Cyber Crime Prevention In Bangladesh

  • Uploaded by: Md.Yousuf Reza
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cyber Crime Prevention In Bangladesh as PDF for free.

More details

  • Words: 1,483
  • Pages: 3
CYBER CRIME AND PREVENTION MEASURE: Bangladesh Aspects It is a reality of the 21st Century that we are living in a cyber world. It comprises the most hi tech benefits and difficulties of our day to day lives. Cyber reality incorporates many of our real life activities including but not limited to online banking, online commerce and retail, virtual learning, domestic and foreign trading through digital technologies , internet networks, critical industrial infrastructures, telecommunications, air traffic control, global positioning systems (GPS), global distribution systems (GDS) and hi tech medical equipment. Using cyber space Bangladesh can facilitate its resources to extend business worldwide and actively participate in multi billion dollar software trading and other prospective sectors. Global economic strength depends on strong communication infrastructure which has already been adopted by our neighbouring countries India and China. Alongside many advantages there are major risks also involved with this technology. Some of the most common and most dangerous of these are: electronic fraud especially in the financial sector, identity theft, illicit use of valuable information, hacking or cracking, cyber-stalking, distribution of pirated software, terrorism, interference with sophisticated high level national security measures, immoral activities, defamation and harassment which affect individuals at large. Such kind of cyber crimes may be committed in following modes and manners as stated by Parthasarathi Pati in his article CYBER CRIME Hacking (unauthorized access to computer systems or networks) Email bombing (… refers to sending large numbers of mail to the victim….there by ultimately

resulting into crashing). Data diddling(… an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed) Salami Attacks (demonstrated by the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account) Denial of Service attack/Distributed Denial of Service (DDoS) (When a user is illegitimately prevented from accessing a service such as Amazon or Yahoo) Virus / worm attacks (an example of this being the “”love bug virus, which affected at least 5 % of the computers of the globe) Logic bombs ( some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date, like the Chernobyl virus), Trojan attacks (its origin in the word ‘Trojan horse’ as the unauthorised program is inside what appears to be an authorised application). On 29 May 2009 US president Barack Obama announced plans to name a cyber czar in an effort to better protect the computer networks and to protect The United States of America from a potential cyber attack. He stated that cyber crime incorporated organised crime, Industrial spying, misused stolen credit card information (which cost the nation’s millions of dollars from 130 ATM machine round 49 cities in the world within 30 minutes). Particularly American election properties have been stolen by the cyber intruders worth 400 million dollars. In June 2007 intruders hacked pentagon network. Recently in Bangladesh, 4 students of a private technology institute hacked the RAB web site. On 23 June 2009 RAB arrested JMB IT chief Rajib who used the internet as an engine of resources to make explosives to use in terrorism activities as he confessed that "I download information on explosives from internet, translate those in Bengali and send those to Mizan through Bashar (The Daily Star)," which is a serious concern for our national security. Being a part of global economy Bangladesh has to adopt up-to-date digital infrastructure to continue its information relationship with rest of the world, who already have adopted the necessary technologies and have been facing unique challenges every day. Developed countries have already transformed their financial, economic, agriculture, health, telecommunications, common utilities, education and public safety sectors into hi tech digital technologies. Though we are in an initial stage of this D-tech; once we successfully apply it we will certainly face the mentioned critical situations that are being suffered globally. To control the misuse of the technologies in order to protect nations/states and bring the criminals within the jurisdiction, an effective cyber law can play a vital role in ensuring that national and global criminals are fairly and successfully tried and judged for their crimes. “Cyber law is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law than property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression,

and jurisdiction. In essence, cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.”(cyberlawsindia.net).

The government has shown a very positive approach by formulating some policies and Acts as safeguards for cyber victims. Namely, The National ICT Policy, Cyber Law, Information Technology (Electronic Transactions) Act (ITETA), 2000 though it is a close replica of the Indian ITA-2000 which failed to include Cyber Squatting, Spam and Cyber Terrorism. Also they more recently enacted Information and Communication Technology Act (ICTA) 2006 to facilitate electronic commerce and to encourage growth and development of information technology and brought the cyber criminal within the ambit of criminal jurisdiction. Some commentators stress the importance of making the law more stringent to prevent widespread cyber crime and in the process of the enactment of cyber law government may take advice from cyber security task force combined with computer scientists, information security professionals and lawyers. Bangladesh, a member country of INTERPOL may seek help to secure the punishment of net criminals regardless of territory using INTERPOL’s global secure police communications system, I-24/7. The policy maker may formulate a baseline security procedures policy outlining the minimum requirements which must be met by agencies regarding information security and may also develop a special analysis site which will be observed 24/7 and will provide real-time monitoring of cyber activities. ‘Cyber incident response unit’ and ‘a cyber crime investigation cell’ may be built within law enforcement authority to fight cyber crime successfully by adopting the enhancing ‘capacity’, good police work, skilled investigators by sharing the ‘too few’ professionals skilled in cyber-security and by training new officers to become experts in the field and providing adequate logistic support/equipment. Moreover, to keep the national security uninterrupted and avoid hacking, web servers running public sites must be physically separate protected from internal corporate network and web site owners should watch traffic and check any inconsistency on the site by installing host-based intrusion detection devices on servers. On 13 June 2009, the day after presidential elections, Iran Telecom controlled traffic in and out of Iran largely using world's most sophisticated mechanism called the ‘Monitoring Centre’ sold by Nokia Siemens Network to 150 countries including Iran in the second half of 2008 which allows authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and web traffic.(The BBC report). Govt. agencies, NGOs, media and server agencies may come forward to build awareness among the general internet users particularly more vulnerable underage “netizen” to save them from the lure of paedophiles and to be used as a source of collection of their parents/family’s confidential information. Educational institutions may include curriculum comprise with moral and social ethics and users’ code of conduct for the future IT fellows not to use the technology in a morally reprehensible manner. Law enforcement authority must monitor cafes’ and users’ activities imposing restriction on some websites and users (under18) requiring bar code/password for use and make the users aware of the possible consequences of using certain sites. A “netizen” should always rethink whether his activities render him vulnerable and keep in mind the following things: - To prevent ID theft one should avoid disclosing personal information (DoB, bank details) on any web site to strangers. - Avoid sending any photograph online and providing email address to unknown person or chat friends as there may be misused of it. - Unexpected financial gain offered by any person without any consideration should be avoided unless the person is close relative, one may be asked to provide some intrinsic information (address, DoB, bank details), transaction/service charges. - Always uses latest and up date anti virus software to guard against virus attacks and keep back up volumes so that one may not suffer data loss in case of virus attack.

- Parents should keep an eye on children that are accessing internet to protect them any abusive or immoral illusion and imminent danger. Finally, it may be submitted that the collective effort of state and nations is only a possible way to see the peoples’ dream of a Digital Bangladesh in existence and could protect individuals and national security of the state from the aggression of cyber criminals.

Md. Yousuf Reza (Advocate) is studying LL.B in the University of London ) contact:[email protected]

Related Documents

Cyber Crime In India
December 2019 26
Cyber Crime
June 2020 22
Cyber Crime
May 2020 24
Cyber Crime
December 2019 33
Cyber Crime
July 2020 25

More Documents from ""

Metode Secant.xlsx
December 2019 71
April 2020 57
Drh+drp-1.doc
June 2020 37
Ssr_transfo_uk.pdf
November 2019 60