Sei sulla pagina 1di 9

INTRODUCTION The Internet is the latest communication tools provide the platform dissemination of information.

Internet also promises the dissemination of information to enhance the knowledge. However, a worrying phenomenon has happened now. Various cyber crimes occur due to lack of control in the early stages. In summary, the activities in violation of criminal law such as fraud, extortion and theft, but cyber crime is such a common activity such as theft, fraud, extortion and all activities that involve violations of existing law. However, a better definition and framework has been made by Mr. onn !. "arker is a

researcher in computer crime and security for #$I International in Menlo "ark, %alifornia. He said computer crime is any conduct that has the intention and is associated with the computer through any means and causing the victim to suffer or cause suffering, loss and continuous. &#' epartment of (ustice will have reinforced the definition given by saying that computer

crime is any illegal activity in which knowledge of computer technology has been used to reali)e what is desirable. However, the definition of cyber crime varies between countries. *or countries that adhere to the religion of Islam as the official religion, gambling, pornography and sex advertising is considered a crime. However, in western countries likes &#', all of the above activities is considered a usual thing except pornography. This indicates that the definition of cyber crime itself has a difference. This condition will cause difficulties in enforcing the law. 'ccording to an opinion obtained from http+,,pnnorin.tripod.com,tugasan-..htm, computer crime refers to crimes using computers as tools and involve directly the relationship between computers and criminals such as money transfer activity for the benefit of a bank officer himself. Meanwhile, cyber crime refers to criminal activity conducted via the internet. In fact, these activities may include foreign countries, and beyond the effective range of Malaysia. To conclude, the purpose of cyber crime can be summed up as all activities involving fraud on the Internet by computer, phone or whatever channel. %yber crime is committed for the benefit of a party and causes the victim to suffer the effects caused by the act tersebut.&sually, one party

who receives the benefit, while others will be problematic. However, sometimes, cyber crime is difficult to detect at an early stage.

CLASSIFICATION OF CYBER CRIMES /hen mentioning cyber crime, many of which can be associated with activities involving the internet is. However, cyber crimes can be categori)ed according to a large group to facilitate the study conducted. %yber crime can be classified into four, namely+ '0 %yber crime 'gainst Individual 1!0 %yber crime 'gainst "roperty 1%0 %yber crime 'gainst 2rgani)ation 1 0 %yber crime 'gainst #ociety '0 %yber crime 'gainst Individual %yber %rimes against individuals are divided into a number of things. 'mong the cyber criminal activity against individuals most popular is an e3mail spoofing, spamming, cyber defamation and harassment and cyber stalking. 'ccording to sources from http+,,www.reportcybercrime.com,classification.php a spoofed email is one in which e3mail header is forged so that mail appears to originate from one source but actually has been sent from another source. *or example, someone impersonate another person and send an e3mail to the person re4uired. #pamming means sending multiple copies of unsolicited mails or mass e3mails such as chain letters. 53mail recipients are usually re4uired to send the mail to a different browser if it does not want to suffer misfortune. If the recipient of the mail to spread, they promised a good thing. 6ext is the cyber defamation, which also involves an individual who is a victim unconscious. This occurs when defamation takes place with the help of computers and , or the Internet. 5.g.

someone publishes defamatory matter about someone on a website or sends e3mails containing defamatory information. Individuals who are often the victims of cyber crime is that the artist, their position and also certain individuals who have adversity. The forth once is %yber #talking Means following the moves of an individual7s activity over internet. It can be done with the help of many protocols available such at e3 mail, chat rooms, user net groups.

1!0 %yber crime 'gainst "roperty 'mong the cyber criminal activity that often occurs in the category of property is credit card fraud. This activity is often the case even though the police have taken various actions. #takeholders often makes those who are less knowledgeable internet as a victim. %redit card fraud continues to occur only way to steal passwords or card numbers without the knowledge of the victim. #ometimes victims lost millions of dollars and they also declared bankrupt as a result of being cheated. 2ther crimes that often happens is that intellectual property crime. These crimes include acts of pirated software, illegal copying of programs, trademark infringement and theft of computer source code. istribute copies of the illegal copying of an offense. The field of film and entertainment are often the victims of cyber crime is when the film and songs are illegally downloaded easily using the internet. &sing the internet is registered in the name of another person is also an offense. These activities often occur because the youth particularly want to use the internet for free. However, online use wifi in stores 89 hours of eating is different. 2ften, these stores provide the facility as a magnet to encourage customers to come to their shop.

1%0 %yber crime 'gainst 2rgani)ation %yber crime involving an organi)ation is the most widespread crimes in Malaysia. There are many things that can be associated with cyber crime in an organi)ation.

i. ) &nauthori)ed 'ccessing of %omputer 'ct of accessing a computer or network without authori)ation is considered a crime. 'ctivities to gain unauthori)ed access is divided into two by changing,deleting data. That means changing the data obtained by means of cutting and adding material to the data without permission. The second activity was computer voyeur was means to steal confidential read or make a copy of a confidential or proprietary information, but these cyber criminals do not delete or change it. ii. ) enial 2f #ervice + This situation occurs when the server has been flooded with fake re4uests continued to deny legitimate users to use the server or server crash. iii. ) Virus attack : %omputer virus is a computer program that can infect other computer programs by modifying them in any way to insert a copy of which may change. The virus can infect a file or to adversely affect the computer boot. Meanwhile, the /orms are not like viruses because worms do not re4uire the host to attach themselves to. Many ways be done to spread the virus to interfere with any program. #ometimes the stores that offer computer repair services also distribute tools for profit. 's an immediate example of individuals who are often the victims of the virus is a university student who is sometimes a problem when the program is delivered by a person not known the actual virus. !rowser face book also experiencing the same problem. iv. ) 5mail !ombing + 5mail bombing occurs when the number of cyber criminals act to send mail to individuals or companies or large mail servers and thus eventually lead to the crash.

v. ) #alami 'ttack : 'part from the e3mail bombing, other activities salami attack is often done is that the act involves when negligible amounts are removed : accumulated in to something larger. These

attacks are used for the commission of financial crimes. %rime is often done to defraud in the bank to make profits. Three other criminal activity to conduct involving the logic bomb, Tro;an horse, and data diddling. 'll three programs are intended to interfere with the smooth computer program. 'fter being hit by this attack, the computer will usually be a problem for access or other problems. D) Against Society %yber crime involving the community is involved forgery, cyber terrorism and ;acking web. Is very easy to falsify money if you use computer skills. 6ot ;ust money, but revenue stamps, stamp and other pieces can be done. &p to this day is known that the identity cards and passports can be forged by individuals who are interested. This work can be done only with a computer, scanner and high34uality printers only. In addition, the skills of using the Internet is also used to intimidate or force others to bow to their wishes stakeholders. ' secret photos will be spread if the victim does not desire these cyber criminals. In fact, a variety of threats such as smear the victims name on a large scale are being done by these criminals. /eb ;acking is when hackers to gain access and control over other websites. This crime is usually committed to satisfy the political aspirations or money. COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA %yber crime is not only happening in Malaysia. 'll countries in the world is experiencing the same problem when they are not responsible for use of internet facilities for personal gain. This situation also occurred in the &#'. The more developed a country, then, the more crimes that can be done. 'lmost every day newspapers in the &#' report on cyber crime committed by people. 't times, this cyber crimes across borders. 'ccording to a report released by the http+,,www.;ustice.gov,criminal,cybercrime, about <= cases involving cyber crime has been featured in newspapers in the &#'. This indicated that the developed countries like the &#' is not able to curb this problem.

'ccording to another source derived from a teenager known as the iceman has been brought to trial in the &#' on3line fraud offense by conducting a large3scale hacking. He has been able to identity theft and luxury living from the proceeds of fraud. He also was sentenced to a total of .< years imprisonment by the *ederal %ourt of "ittsburgh and the release of five years under the control 1supervised release0 and also re4uired to pay damages of > 8?.= million. (ail sentence meted out to the iceman real name is Max $ay Vision said is the longest sentence in the &#'. /orse, a teenage $yan "atrick Halligan died after becoming victims of cyber crime in the &#'. He became the victim of bullying involves the use of the internet. efamatory friends say $yan was a gay on the internet. The message was spread through instant messaging. ' female friend was also tricked him by pretending to like it, but in reality he only wanted to steal information. $yan7s female friend actually want to disseminate the information to other friends via instant messaging. $yan had committed suicide, but the advantage is that the impact of these deaths occurring in 8@@<, there is Vermont7s bully "revention Aaw, 'ct ..? which aims to protect victims of bullying. 'ccording to the 4uoted passage from http+,,berita3harian3online.com,;enayah3siber3makin3 meluas, news, the &nited #tates finished third in cyber crime statistics after %hina and !ra)il. %ompared with Malaysia, the figures are 4uite different with the &#'. %yber crime statistics in Malaysia has remained below =@B. However, crime is happening in Malaysia is 4uite similar to what happened in the &#'. The table below can be elaborated on that statement.

%ountry Malaysia &#'

ata %rimes / /

6etwork %rimes / /

'ccess %rimes / /

$elated %rimes / /

!ased on a simple diagram can be concluded that cyber crime is happening in the &#' also occurs in Malaysia. However, the percentage of occurrences in Malaysia is still small compared to the &#'. 'lthough still a little but it is worrying. #ecurity measures should be taken immediately to avoid this situation continues and the more severe. SUGGES IONS To overcome or reduce the rate of cyber crime is a few steps need to be. 'll parties such as governments, individuals, private companies and statutory bodies should carry out their respective responsibilities. The government for example has been takenC action with the launch of the Dlobal Head4uarters International Multilateral "artnership 'gainst %yber Threats 1IM"'%T0. 'ccording to former "rime Minister of Malaysia, Tun 'bdullah 'hmad !adawi, IM"'%T is the first venture of its kind in the world between public and private departments to address the challenges of cyber threats with the aim to find strategic solutions to enhance confidence and security of the information network society. However, even though the planning of any made by the government and private sector in tackling this problem will fail if there was no awareness of the community of Internet users. Internet users must be aware of the use of the Internet in an ethical manner. They should be aware of the MIM2# , the body established to monitor the crime. &sers must also reminded not to invite this cyber crime by letting their Internet site open to cyber criminals. *or security reasons, Internet users must ensure that their computer has enough defense. Make sure the Internet is used antivirus and spyware. %omputers can also be e4uipped with a computer easy firewall to prevent intruders. &sers are advised to not open e3mails sent by strangers or e3mail headers that are dubious. If the wise action is taken, the user will be saved from becoming victims of those who want to hack or a victim of cyber crime.

*or those who like chatting on the internet, they should be careful. &sers are encouraged not to be too friendly to chat with those who are known or unknown identity. This condition can cause them to get stuck with cyber crime. This is because those who become cyber criminals can be disguised by other individuals. *urther, each attachment must be sent via virus scanning software. This attachment is sent through various means such as through e3mail and there are also sent via messenger using anonymous identity of the recipient. The identity of those who called were obtained by means of stealing into Microsoft 2utlook or 2utlook 5xpress on a computer. &sers are also reminded not to be seduced by promises of investment record profits in a short time. If internet users wanted to find the money side of the Internet, seek advice from those who had long been involved in this field. It7s better if they are interested in finding additional provision ;oining bulletin boards or forums in advance. Internet users should also be cautious so as not to withdraw funds on deposit with the hope to get something. *or example, the 4uestionnaire is available through several web sites that promise payment for each survey if selected to be participants. 2r, ;ust make the work of the victim7s house will be paid well. Internet users should also use common sense when surfing the Internet. This is also addressed to those Muslims who are seeking information about Islam on the Internet. o not easily influenced by the web sites of dubious in Indonesian and 5nglish. 'lso web pages that contain an interview with the Malay people who have fallen. 6ext, browse the Internet with care. Make sure the ob;ect or purpose of the Internet. o a simple slip of the tongue by visiting the places that can seduce or arouse lust. Though initially the user feel good, but the victim will bear the risk that would cause the victim later regret. *inally, on the Internet has provided a variety of different sources of knowledge. 'nything that would like to learn or want to know, all available for free on the Internet. Therefore benefit from the knowledge and time spent surfing the Internet.

CONCLUSION The conclusion of all matters discussed above show that in fact cyber crime is a bit difficult to contain. 'lthough many laws are made and action taken, but cyber criminals are still rampant. They seem to have no fear of legal action would be taken against them. 'lthough this activity is reduced in Malaysia but only ;ust a number. However, the number of events increased. There are some activities which were previously not in Malaysia, are starting to be here eg hacking activities of government information systems. 's Malaysians are concerned, consumers need to understand their own responsibilities undertaken. 's internet users is that we should be sensitive to the environment is 4uite different so as not to become victims of this cyber crime. 6o matter how well drafted the law, could not prevent this crime if awareness of the dangers of Internet abuse on the individual, social, a government or a company. 'll parties should not underestimate this. 's responsible citi)ens, collaboration is one of the best solution. "arties responsible for not bringing the total number that represents the &#' as a comparison. If the percentage is considered one that is far, Malaysia will face a big problem because of cyber3crime attacks are easily attacked. /hen the attack occurred, did not use all the pointing fingers at each other to put the offense. 'ctually, all parties to play their respective roles. Aet us use the internet for our self3interest. Various benefits that we can get if we wisely use the facility.

8,E.F words.

Potrebbero piacerti anche