0% found this document useful (0 votes)
27 views21 pages

Unit-1-4.the Role of Computers in Crime

The document outlines various types of cyber crimes, including viruses, hacking, malware, and online fraud, highlighting their impact and methods of execution. It emphasizes the historical context of cyber crime, beginning in the 1960s, and notes the specific issue of software piracy in Bangladesh. The conclusion suggests that while complete elimination of cyber crime is impossible, increased awareness and stricter law enforcement can help mitigate its prevalence.

Uploaded by

devasandeep0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views21 pages

Unit-1-4.the Role of Computers in Crime

The document outlines various types of cyber crimes, including viruses, hacking, malware, and online fraud, highlighting their impact and methods of execution. It emphasizes the historical context of cyber crime, beginning in the 1960s, and notes the specific issue of software piracy in Bangladesh. The conclusion suggests that while complete elimination of cyber crime is impossible, increased awareness and stricter law enforcement can help mitigate its prevalence.

Uploaded by

devasandeep0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

A computer crime is any unlawful activity that

is done using a computer


The First incident of Cyber Crime

 The first major computer crimes came into being in the


1960’s when a group of hackers emerged from
Massachusetts Institute of Technology.

 The first virus came into being in 1981. It was created on


the Apple II operating software and was spread through
floppy disk, containing the operating software.
Hacki
ng
Malware

Virus and

Worms Denial of
CYBER Service Spa
Attacks
CRIME m
Computer
Vandalism
Obscene
Content

Fraud

Software

Piracy

Harassme
nt
Types of Cyber Crimes
1. Viruses and Worms
Viruses are programs that attach
themselves to a computer or a file.
They then circulate themselves to
other files and to other computers on
a network.

Worms, unlike viruses do not need the


host to attach themselves to.
They merely make functional copies
of themselves and do this repeatedly
till they eat up all the available
space on a computer's memory.
2. Denial-of-Service-
Attacks
These attacks occur when a person or a group of people try to
prevent a internet site from functioning effectively either temporarily
or on a long term basis.

3. Malware
Malware means malicious software. It is designed to secretly access
an individual’s computer without his/her permission.
Most malware are software’s created with the intent of stealing data.
Using these software’s, which are usually disguised as harmless pop-ups
and such, information about the users is collected without their
knowledge.
4.
Hacking
Hacking is unauthorized access over a computer system,
and it usually involves modifying computer hardware or
software to accomplish a goal outside the creator’s
purpose.
5. Software
Piracy
Unauthorized copying of purchased software is called
software piracy.
Making copies of the software for commercial distribution,
or resale is illegal.
However software piracy is still rampant around the
globe, because it is almost impossible to put an end to
it.
6.
Fraud
Online fraud and cheating
is one of the most
lucrative
businesses that are
growing today in the cyber
space.

Some of the cases of online fraud


and cheating that have come to
light are those relating to credit
card crimes, bank fraud,
7. Cyber
stalking
Cyber stalking involves following a person's movements
across the Internet by posting threatening messages on
the bulletin boards frequented by the victim, entering the
chat- rooms frequented by the victim, and constantly
bombarding the victim with emails.
8. Obscene or Offensive
Content
Includes contents of websites that may be
distasteful, obscene, or offensive in many ways.
One of the major victims of this type of crime is
child pornography.
Child pornography includes sexual images involving
children under puberty, puberty, and post-puberty and
computer- generated images that appear to involve them
in sexual acts.
9.
Harassmen
t Any comment that may be considered degratory or
offensive is considered harassment. Harassment via the
internet occurs in chat rooms, social networking sites, and
e- mails.
10.
Trafficking
Trafficking may assume different forms. It may be
trafficking in drugs, human beings, arms or weapons.
These forms of trafficking are carried on under
pseudonyms, encrypted emails, and other internet
technology.
11. Computer
Vandalism
Vandalism means deliberately destroying or
damaging property of another.

These acts may take the form of the theft of a


computer, some part of a computer or a peripheral
attached to the computer, or by physically damaging a
computer or its peripherals.
12.
Spam

The unwanted sending of bulk e-mail for


commercial purposes is called spam.

Although this is a relatively minor crime, recently new


anti- spam laws have cropped up to restrict the sending
of these e-mails.
Always use latest and updated antivirus software's to
guard against virus attacks.

Avoid sending photographs online particularly to


strangers and chat friends as there have been incidents
of misuse of the photographs.

Web site owners should watch internet traffic and check


any irregularity on the site. Putting host-based intrusion
detection devices on servers may do this.

Use a security program that gives control over the cookies


and sends information back to the site, as leaving the
cookies unguarded might prove fatal.
Top 20 countries that commit the most
Cyber Crimes
Software Piracy in
Bangladesh
The biggest legal problem affecting Bangladesh is
software piracy. Software piracy in Bangladesh has only
emerged since there is no law enforcement at all
preventing it, and it is so easy to do. Although laws
remain in place, for fining and jailing those found
marketing and selling pirated software, the lack of
vigilance from the authorities has ensured that software
piracy remains a thriving business.
COMPUTER CRIME-
BANGLADESH
Basically, with the exception of software piracy, no notable
cyber crime has yet been committed in Bangladesh. With
the exception of a few threatening emails, and some
obscene contents uploaded to a harass political leaders,
Bangladesh has escaped the wrath of cyber crimes.
However with the increasing use of the internet
Bangladesh will almost definitely experience a rise in
cyber crimes in the near future.
CONCLUSIO
N
Although it will not be possible to eliminate all the
computer crime from the world, because new
crimes keep cropping up every day, it is possible to
keep a check on them. History is the witness that
no government has succeeded in totally
eliminating crime from the globe. The only
possible step is to make people aware of their
rights and duties, and further making the
application of the laws more stringent to check
crime.

You might also like