You are on page 1of 11

OUMH1203

1







SARJANA MUDA PENGAJARAN (PENDIDIKAN RENDAH)
DENGAN KEPUJIAN
BIDANG : MATEMATIK

SEPTEMBER 2011
SEMESTER TIGA

OUMH1203SMP
ENGLISH FOR WRITTEN COMMUNICATION






NAMA : RAZUL RAFIE BIN SUHIMAN
NO. MATRIK :830907125243001
NO. KP : 830907-12-5243
NO. TEL : 0138747283
E-MEL : mohdrazul83@gmail.com

PUSAT
PEMBELAJARAN : TAWAU LEARNING CENTER
OUM, TAWAU, SABAH.


OUMH1203
2

INTRODUCTION
Information technology is impacting all walks of life all over the world. ICT developments have
made possible a transition in information storage, processing, and dissemination, from paper to
virtual and from atoms to bits, which are now setting new standards of speed, efficiency, and
accuracy in human activities. Computerized databases are extensively used to store all sorts of
confidential data of political, social, economic or personal nature to support human activities and
bringing various benefits to the society (Frown, 1998).
However, the rapid development of ICT globally also has led to the growth of new forms
of national and transnational crimes. These crimes have virtually no boundaries and may affect
any country across the globe. Thus, there is a need for awareness, policy formation, and
enactment of necessary legislation in all countries for the prevention of computer related crime.
Globally, internet and computer-based commerce and communications cut across territorial
boundaries, thereby creating a new realm of human activities, and undermining the feasibility
and legitimacy of applying laws based on geographic boundaries. The new boundaries, which are
manifested in the monitor screens, firewalls, passwords, intruder detection, and virus busters,
have created new personalities, groups, organizations, and other new forms of social, economic,
and political groupings in the cyber world of bits. Traditional border-based law making and law
enforcing authorities find this new environment of cyber boundaries very challenging.
Cyber crimes is an obvious form of international crime that has been affected by the
global revolution in ICTs (Hughman, 2000). There are no correct definition of the term cyber
crimes because it evolving against time. They differ depending on the perception of both
observer/protector and victim, and are partly a function of computer-related crimes geographic
evolution. For example, The Council of Europes Cybercrime Treaty uses the term Cybercrime
to refer to offences ranging from criminal activity against data to content and copyright
infringement. However, Zeviar-Geese (1998) suggest that the definition is broader, including
activities such as fraud, unauthorized access, child pornography, and cyberstalking. The United
Nations Manual on the Prevention and Control of Computer Related Crime includes fraud,
forgery, and unauthorized access in its cybercrime definition.


OUMH1203
3

CONTENTS
Classification of Cyber Crimes
Cyber crimes can be classified in to four major categories as:
1. Cyber crime Against Individual
2. Cyber crime Against Property
3. Cyber crime Against Organization
4. Cyber crime Against Society

(1) Cyber crime against individual consists of:
(i) Email spoofing : A spoofed email is one in which e-mail header is forged so that mail
appears to originate from one source but actually has been sent from another source
(ii) Spamming : Spamming means sending multiple copies of unsolicited mails or mass e-
mails such as chain letters.
(iii) Cyber Defamation : This occurs when defamation takes place with the help of
computers and or the internet. Example. someone publishes defamatory matter about
someone on a website or sends e-mails containing defamatory information.
(iv) Harassment & Cyber stalking : Cyber Stalking Means following the moves of an
individual's activity over internet. It can be done with the help of many protocols
available such at e- mail, chat rooms, user net groups.

(2) Cyber crime against property consists of:
(i) Credit Card Fraud
(ii) Intellectual Property crimes : These include software piracy: illegal copying of
programs, distribution of copies of software, copyright infringement,trademarks
violations, theft of computer source code.
(iii) Internet time theft : The usage of the Internet hours by an unauthorized person which
is actually paid by another person.



OUMH1203
4

(3) Cyber crime against organisation consists of:
(i) Unauthorized Accessing of Computer: Accessing the computer/network without
permission from the owner. It can be of two forms:
a) Changing/deleting data: Unauthorized changing of data.
b) Computer voyeur: The criminal reads or copies confidential or propiertary
information, but the data is neither deleted nor changed.
(ii) Denial Of Service : When Internet server is flooded with continuous bogus requests
so as to denying legitimate users to use the server or to crash the server.
(iii) Virus attack : A computer virus is a computer program that can infect other
computer programs by modifying them in such a way as to include a (possibly evolved)
copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms,
unlike viruses do not need the host to attach themselves to.
(iv) Email Bombing : Sending large numbers of mails to the individual or company or
mail servers thereby ultimately resulting into crashing.
(v) Salami Attack : When negligible amounts are removed & accumulated in to
something larger. These attacks are used for the commission of financial crimes.
(vi) Logic Bomb : Its an event dependent programme , as soon as the designated event
occurs, it crashes the computer, release a virus or any other harmful possibilities.
(vii) Trojan Horse : An unauthorized program which functions from inside what seems to
be an authorized program, thereby concealing what it is actually doing.
(viii) Data diddling : This kind of an attack involves altering raw data just before it is
processed by a computer and then changing it back after the processing is completed.

(4) Cyber crime against society
(i) Forgery : Currency notes, revenue stamps, mark sheets etc can be forged using
computers and high quality scanners and printers.
(ii) Cyber Terrorism : Use of computer resources to intimidate or coerce others.
(iii) Web Jacking : Hackers gain access and control over the website of another, even
they change the content of website for fulfilling political objective or for money

OUMH1203
5

COMPARI SON OF CYBER CRI MES I N MALAYSI A AND USA
Cases related to cyber crimes are often reported in local vernacular papers concerning various
issues ranging from cyber crime to equal access to the internet. The following are some examples
of common news items concerning cyber crime that appeared in Malaysian newspapers:
Hackers have struck at government websites again, this time targeting the Social Security
Organization (Socso) by posting an image of a covered skull on its site at:
http://www.perkeso.gov.my
Sixty government websites have been hacked between February 1, 1999 and April 3 this
year, with a total of 89 actual hacking incidents taking place.
Dec 29, 2001: A hacker intrusion on the Malaysian Parliaments website has reportedly
generated criticism from some officials who claim the government has taken a slapdash
approach to internet security.
22nd August 2000: A hacker is believed to have tried to dupe internet users into giving
away their private financial information by posing as an online executive at Maybank
Bhd.
In the first six months of 2003, Malaysian NISER recorded 394 incidences of cybercrime as
shown in Table 1 below. 48.47 percent of the reported incidences were hack threats followed by
virus attacks at 28.68 percent.
Table 1: Cyber Crimes Statistics In Malaysia JAN-JUN 2003
OUMH1203
6

In USA, more heavier cyber crimes cases reported. According to Computer Crime &
Intellectual Property Section from the United States Department of Justice, most of the cases are
done by profesional individually or by group and organization. The crimes that have been
reportedly are most consists of hacking personal data banking such as credit card fraud
information, ATM PIN and identity theft.
From January 1, 2009 through December 31, 2009, the Internet Crime Complaint Center
(IC3) Web site received 336,655 complaint submissions. This was a 22.3% increase as compared
to 2008 when 275,284 complaints were received. Of the 336,655 complaints submitted to IC3,
146,663 were referred to local, state, and federal law enforcement agencies around the country
for further consideration. The vast majority of referred cases contained elements of fraud and
involved a financial loss by the complainant. The total dollar loss from all referred cases was
$559.7 million with a median dollar loss of $575. This is up from $264.6 million in total reported
losses in 2008. Unreferred submissions generally involved complaints in which there was no
documented harm or loss (e.g., a complainant received a fraudulent solicitation email but did not
act upon it) or complaints where neither the complainant nor perpetrator resided within the
United States (i.e., there was not an appropriate domestic law enforcement agency for direct
referral).
Complaints received by IC3 cover many different fraud and non-fraud categories,
including auction fraud, non-delivery of merchandise, credit card fraud, computer intrusions,
spam/unsolicited email, and child pornography. All of these complaints are accessible to local,
state, and federal law enforcement to support active investigations, trend analysis, and public
outreach and awareness efforts.
There are huge major differences of cyber crimes cases in Malaysia and in USA. In
Malaysia, the cyber crimes cases are not really the big deal or serious problems for MSC and
CyberSecurity Malaysia to handle. Most like e-mail scam, advance fee fraud and fake website
are always reported in Malaysia.
Futhermore in Malaysia, the specific law that governs the misuse of computer is the CCA
(Criminal Crime Act). Given the increase in computer related crimes and computer abuse, the
enactment of the CCA was timely to govern and regulate this cyberspace activity and impose
sanctions for criminal acts related to it. There was also a need for a specific legislation on
OUMH1203
7

computer crimes as the Penal Code, a general statute catered for criminal offences obviously
being a 19th century piece of legislation, did not envisage for computer related crimes and are
inadequate to provide for these categories of offences.

Suggestions
Several studies conducted on how to fight against the cyber crimes. Some of the suggestions are
listed below:

Educating Cybercrime Fighters
This strategy requires that we educate and train everyone who will be involved in preventing,
detecting, reporting, or prosecuting cybercrime. Even potential cybercriminals, with the right
kind of education, could be diverted from criminal behaviour. The training necessary for
legislators to understand the laws they propose and vote on is different from training needed for
detectives to ferret out digital evidence. The latter should receive not only theoretical but hands-
on training in working with data discovery and recovery, encryption and decryption, and reading
and interpreting audit files and event logs. Prosecuting attorneys need training to understand the
meanings of various types of digital evidence and how to best present them at trial.
The next best solution is to establish and train units or teams that specialize in computer-
related crime. If every legislative body had a committee of members who are trained in and focus
on technology issues; if every police department had a computer crime investigation unit with
special training and expertise; and if every district attorneys office had one or more prosecutors
who are computer crimes specialists we would be a long way toward building an effective and
coordinated cybercrime-fighting mechanism.
Those agencies that are still lacking in such expertise can benefit greatly by working
together with other more technically sophisticated agencies and partnering with carefully
selected members of the IT community to get the training they need and develop a cyber-crime-
fighting plan for their jurisdictions. The Internet reaches into the most remote areas of the
country and the world. Cybercrime cannot remain only the province of law enforcement in big
cities; cybercriminals and their victims can be found in any jurisdiction.

OUMH1203
8

Educating Information Technology Professionals
IT professionals already understand computer security and how it can be breached. The IT
community needs to be educated in many other areas:
How laws are made. This area includes how IT professionals can get involved at the
legislative level by testifying before committees, sharing their expertise, and making
opinions known to members of their governing bodies.
How crimes are prosecutes. This area includes how IT professionals can get involved
at the prosecution level as expert witness.
Computer crime awareness. An understanding of what is and isnt against the law, the
difference between criminal and civil law, penalty and enforcement issues.
Thus, in order to actively engage the IT world in the fight against cyber-crime, we face the
challenge of educating IT personnel in how cybercrime laws actually work to their benefit.
We wont be able to do this unless, we can show IT professionals that the laws themselves are
fair, that they are fairly enforced, and that they can be effectively enforced. One way IT
personnel can become more familiar with and more comfortable with the legal process is
though more exposure to it. Law enforcement personnel should actively solicit their help and
involve them as much as possible in the fight against cybercrime, giving IT professionals a
personal stake in the outcome.

Using Technology to Fight Cyber Crimes
One of the best weapons against technology crimes is technology. The IT industry is hard at
work, developing hardware and software to aid in preventing and detecting network intrusions.
Third-party security products, from biometric authentication devices to firewall software, are
available in abundance to prevent cybercriminals from invading our system or network.
Monitoring and auditing packages allow IT professionals to collect detailed information to assist
in detecting suspicious activities. Many of these packages include notification features that can
alert network administrators immediately when a breach occurs. Many security technologies are
based o or use cryptographic techniques. An investigator might encounter encrypted data or even
suspect that the existence of additional data is being concealed using steganography.
OUMH1203
9

An understating of how cryptography developed and how it works in the computerized
environment can be invaluable in investigating many types of cybercrime.
Using Peer Pressure to Fight Cyber Crimes
One way to reduce the incidence of Internet crime is to encourage groups to apply peer pressure
to their members. If cybercriminals are shamed rather than admired, some well be less likely to
engage in the criminal conduct. Many teenage hackers commit network break-ins in order to
impress their friends. If more technology-sizing that respect for others property and territory in
the virtual world is just as important as it is in the physical world-hackers might be no more
behind by the majority of upstanding students that are the bad kids who steal cars or break into
houses.
There is no doubt that some people will commit crimes regardless of peer pressure.
However, this pressure is a valuable tool against many of those cybercriminals who otherwise
upstanding members of the community and whose criminal behaviour online erroneously reflects
the belief that everyone does it.

Educating and Engaging the Community
We must educate the community at large, especially the subset that consists of the end user of
computer and network systems. There are the people who are frequently direct victims of
cybercrime and who all are ultimately indirect victims in terms of the extra costs they pay when
companies they patronize are viticimized and the extra taxpayer dollars they spend every year in
response to computer-related crimes. Law enforcement and IT professionals need to work more
closely with the community to build a cyber-fighting team that has the skills, the means and the
authority necessary to greatly reduce the instances of crime on the Internet.







OUMH1203
10

CONCLUSION
Cyber crimes may take several forms including online fraud, theft and cyberterrorism. It
has been seen that amongst the major reasons that facilitate the perpetration of this crime is the
globalisation of technology and the revolutionary advancement of ICTs that have impacted on
criminal activity. Broadband, wireless technologies, mobile computing and remote access,
Internet applications and services, software and file transfer protocols are amongst the tools
utilized by cybercriminals to commit their crime.
By and large, it is submitted that cyber crimes should be subject to a global principle of
public policy that aims at combating and preventing this form of organized crime through raising
global awareness and increasing literacy rates, coordinating legislative efforts on national,
regional and global levels, and establishing a high level global network of cooperation between
national, regional, and international enforcement agencies and police forces.

















(2615 WORDS)
OUMH1203
11

REFERENCES

Department of Justice Computer Intrusion Cases.
http://www.cybercrime.gov/cccases.html

Frown, N. (2006). The Simple Economics of Cyber Crimes, Security & Privacy Magazine. In:
IEEE, vol. 4, Issue 1, pp. 3339


http://www.cybersecurity.my/

http://www.ic3.gov/

http://www.niser.org.my/

Hughman, M. (2000), Policing Cyber Crime: Situating the Public Police in Networks of
Security in Cyberspace, Police Practice and Research: An International Journal, vol 8,
no. 2.

Malaysian Computer Crimes Act 1997
http://ktkm.netmyne.com.my/contentorg.asp?Content_ID=80&Cat_ID=1&CatType_ID=
17&SubCat_ID=40&SubSubCat_ID=15

Studycrime: Online resource guide to law and crime.retrieved from the web:
http://www.studycrime.com/ Crime/Crimeware.php (2005)

Zeviar-Geese (1998), The State of The Law on Cyberjurisdiction and Cybercrime On The
Internet.In: California Pacific School of Law, Gonzaga Journal of International Law, vol.
1 (19971998)

You might also like