SlideShare a Scribd company logo
1 of 23
COMPUTER CRIME
Submitted To: Naim. A. Dewan Mehreen Mahmood-1020407030 Anika Rahman-1020838030 March 29, 2011
	A computer crime is any unlawful activity that is done using a computer
The First Incident of Cyber Crime The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology. The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
Types of Cyber Crime Viruses and Worms Viruses are programs that attach 	themselves to a computer or a file.  	 	They then circulate themselves to other 	files and to other computers on a 	network. 	 	Worms, unlike viruses do not need the 	host to attach themselves to.  		They merely make functional copies of 	themselves and do this repeatedly till 	they eat up all the available space on a 	computer's memory.
2. Denial-of-Service-Attacks These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis. 3.   Malware Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission.  	Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
4. Hacking Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
5. Software Piracy Unauthorized copying of purchased software is called software piracy.  	Making copies of the software for commercial distribution, or resale is illegal.  	However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
6. Fraud Online fraud and cheating  	is one of the most lucrative businesses that are growing  	today in the cyber space.  	Some of the cases of online fraud  	and cheating that have come to  	light are those relating to credit card  	crimes, bank fraud, contractual  	crimes, internet scams, identity theft, extortion etc.
7. Cyber stalking Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
8. Obscene or Offensive Content Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography. Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
9. Harassment Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
10. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
11. Computer  Vandalism       Vandalism means deliberately destroying or damaging property of another.        These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
12. Spam 	The unwanted sending of bulk e-mail for commercial purposes is called spam. Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
Prevention of Computer Crime
Top 20 countries that commit the most Cyber Crimes
A Comparison of Software Piracy Rates in the World
Software Piracy in Bangladesh The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
COMPUTER CRIME-BANGLADESH 	Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber  crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
CONCLUSION Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.
Any Questions

More Related Content

What's hot (20)

Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Unit 1
Unit 1Unit 1
Unit 1
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Viewers also liked

Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer assisted instruction
Computer assisted instructionComputer assisted instruction
Computer assisted instructionVinci Viveka
 
Computer Assisted Instruction
Computer Assisted InstructionComputer Assisted Instruction
Computer Assisted Instructionnancyd0703
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 

Viewers also liked (7)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer assisted instruction
Computer assisted instructionComputer assisted instruction
Computer assisted instruction
 
Computer as a teachers tool
Computer as a teachers toolComputer as a teachers tool
Computer as a teachers tool
 
Computer Assisted Instruction
Computer Assisted InstructionComputer Assisted Instruction
Computer Assisted Instruction
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Similar to Computer crime

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 

Similar to Computer crime (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
 cyber crime cyber crime
cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Computer crime

  • 2. Submitted To: Naim. A. Dewan Mehreen Mahmood-1020407030 Anika Rahman-1020838030 March 29, 2011
  • 3. A computer crime is any unlawful activity that is done using a computer
  • 4. The First Incident of Cyber Crime The first major computer crimes came into being in the 1960’s when a group of hackers emerged from Massachusetts Institute of Technology. The first virus came into being in 1981. It was created on the Apple II operating software and was spread through floppy disk, containing the operating software.
  • 5.
  • 6. Types of Cyber Crime Viruses and Worms Viruses are programs that attach themselves to a computer or a file. They then circulate themselves to other files and to other computers on a network. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 7. 2. Denial-of-Service-Attacks These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis. 3. Malware Malware means malicious software. It is designed to secretly access an individual’s computer without his/her permission. Most malware are software’s created with the intent of stealing data. Using these software’s, which are usually disguised as harmless pop-ups and such, information about the users is collected without their knowledge.
  • 8. 4. Hacking Hacking is unauthorized access over a computer system, and it usually involves modifying computer hardware or software to accomplish a goal outside the creator’s purpose.
  • 9. 5. Software Piracy Unauthorized copying of purchased software is called software piracy. Making copies of the software for commercial distribution, or resale is illegal. However software piracy is still rampant around the globe, because it is almost impossible to put an end to it.
  • 10. 6. Fraud Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. Some of the cases of online fraud and cheating that have come to light are those relating to credit card crimes, bank fraud, contractual crimes, internet scams, identity theft, extortion etc.
  • 11. 7. Cyber stalking Cyber stalking involves following a person's movements across the Internet by posting threatening messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, and constantly bombarding the victim with emails.
  • 12. 8. Obscene or Offensive Content Includes contents of websites that may be distasteful, obscene, or offensive in many ways. One of the major victims of this type of crime is child pornography. Child pornography includes sexual images involving children under puberty, puberty, and post-puberty and computer-generated images that appear to involve them in sexual acts.
  • 13. 9. Harassment Any comment that may be considered degratory or offensive is considered harassment. Harassment via the internet occurs in chat rooms, social networking sites, and e-mails.
  • 14. 10. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms or weapons. These forms of trafficking are carried on under pseudonyms, encrypted emails, and other internet technology.
  • 15. 11. Computer Vandalism Vandalism means deliberately destroying or damaging property of another. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer, or by physically damaging a computer or its peripherals.
  • 16. 12. Spam The unwanted sending of bulk e-mail for commercial purposes is called spam. Although this is a relatively minor crime, recently new anti-spam laws have cropped up to restrict the sending of these e-mails.
  • 18. Top 20 countries that commit the most Cyber Crimes
  • 19. A Comparison of Software Piracy Rates in the World
  • 20. Software Piracy in Bangladesh The biggest legal problem affecting Bangladesh is software piracy. Software piracy in Bangladesh has only emerged since there is no law enforcement at all preventing it, and it is so easy to do. Although laws remain in place, for fining and jailing those found marketing and selling pirated software, the lack of vigilance from the authorities has ensured that software piracy remains a thriving business.
  • 21. COMPUTER CRIME-BANGLADESH Basically, with the exception of software piracy, no notable cyber crime has yet been committed in Bangladesh. With the exception of a few threatening emails, and some obscene contents uploaded to a harass political leaders, Bangladesh has escaped the wrath of cyber crimes. However with the increasing use of the internet Bangladesh will almost definitely experience a rise in cyber crimes in the near future.
  • 22. CONCLUSION Although it will not be possible to eliminate all the computer crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them. History is the witness that no government has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime.