Assalamualaikum Today, I am going to give a presentation on

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
CYBER CRIME& SECUIRITY
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
Cyber Crimes Mumbai Police. Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
Issues Raised by ICT.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Prepared by: Dinesh Bajracharya Nepal Security and Control.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Technical Implementation: Security Risks
Done by… Hanoof Al-Khaldi Information Assurance
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
CYBER SECURITY...
IT Security  .
Chapter 19.1 Cyberlaw and Cybercrime
Cyber crime and security issues
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 11 crime and security in the networked economy
The Best Way To Secure U R Self
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Five Unethical Uses of Computers
Understanding the Need for Security Measures
BCT 2.00 Analyze Technology Issues
Chapter 13 Security and Ethical Challenges.
Societal Issues in Computing (COMP466)
Top Five Computer Related Crimes
Unit# 7: Future Enabling use of ICT
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Entering the World of Cybercrime
Computer Security By: Muhammed Anwar.
Marcial Quinones-Cardona
Introduction-Cyber Safety
Presentation transcript:

Assalamualaikum Today, I am going to give a presentation on Aysha Khanom Id: TE-1707172

The table of contents of our presentation INTRODUCTION HISTORY OF CYBER CRIME CATEGORIES OF CYBER CRIME TYEPS OF CYBER CRIMES IN BANGLADESH REASONS BEHIND CIBER CRIMES CYBER LAW OF BANGLADESH SAFETY TIPS FROM CYBER CRIME CONCLUSION

What is Cyber crime? In General, Cybercrime may be said to be those offences, of which, genus is the conventional Crime, and where either the computer is an object or subject of the conduct online crime. “Any criminal activity that uses a computer either an instrumentality, target or a means for further crimes comes within the ambit of cybercrime”.

The history of cyber crime The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich scent, developed the EIK Cloner.

Categories of cyber crime We can categorize cyber crime in two ways. The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.

Types of cyber crime HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called HACKERS Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.

Types of cyber crime CHILD PORNOGRAPHY : The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles. How Do They Operate : How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.

Types of cyber crimes DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks. VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc. COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.

Types of cyber crime CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc. SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Cyber-crime report in Bangladesh 4 out of 10 peoples are victim of CIBER attack Among them most are of 12-25 Popular crimes- Money fraud, Piracy, pornography Sources of news- Television & Newspaper Most of the Reasons are- Greed of Money and Power

Around 73 percent women who use the internet in Bangladesh are subject to cyber-bullying or another form of cyber-crime, State Minister for Post and Telecommunications Tarana Halim has said. “Though 73 percent of the suffered from criminal activities on the internet by 23 percent of them do not make any complaint,” she said.

Reasons of Cyber-Crimes Easy access Outlaw advantage Huge data in one place New area of Crime No monitoring

The ICT division of Bangladesh of is new of facing such cyber crimes The ICT division of Bangladesh of is new of facing such cyber crimes. The have started to develop their man power and their strategy to stop cyber crimes.

How to Tackle Such Activities?? Awareness Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. secure websites Do Not respond or act on emails sent from unknown sources.

Conclusion Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. 

Thank You