Cyber Crime in Dhaka Essay

Submitted to:

Dr . ASM Amanullah

Professor

Department of Sociology

Submitted by:

Mubin-Ul-Haque

Roll no: 1736

Department of Computer Scientific research & Engineering

Created by simply Mubin-Ul-Haque

[email protected] com

1

Major points of Discussion

Page

1 . Definition of Crime & Cyber Crime, Difference among

Conventional Criminal offenses & Cyber Crime

2 . History of Internet Crime (World perspective)

a few

3. 1st Cyber Offense Report in Bangladesh

on the lookout for

4. Reasons for this Crime

11

your five. Classification on this Crime

12

6. Several Modes

18

7. Laws and regulations regarding Web Crime in Bangladesh (Objectives, weakness and Advantages)

eight. Punishment pertaining to Cyber Criminal offense in Bangladesh (penalty and

imprisonment )

9. Prevention of Internet Crime & Hackers.

of sixteen

4

18

18

.

Made by Mubin-Ul-Haque

[email protected] com

2

. 1 ) What is Criminal offense & Web Crime?

Criminal offense is the breaking of rules or laws and regulations for which some governing specialist (via components such as legal systems) may ultimately recommend a confidence. Crimes may also result in warnings, rehabilitation or perhaps be oblivious. Individual individual societies may possibly each establish crime and crimes in another way, in different localities (state, community, international), in different time stages with the so-called " crime", from planning, disclosure, supposedly planned, supposedly ready, incomplete, full or farrenheit uture proclaimed after the " crime"

Against the law occurs when ever someone fails the law by an overt act, omission or neglect that can result in punishment. An individual who has broken a regulation, or offers breached a rule, has been said to have committed a criminal offense.

Cyber criminal offense encompasses virtually any criminal action dealing with computers and systems (called hacking). Additionally , internet crime also contains traditional criminal offenses conducted through the Internet. By way of example; hate criminal offenses, telemarketing and Internet scam, identity fraud, and visa or mastercard account thefts are considered to be cyber criminal activity when the unlawful activities will be committed with the use of a computer and the Internet.

VARIATION BETWEEN CONVENTIONAL AND WEB Crime There is apparently not any distinction among c yber and standard crime. On the other hand on a profound introspection we might say that there is also a fine brand of demarcation involving the conventional and cyber crime, which is appreciable. The demarcation lies in the involvement of the medium in the case opf cyber offense. The cyber crime is the fact there should be a great involvement, any kind of time stage, of the virtual cyber medium.

Developed by Mubin-Ul-Haque

[email protected] com

3

2 . History of Internet Crime in world's perspective:

These are the lists in the major situations in the make use of computers and computer systems to dedicate criminal acts, starting inside the 1970's to the current day. the year of 1971

п‚·

п‚·

John Draper discovers the give-away whistle in Cap'n Crunch food boxes reproduces a 2600Hz tone. Draper builds a ‘blue box' that, once used with the whistle and sounded to a phone receiver, allows phreaks to make totally free calls. Guard publishes " Secrets with the Little Green Box" with instructions for making one. Wire fraud in the US escalates.

A rogue system called the Creeper propagates through early Bulletin Plank networks

72

п‚·

The Internetworking Doing work Group is founded to govern the standards of the Internet. Vinton Cerf is the chief and is termed as a " Daddy of the Internet”.

1973

п‚·

Teller for New York's Dime Personal savings Bank uses a computer to embezzle over $2 , 000, 000

1978

п‚·

First electronic bulletin board system (BBS) appears; turns into the primary way of communication intended for the electronic underground..

81

п‚·

Ian Murphy, otherwise known as. " Captain Zap", turns into first felon convicted of the computer crime. Murphy pennyless into AT& T's personal computers and altered the billing clock to ensure that people receive discounted costs during usual business hours.

1982

п‚·

Elk Cloner, an AppleII boot disease, is created.

1983

п‚·

п‚·

Movie WarGames introduces public for the phenomenon of hacking...

Referrals: 1 . http://en.wikipedia.org/wiki/Crime

2 . http://crime.about.com/od/Crime_101/a/What -Is-A-Crime. htm

3. http://www.webopedia.com/TERM/C/cyber_crime.html

4. http://www.naavi.org/pati/pati_cybercrimes_dec03.htm

5. http://www.wavefrontcg.com/A_Brief_History_of_Cybercrime -3. html code

Created by simply Mubin-Ul-Haque

[email protected] com

19



economic examination of bangladesh Essay

Related

Category

News