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.) Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
Description of The Types Doxing - Releasing another person's personal information without their permission. Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud. Human trafficking - Participating in the illegal act of buying or selling other humans. Identity theft - Pretending to be someone you are not. Illegal sales - Buying or selling illicit goods online, including drugs, guns, and psychotropic substances. Scam - Tricking people into believing something that is not true.
Description of The Types Phishing or vishing - Deceiving individuals to gain private or personal information about that person. Software piracy - Copying, distributing, or using software that was not purchased by the user of the software. Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses. Unauthorized access - Gaining access to systems you have no permission to access. Espionage - Spying on a person or business.
Expansion of Computer Crime List of Top 20 Countries with the highest rate of Cybercrime: 1. United States of America 2. China 3. Germany 4. Britain 5. Brazil 6. Spain 7. Italy 8. France 9. Turkey 10. Poland
Top 5 most notorious cyber attacks in history G oogle China hit by cyber attack (2009) Teen hacks NASA and US Defense Department Phone lines blocked to win Porsche (1995) Hacker targets Scientology (2008) Robert Tappan Morris and the Morris Worm (1988)
Pie Chart 80.7 % Percentage that shows at least one successful attack in 2020 19.3 % Percentage that shows the remaining portion that’s not affected in 2020
International Law on Cyber Space and Digital Sovereignty The complexities and challenges of international law on cyberspace are increasingly deprived by a recent trend on digital sovereignty promotions. Digital sovereignty is the idea to control and govern access, information, communication, network, and infrastructure in digital realm by international actors (Couture & Toupin, 2019).
It is a significant issue in Bangladesh . It has already been seen that a glomming threat becomes visible in the arena of information technology. Recently the hacking of RAB website, ATM card skimming, Bangladesh Bank heist, Terrorist Activities in social Medias are few examples of them. Cyber Crime in Bangladesh
Cyber Law in Bangladesh Punishment for tampering with computer source documents Section 67 Section 66 For Hacking with computer System Punishment for hacking Section 68 In Bangladesh, A Draft Bill on Information and Communication Technology has been introduced in the Parliament. The final report on the Law on Information Technology was approved by the Office of the Law Commission in its meeting dated 08.09.2002.
Cyber Crime Prevention Use Strong Passwords Secure your computer: Activate your firewall Use anti-virus/malware software Block spyware attacks Be Social-Media Savvy Secure your Mobile Devices Install the latest operating system updates Protect your Data Secure your wireless network Protect your e-identity Avoid being scammed Call the right person for help
What to do if you get attacked? Don’t get panicked and don’t do like the instructions of the criminals Keep a backup of all your data Practice smart cyber security habits Call the right person for help
annually lost to cybercrime as attackers are becoming increasingly sophisticated in their approach, adopting new technologies and leveraging black markets and digital currencies. 6 00 Billion Conclusion As much as is W e should be more careful in the world of cyber security to eradicate dangerous losses and to be safe.
References https://www.usnews.com/news/best-countries/articles/2019-02-01/china-and-russia-biggest-cyber-offenders-since-2006-report-shows http://www.bezaspeaks.com/cybercrime/history.htm https://criminal.findlaw.com/criminal-charges/computer-crime.html https://www.ukessays.com/essays/information-technology/weakness-of-cyber-law-in-bangladesh-information-technology-essay.php https://www.cybercrimelaw.net/Bangladesh.html https://www.dhakatribune.com/opinion/2018/09/02/ict-laws-which-work https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-English-version.pdf https://scholar.google.com/scholar?q=computer+crime+prevention+strategies&hl=en&as_sdt=0&as_vis=1&oi=scholart https://www.southbaylawyer.com/Blog/2018/07/the-different-types-of-computer-crimes.aspx/ https://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html And many more…...