SlideShare une entreprise Scribd logo
1  sur  22
CYBER CRIME
GROUP LIST
• Joy Bhowmik
• Habubur Rahman
• Mahfuz Ahmed
• Najmus Sakib
• Siam Ahmed
CONTENTS
• DEFINITION OF CYBER CRIME
• CYBER CRIME CATEGORY
• CYBER CRIME EFFECT
• CYBER CRIME SECURITY & SAFETY
• CYBER LAW IN BANGLADESH
INTRODUCTION
• Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
CYBER CRIME HISTORY
• The first recorded cyber crime took place in 1820.
• In India, Japan and China, the era of modern computer,
however, began with the analytical engine of Charles Babbage.
• The first virus was installed on an Apple computer in 1982
when a high school student, Rich skrenta, developed the EIK
Cloner.
CATAGORIES OF CYBER CRIME
• Hacking
• Virus attack
• Computer Crime
• Cyber Terrorism
• Software Piracy
Examples of Computer Crimes
• Improperly accessing a computer, system, or network;
• Modifying, damaging, copying, or taking programs or
data;
• Introducing a virus into a computer system;
• Using encryption in aid of a crime;
• Stealing an information service from a provider.
PRESENT TREND OF CYBER CRIME IN BANGLADESH
• 1. Bangladesh Bank Heist 2016
• 2. Skype Scandal over International War Crime Tribunal
• 3. Bangladesh Computer society website hacked in 2012
• 4. Stealing the transaction report of Dhaka Stock Exchange
• 5. Inserting unleagel movies to the Bangladesh National
Parliament website.
CYBER CRIME IN WORLD WIDE EFFECT
• The loss of intellectual property and sensitive data.
• Opportunity costs, including service and employment disruptions.
• Damage to the brand image and company reputation.
• Cost of countermeasures and insurance.
• Cost of mitigation strategies and recovery from cyber attacks.
• The loss of trade and competitiveness.
• Distortion of trade.
• Job loss.
How to prevent
• Constantly update passwords and login details
• A secure computer will deter cyber criminals
• Be social media savvy
• Secure mobile devices
• Protect your Data
• Protect your e-identity
• Avoid being scammed
CYBER CRIME SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to use
against attacks over the Internet.
ADVANTAGES OF CYBER SECURITY
• The cyber security will defend us from critical attacks.
• It will defend us from hacks and virus.
• Application of cyber security used in our PC needs
update every week.
CYBER CRIME SAFETY TIPS
• Use antivirus Software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
CYBER LAW OF BANGLADESH
• In order to safe e-commerce and encourage the growth of information
technology, the ICT Act, 2006 was passed making provisions with a
maximum punishment of 10 years imprisonment or fine up to taka 10
million or with both.
• However, recently our Parliament approved the ICT Act
2006, raising penalties for cybercrimes setting a
minimum of 7 years imprisonment and a maximum of
14 years or a fine of Tk. 1 core or both.
CONCLUSION
• Basically, small scale cyber crime occurs in our
country . But extensive use of computer and
information technology by the financial institutions
like bank, insurance company, and other non-
government organizations and individual as well,
increase the fear of commission of cybercrime. So we
have to alert about the potential threat of cybercrime.
THANK YOU

Contenu connexe

Tendances (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ppt
PptPpt
Ppt
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similaire à Cyber crime

Similaire à Cyber crime (20)

Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
ENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptxENGLISH PRESENTATION copy.pptx
ENGLISH PRESENTATION copy.pptx
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 

Dernier

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Dernier (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Cyber crime

  • 2. GROUP LIST • Joy Bhowmik • Habubur Rahman • Mahfuz Ahmed • Najmus Sakib • Siam Ahmed
  • 3. CONTENTS • DEFINITION OF CYBER CRIME • CYBER CRIME CATEGORY • CYBER CRIME EFFECT • CYBER CRIME SECURITY & SAFETY • CYBER LAW IN BANGLADESH
  • 4.
  • 5. INTRODUCTION • Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 6. CYBER CRIME HISTORY • The first recorded cyber crime took place in 1820. • In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 7.
  • 8. CATAGORIES OF CYBER CRIME • Hacking • Virus attack • Computer Crime • Cyber Terrorism • Software Piracy
  • 9. Examples of Computer Crimes • Improperly accessing a computer, system, or network; • Modifying, damaging, copying, or taking programs or data; • Introducing a virus into a computer system; • Using encryption in aid of a crime; • Stealing an information service from a provider.
  • 10.
  • 11. PRESENT TREND OF CYBER CRIME IN BANGLADESH • 1. Bangladesh Bank Heist 2016 • 2. Skype Scandal over International War Crime Tribunal • 3. Bangladesh Computer society website hacked in 2012 • 4. Stealing the transaction report of Dhaka Stock Exchange • 5. Inserting unleagel movies to the Bangladesh National Parliament website.
  • 12. CYBER CRIME IN WORLD WIDE EFFECT • The loss of intellectual property and sensitive data. • Opportunity costs, including service and employment disruptions. • Damage to the brand image and company reputation. • Cost of countermeasures and insurance. • Cost of mitigation strategies and recovery from cyber attacks. • The loss of trade and competitiveness. • Distortion of trade. • Job loss.
  • 13.
  • 14. How to prevent • Constantly update passwords and login details • A secure computer will deter cyber criminals • Be social media savvy • Secure mobile devices • Protect your Data • Protect your e-identity • Avoid being scammed
  • 15.
  • 16. CYBER CRIME SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 17. ADVANTAGES OF CYBER SECURITY • The cyber security will defend us from critical attacks. • It will defend us from hacks and virus. • Application of cyber security used in our PC needs update every week.
  • 18. CYBER CRIME SAFETY TIPS • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 19. CYBER LAW OF BANGLADESH • In order to safe e-commerce and encourage the growth of information technology, the ICT Act, 2006 was passed making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or with both.
  • 20. • However, recently our Parliament approved the ICT Act 2006, raising penalties for cybercrimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 core or both.
  • 21. CONCLUSION • Basically, small scale cyber crime occurs in our country . But extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non- government organizations and individual as well, increase the fear of commission of cybercrime. So we have to alert about the potential threat of cybercrime.