Cyber Crime

Only available on StudyMode
  • Topic: Crime, E-mail spam, Malware
  • Pages : 22 (5874 words )
  • Download(s) : 232
  • Published : April 29, 2011
Open Document
Text Preview
University Of Dhaka

[pic]

Department Of Management Information Systems

[pic]

Assignment On "Business Law"

Topic: Cyber Crime

Prepared By :

Subrata Halder

ID NO : 05-005

Submitted To:

Ashraful Alam

Lecturer

Department Of MIS

University Of Dhaka

Cyber Crime

Law and Punishment

Agenda:

1. What is Crime & Cyber Crime?

2. History of Cyber Crime.

3. Reasons for Cyber Crime.

4. Classifiacation of Cyber Crime.

5. Modes of Cyber Crime.

6. Hackers & Crackers.

7. Law regarding Cyber Crime in Bangladesh & World.

8. Punishment for Cyber Crime.

9. Prevention of Cyber Crime & Hackers.

1.What is Crime and Cyber Crime

Definition: Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.”

“An action or omission which constitutes an offence and is punishable by law”

-According to Oxford Dictionary

Cyber Crime: A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”

Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime.

“Criminal activities carried out by means of computers or the Internet”.

-According to Oxford Dictionary

Or it can be defined as “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”. The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data diddling , salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.

2. History of Cyber Crime

The first recorded cyber crime took place in the year 1820!

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Hackers can be clssified according to thier attention of use of hacking. There are two types of hackers.They are:

a. White Hats
b. Black Hats

a. White Hats: Hackers that use their skills for good are classified as "white hat."

These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies...
tracking img