SlideShare a Scribd company logo
1 of 10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011



                    CYBER CRIMES IN MALAYSIA AND U.S.A
                     WHAT SHOULD WE DO IN MALAYSIA?




1.0 INTRODUCTION

Cyber crime is entering the main stream of discussion among authorities especially those who
involve in law.    The vast development in technology obviously has given advantages and
disadvantages to the public generally. This assignment will venture further to the definition and
scope of cyber crime, classification of cyber crime, the comparison of cyber crime between
Malaysia and USA and the suggestions on how to curb the problem.

1.1 Definition and scope

Cyber crime has gained increased attention because computers have become so central at several
areas of social activities connected to everyday life, including, but not limited to, personal and
institutional finances, various recordkeeping functions, interpersonal communications, and
others. Because of its widespread accessibility, the advent of the internet has further served to
facilitate predatory personal crimes and property offenses committed with a computer. The U.S.
Bureau of Census reports that in 2000, there were 94 million people in the United States who
made use of the internet (Newburger, 2001). This greatly expands both the potential victim and
offender pools for both personal and property crimes.

Moreover, the nature of this forum has allowed some potential offenders to move more easily
toward actual criminal behavior because the victims can be depersonalized in the initial stages of
an offense. With the internet, an offender does not have to come face to face with a potential
target, which may make it easier for the offender to complete the victimization of the target. But
what exactly is “cyber-crime”, and is it distinct from other, more traditional forms of crime? To
begin answering these questions, it would be helpful to briefly look at the components of crime
in general. Traditionally, crime has been defined as an intentional violation of the legal code that
is punishable by the state. Central to this definition is the premise that crime occurs within the
boundaries of some physical reference point, that is, a location that constitutes a specific



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


jurisdiction. For example, when a conventional case of fraud occurs, one of the important
considerations is where the actual offense took place so that questions of the appropriate
jurisdiction for prosecution can be addressed. Officials need to know where the victim and
offender came into contact with one another in the perpetration of the offense so that
investigative and prosecutorial authority can be determined.

However, this component is confounded when cyber crime is committed because the location is
no longer a static concept. With the advent of cyberspace, jurisdiction has become much more
problematic, transcending local, state, and even national boundaries. One needs only look at the
various e-mail scams that emanate from such locales as Nigeria, the United Kingdom, or China
to begin to understand how crime is being redefined in the cyber age. An equally confounding
issue has to do with the scope of cyber crime. There is a vast range of illegal behavior that could
be identified as cyber crime. Consequently, there seems to be a degree of ambiguity about what
is beingdiscussed when the subject of cybercrime is broached. Fraud, technology theft, security
breaches, identity theft, child pornography, and even stalking all potentially fall within the realm
of cyber criminality. Even within the computer community, there seems to be some disagreement
about which kinds of behavior should be classified as criminal.

There are some who would argue that certain forms of hacking, where a secure computer system
is breached and perhaps altered, should never be thought of as a criminal act. Advocates for this
position would maintain that the motivation for these actions is often not malicious and may
even prove to be beneficial in terms of identifying security shortcomings. Instead, this group
would rather see a focus on only those cases where sabotage or financial gain is involved (Schell,
Dodge and Moutsatos, 2002). Others, including those in law enforcement communities, would
strongly disagree with this position, pointing out that the so called harmless events of hacking
collectively cost billions of dollars of damage.Some definitions of cyber-crime are relatively
narrow in focus. In some cases, only hacking behavior would fall under the definition of what
constituted cyber-criminality. For example, the Council of Europe’s Cybercrime Treaty makes
reference to only those offenses that involve damage to data or to copyright and content
infringements. However, most experts would agree that this definition is much too narrow and
needs to take into account more traditional crimes, such as fraud and stalking, which make use of
computers (Gordon and Ford, 2006; Zeviar-Geese, 1997-1998).



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


The legal definition of cybercrime used in the United States takes a relatively broad view of the
kinds of behavior constituting computer crime. The United States Code proscribes a range of
conduct related to the use of computers in criminal behavior, including conduct relating to the
obtaining and communicating of restricted information, the unauthorized accessing of
information from financial institutions, the United States government, and “protected
computers”; the unauthorized accessing of a government computer, fraud, the damaging of a
protected computer resulting in certain types of specified harm, trafficking in passwords and
extortionate threats to cause damage to a “protected computer” (United States Code, Section
1030 of title 18). Taking into account the statutory provisions of the United States Code, the
FederalBureau of Investigation identifies a number of computer-related crimes that are part of
their cyber mission,including serious computer intrusions and the spread of malicious code,
online sexual predation of minors and child pornography, the theft of U.S. intellectual property,
breaches of national security and organized criminal activity engaging in Internet fraud (Federal
Bureau of Investigation, 2006). Despite the specific identification of offenses, the legal
definitionof cyber crime tends to read like a grocery list and fails to anticipate future criminal
variations in cyber offending.




2.0     CONTENT

2.1     Classifications of Cyber Crimes

Cyber crime can be classified into four major categories as cyber crime against individual, cyber
crime against property, cyber crime against organization and cyber crime against society.

2.1.1   Cyber Crime Against Individual

Email spoofing,spamming,cyber defamation, harassment and cyber stalking are examples of
cyber crimes against individual. Email spoofing is a spoofed email is one in which e-mail header
is forged so that mail appears to originate from one source but actually has been sent from
another source. Then, the crime of spamming means sending multiple copies of unsolicited mails
or mass e-mails such as chain letters. While cyber defamation occurs when defamation takes
place with the help of computers or the internet. For example when someone publishes



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


defamatory matter about someone on a website or sends e-mails containing defamatory
information. While cyber stalking means following the moves of an individual's activity over
internet. It can be done with the help of many protocols available such at e- mail, chat rooms or
user net groups.

2.1.2   Cyber Crime Against Property

Examples of cyber crime against property are credit card fraud and intellectual property crimes.
These include software piracy, illegal copying of program and distribution of copies of software,
copyright infringement, trademarks violations and theft of computer source code. In addition,
internet time theft. It is the usage of the internet hours by an unauthorized person which is
actually paid by another person.

2.1.3   Cyber Crime Against Organization

An unauthorized accessing of computer which is accessing the computer or network without
permission from the owner is one of the instances of this type of cyber crime. It can be of two
forms. The first one is changing or deleting data. While the second form is computer voyeur. It is
when the criminal reads or copies confidential or proprietary information, but the data is neither
deleted nor changed. The other example of crime against organization is denial of service. When
internet server is flooded with continuous bogus requests so as to denying legitimate users to use
the server or to crash the server. Virus attack is also one of the examples of crime against
organization. A computer virus is a computer program that can infect other computer programs
by modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be
file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the
host to attach them to. Furthermore, the email bombing in order sending large numbers of mails
to the individual or company or mail servers thereby ultimately are resulting into crashing also
crime against organization.

2.1.4   Cyber Crime Against Society

 This type of cyber crime includes forgery, cyber terrorism and web jacking. Forgery is
something like currency notes, revenue stamps or mark sheets which can be forged using
computers and high quality scanners and printers. While cyber terrorism is the use of computer



                                                    10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


resources to intimidate or coerce others. In the case of web jacking, hackers gain access and
control over the website of another, even they change the content of website for fulfilling
political objective or for money.




2.2    COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA

Cybercrime is increasing at an alarming rate worldwide with more than a million people
becoming victims every single day. The victims of cyber crime also paid dearly with a total loss
of US$388bil (RM1.21bil) to cyber criminals in 2010according to the Norton Cyber crime
Report 2011. Globally, in 2008, most scammers operated from the United States. The United
States still held a huge lead in active internet users then, a gap that has since closed considerably.
According to statistic, in 2008, China and United States each has approximately 200 million
internet users, and most of the world has grown commensurately. As the user population have
grown abroad, so havetheir scammer populations also increase day by day. Several countries
stand out in 2008 as have disproportionately huge populations of scammers are Nigeria,
Romania, the Netherlands and China. Lottery and fake money transfer (AFF)frauds seem to be
the specialty of the Nigerians. The United States still leads in identity theft and phishing or
spoofing fraudbased on The Federal Bureau of Investigation (FBI) in collaboration with the
Internet Crime Complaint Center (IC3).

Cyber crimes do not only cost victims financially but emotionally too. However, victims could
have saved themselves of money and regret as the type of cyber crimes which they have been a
victim to be preventable. In Malaysia, the report found that the most common type of
cybercrimes is malware, scams and threats targeted at mobile devices. However many people
tend to underestimate the dangers of online crime thinking that it will happen to everyone else
but themselves. The survey found that seven out of 10 adults thought they would more likely be
a victim of physical crime rather than an online crime. Although Malaysia was not in the list of
countries studied in the report, national cyberspace police Cybersecurity Malaysia said the
findings are representative of the Malaysian threat landscape. It is the same environment, so
whatever that is happening in the world will definitely affect us the same way.




                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


Cyber crime causes damage to global economics in billions dollars and many experts think that it
is a promptly increasing threat for national security and social well being.In Malaysia, the
specific law that governs the misuse of computer is the Computer Crimes Act. Given the
increase in computer related crimes and computer abuse, the enactment of the Computer Crimes
Act was timely to govern and regulate this ‘cyberspace’ activity and impose sanctions for
criminal acts related to it.

FIGURE 1.0 Top Ten Countries by Count (Perpetrators)




These locations are among the most populous in the country.

    1. United States 66.1%

    2. United Kingdom 10.5%

    3. Nigeria 7.5%

    4. Canada 3.1%

    5. China 1.6%

    6. South Africa 0.7%

    7. Ghana 0.6%



                                                    10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


      8. Spain 0.6%

      9. Italy 0.5%

      10. Romania 0.5%




2.3      SUGGESTIONS ON HOW TO CURB CYBER CRIMES

Cyber crime refers to illegal activities that take place online, including fraud, spam, identity
theft, computer viruses and worms, cyber stalking, drug trafficking, sexual predators, malware or
spyware andphishing. There are a lot of ways on how to curb cyber crime. Firstly, we can avoid
it by education. As we know, the hackers are not the only ones who can gain power from
information. By educating ourselves about the types of scams that exist on the internet and how
to avert them, we are putting our self one step ahead of the cybercriminals. Since phishing is
prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt.
We need to remember that, phishing is when hackers attempt to lure us into revealing personal
new stories, so keep informed on the latest news related scams.

Secondly, we can use a firewall. Firewalls monitor traffic between our computer or network and
the internet and serve as a great first line of defense when it comes to keeping intruders out.
Make sure to use the firewall that comes with our security software. And if we have a home
wireless network, enable the firewall that comes with our router. We need to be careful not to
click on any links in messages from people we do not know. The link could take us to a fake
website that asks for our private information, such as user names and passwords, or it could
download malware onto our computer. Even if the message is from someone we know, be
cautious. Some viruses replicate and spread through email, so look for information that indicates
that the message is legitimate.

Then, we also should practice safe surfing. When navigating the web, we need to take
precautions to avoid phony websites that ask for our personal information and pages that contain
malware. Use a search engine to help us navigate to the correct web address since it will correct
misspellings. That way, we would notwind up on a fake page at a commonly misspelled address.
We may also want to use a product like McAfee software to help our computer navigate. The site


                                                       10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


advisor software is a free browser tool that tells us if a site is safe or not right in our search
results, so we are warned before we click. Then, in order to practice safe shopping, we also need
to be careful where we shop online. Be cautious when shopping at a site that we have never
visited before and do a little investigation before we enter into payment information. Most
people become victims of these at one time or another, but there are ways to avoid or deal with
cyber crime by protecting yourself appropriately.

Besides that, we must use comprehensive security software and keep our system updated. It
is because the hackers have a wide variety of ways to access the system and information. So, we
need comprehensive security software that can protect us from all angles. Just make sure that we
keep our security software up to date by selecting the automatic update function on your security
control panel and do not forget to perform regular scans. The other way to prevent cyber crime is
secure our wireless network it is because hackers can access data while it is in transit on an
unsecured wireless network. We can keep the hackers out by enabling the firewall on our router
and changing the router’s administrator password. The cybercriminals often know the default
passwords and they can use them to hack into our network. Then, we may also want to set up our
router so, it only allows access to people with passwords that are encrypted. We must check our
owner’s manual for instructions on setting up encryption.

In order to protect our system from being the victim of cyber crime, we must use strong
passwords. Although it may be easier for us to remember short passwords that reference our
birthday, middle name, or pet’s name, these kinds of passwords also make it easy for hackers.
Strong passwords can go a long way in helping secure our information, so choose a password
that is at least ten characters long and consists of a combination of letters, numbers and special
characters. Also consider changing the password periodically to reduce the likelihood of it being
compromised.

Last but not least, use common sense is also a proper way to curb cyber crime. Despite the
warnings, cybercrime is increasing, fueled by common mistakes people make such as responding
to spam and downloading attachments from people they do not know. So, use common sense
whenever we are on the internet. Never post personal information online or share sensitive
information such as our social security number and credit card number. Exercise caution when
clicking on any links or downloading any programs. Althoughwe do take some effort, remember


                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


that there are a lot of resources and tools to help us. And by adopting a few precautions and best
practices, we can help keep cyber crime from growing.




3.0     CONCLUSION

Cyber crime means any criminal activity in which a computer or network is the source, tool or
target or place of crime. Cyber crime comes in many forms, but most of these crimes deal with
stolen information. The most common types of cyber crime include identity theft, phishing
scams and fraud. It is crimes committed with the use of computers or relating to computers,
especially through internet. Crimes involving use of information or usage of electronic means in
furtherance of crime are covered under the scope of cyber crime committed against person. It can
be classified into four major categories as cyber crime against individual, cyber crime against
property, cyber crime against organization and cyber crime against society, property and
government.

Therefore we need to take a serious action and a drastic ways in order to curb cyber crime from
becoming more serious like in United States. The United States still leads in identity theft and
phishing. We need to make sure that the antivirus, anti malware, and anti spyware programmers t
are to be updated from the internet to keep up with newly introduced malicious computer
programmers. Then, make sure that our system having effective firewalls to keep out malicious
programmers from entering into a local or wide area networks. Besides that, the encryption
technologies must work well and use a strong password in order to protect our computer.

In conclusion, Malaysia, in its bid to be technologically advanced has put into place its various
national Information Communication and Technology (ICT) projects such as the Multimedia
Super Corridor and the various technology parks to promote the use and development of ICT.
Such promotion will result in a widespread use of the Internet and the Internet culture. It is
submitted that Malaysia must have up-to-date laws to effectively deal with the cybercrimes that
comes along with the Internet. To this end, Malaysia must constantly check and conduct
measurements to determine the use utility of its current laws to combat cybercrime. One cannot



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


deny that the online environment cannot and will never be rid of cybercrimes due to the
Internet’s unique architecture.




4.0    REFERENCES

       The Future Challenges of Cyber Crime: Volume 5; Proceeding of the Future Working Group;
                     Toby Finnie, Tom Petee and John Jarvis, Quantico Virginia 2010.

       Cybercrimes continue to rise. Retrieved November 7, 2011, from http://www.
                    Apecdoc.org/ site/Malaysia/ 2011 / 09 / 26 / cybercrime
       Consumer Fraud Reporting Crime Statistics, Retrieved November 8, 2011, from
                   http://www. consumer fraud reporting. Org/ internet-scam-statistics. html.
       Top 10 Steps to Protect Against Cybercrime. Retrieved November 8, 2011, from
              http://www. dell. com/ 10 steps to protect against cybercrime_dell_en. pdf.

       How to Prevent Cyber Crime. Retrieved November 7, 2011, from http://www. ehow.
                    com _4967690_ prevent cyber-crime-html.




                                                   10

More Related Content

What's hot

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 

What's hot (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 

Similar to Assignment of cyber crimes for oumh1203

I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 

Similar to Assignment of cyber crimes for oumh1203 (20)

Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
English in written
English in writtenEnglish in written
English in written
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 

More from Faridah Husin

Hbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksisHbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksisFaridah Husin
 
Hbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quranHbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quranFaridah Husin
 
Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203Faridah Husin
 
Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012Faridah Husin
 
Tugasan peng.pend.seni visual
Tugasan peng.pend.seni visualTugasan peng.pend.seni visual
Tugasan peng.pend.seni visualFaridah Husin
 
Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1Faridah Husin
 
Tugasan rph bahasa melayu
Tugasan rph bahasa melayuTugasan rph bahasa melayu
Tugasan rph bahasa melayuFaridah Husin
 
Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2Faridah Husin
 
Hbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadunHbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadunFaridah Husin
 

More from Faridah Husin (11)

Hbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksisHbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksis
 
Hbae1403 menggambar
Hbae1403 menggambarHbae1403 menggambar
Hbae1403 menggambar
 
Hbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quranHbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quran
 
Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203
 
Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012
 
Tugasan hbis 1203
Tugasan hbis 1203Tugasan hbis 1203
Tugasan hbis 1203
 
Tugasan peng.pend.seni visual
Tugasan peng.pend.seni visualTugasan peng.pend.seni visual
Tugasan peng.pend.seni visual
 
Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1
 
Tugasan rph bahasa melayu
Tugasan rph bahasa melayuTugasan rph bahasa melayu
Tugasan rph bahasa melayu
 
Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2
 
Hbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadunHbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadun
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Assignment of cyber crimes for oumh1203

  • 1. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 CYBER CRIMES IN MALAYSIA AND U.S.A WHAT SHOULD WE DO IN MALAYSIA? 1.0 INTRODUCTION Cyber crime is entering the main stream of discussion among authorities especially those who involve in law. The vast development in technology obviously has given advantages and disadvantages to the public generally. This assignment will venture further to the definition and scope of cyber crime, classification of cyber crime, the comparison of cyber crime between Malaysia and USA and the suggestions on how to curb the problem. 1.1 Definition and scope Cyber crime has gained increased attention because computers have become so central at several areas of social activities connected to everyday life, including, but not limited to, personal and institutional finances, various recordkeeping functions, interpersonal communications, and others. Because of its widespread accessibility, the advent of the internet has further served to facilitate predatory personal crimes and property offenses committed with a computer. The U.S. Bureau of Census reports that in 2000, there were 94 million people in the United States who made use of the internet (Newburger, 2001). This greatly expands both the potential victim and offender pools for both personal and property crimes. Moreover, the nature of this forum has allowed some potential offenders to move more easily toward actual criminal behavior because the victims can be depersonalized in the initial stages of an offense. With the internet, an offender does not have to come face to face with a potential target, which may make it easier for the offender to complete the victimization of the target. But what exactly is “cyber-crime”, and is it distinct from other, more traditional forms of crime? To begin answering these questions, it would be helpful to briefly look at the components of crime in general. Traditionally, crime has been defined as an intentional violation of the legal code that is punishable by the state. Central to this definition is the premise that crime occurs within the boundaries of some physical reference point, that is, a location that constitutes a specific 10
  • 2. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 jurisdiction. For example, when a conventional case of fraud occurs, one of the important considerations is where the actual offense took place so that questions of the appropriate jurisdiction for prosecution can be addressed. Officials need to know where the victim and offender came into contact with one another in the perpetration of the offense so that investigative and prosecutorial authority can be determined. However, this component is confounded when cyber crime is committed because the location is no longer a static concept. With the advent of cyberspace, jurisdiction has become much more problematic, transcending local, state, and even national boundaries. One needs only look at the various e-mail scams that emanate from such locales as Nigeria, the United Kingdom, or China to begin to understand how crime is being redefined in the cyber age. An equally confounding issue has to do with the scope of cyber crime. There is a vast range of illegal behavior that could be identified as cyber crime. Consequently, there seems to be a degree of ambiguity about what is beingdiscussed when the subject of cybercrime is broached. Fraud, technology theft, security breaches, identity theft, child pornography, and even stalking all potentially fall within the realm of cyber criminality. Even within the computer community, there seems to be some disagreement about which kinds of behavior should be classified as criminal. There are some who would argue that certain forms of hacking, where a secure computer system is breached and perhaps altered, should never be thought of as a criminal act. Advocates for this position would maintain that the motivation for these actions is often not malicious and may even prove to be beneficial in terms of identifying security shortcomings. Instead, this group would rather see a focus on only those cases where sabotage or financial gain is involved (Schell, Dodge and Moutsatos, 2002). Others, including those in law enforcement communities, would strongly disagree with this position, pointing out that the so called harmless events of hacking collectively cost billions of dollars of damage.Some definitions of cyber-crime are relatively narrow in focus. In some cases, only hacking behavior would fall under the definition of what constituted cyber-criminality. For example, the Council of Europe’s Cybercrime Treaty makes reference to only those offenses that involve damage to data or to copyright and content infringements. However, most experts would agree that this definition is much too narrow and needs to take into account more traditional crimes, such as fraud and stalking, which make use of computers (Gordon and Ford, 2006; Zeviar-Geese, 1997-1998). 10
  • 3. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 The legal definition of cybercrime used in the United States takes a relatively broad view of the kinds of behavior constituting computer crime. The United States Code proscribes a range of conduct related to the use of computers in criminal behavior, including conduct relating to the obtaining and communicating of restricted information, the unauthorized accessing of information from financial institutions, the United States government, and “protected computers”; the unauthorized accessing of a government computer, fraud, the damaging of a protected computer resulting in certain types of specified harm, trafficking in passwords and extortionate threats to cause damage to a “protected computer” (United States Code, Section 1030 of title 18). Taking into account the statutory provisions of the United States Code, the FederalBureau of Investigation identifies a number of computer-related crimes that are part of their cyber mission,including serious computer intrusions and the spread of malicious code, online sexual predation of minors and child pornography, the theft of U.S. intellectual property, breaches of national security and organized criminal activity engaging in Internet fraud (Federal Bureau of Investigation, 2006). Despite the specific identification of offenses, the legal definitionof cyber crime tends to read like a grocery list and fails to anticipate future criminal variations in cyber offending. 2.0 CONTENT 2.1 Classifications of Cyber Crimes Cyber crime can be classified into four major categories as cyber crime against individual, cyber crime against property, cyber crime against organization and cyber crime against society. 2.1.1 Cyber Crime Against Individual Email spoofing,spamming,cyber defamation, harassment and cyber stalking are examples of cyber crimes against individual. Email spoofing is a spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source. Then, the crime of spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. While cyber defamation occurs when defamation takes place with the help of computers or the internet. For example when someone publishes 10
  • 4. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 defamatory matter about someone on a website or sends e-mails containing defamatory information. While cyber stalking means following the moves of an individual's activity over internet. It can be done with the help of many protocols available such at e- mail, chat rooms or user net groups. 2.1.2 Cyber Crime Against Property Examples of cyber crime against property are credit card fraud and intellectual property crimes. These include software piracy, illegal copying of program and distribution of copies of software, copyright infringement, trademarks violations and theft of computer source code. In addition, internet time theft. It is the usage of the internet hours by an unauthorized person which is actually paid by another person. 2.1.3 Cyber Crime Against Organization An unauthorized accessing of computer which is accessing the computer or network without permission from the owner is one of the instances of this type of cyber crime. It can be of two forms. The first one is changing or deleting data. While the second form is computer voyeur. It is when the criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. The other example of crime against organization is denial of service. When internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server. Virus attack is also one of the examples of crime against organization. A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach them to. Furthermore, the email bombing in order sending large numbers of mails to the individual or company or mail servers thereby ultimately are resulting into crashing also crime against organization. 2.1.4 Cyber Crime Against Society This type of cyber crime includes forgery, cyber terrorism and web jacking. Forgery is something like currency notes, revenue stamps or mark sheets which can be forged using computers and high quality scanners and printers. While cyber terrorism is the use of computer 10
  • 5. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 resources to intimidate or coerce others. In the case of web jacking, hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. 2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA Cybercrime is increasing at an alarming rate worldwide with more than a million people becoming victims every single day. The victims of cyber crime also paid dearly with a total loss of US$388bil (RM1.21bil) to cyber criminals in 2010according to the Norton Cyber crime Report 2011. Globally, in 2008, most scammers operated from the United States. The United States still held a huge lead in active internet users then, a gap that has since closed considerably. According to statistic, in 2008, China and United States each has approximately 200 million internet users, and most of the world has grown commensurately. As the user population have grown abroad, so havetheir scammer populations also increase day by day. Several countries stand out in 2008 as have disproportionately huge populations of scammers are Nigeria, Romania, the Netherlands and China. Lottery and fake money transfer (AFF)frauds seem to be the specialty of the Nigerians. The United States still leads in identity theft and phishing or spoofing fraudbased on The Federal Bureau of Investigation (FBI) in collaboration with the Internet Crime Complaint Center (IC3). Cyber crimes do not only cost victims financially but emotionally too. However, victims could have saved themselves of money and regret as the type of cyber crimes which they have been a victim to be preventable. In Malaysia, the report found that the most common type of cybercrimes is malware, scams and threats targeted at mobile devices. However many people tend to underestimate the dangers of online crime thinking that it will happen to everyone else but themselves. The survey found that seven out of 10 adults thought they would more likely be a victim of physical crime rather than an online crime. Although Malaysia was not in the list of countries studied in the report, national cyberspace police Cybersecurity Malaysia said the findings are representative of the Malaysian threat landscape. It is the same environment, so whatever that is happening in the world will definitely affect us the same way. 10
  • 6. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 Cyber crime causes damage to global economics in billions dollars and many experts think that it is a promptly increasing threat for national security and social well being.In Malaysia, the specific law that governs the misuse of computer is the Computer Crimes Act. Given the increase in computer related crimes and computer abuse, the enactment of the Computer Crimes Act was timely to govern and regulate this ‘cyberspace’ activity and impose sanctions for criminal acts related to it. FIGURE 1.0 Top Ten Countries by Count (Perpetrators) These locations are among the most populous in the country. 1. United States 66.1% 2. United Kingdom 10.5% 3. Nigeria 7.5% 4. Canada 3.1% 5. China 1.6% 6. South Africa 0.7% 7. Ghana 0.6% 10
  • 7. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 8. Spain 0.6% 9. Italy 0.5% 10. Romania 0.5% 2.3 SUGGESTIONS ON HOW TO CURB CYBER CRIMES Cyber crime refers to illegal activities that take place online, including fraud, spam, identity theft, computer viruses and worms, cyber stalking, drug trafficking, sexual predators, malware or spyware andphishing. There are a lot of ways on how to curb cyber crime. Firstly, we can avoid it by education. As we know, the hackers are not the only ones who can gain power from information. By educating ourselves about the types of scams that exist on the internet and how to avert them, we are putting our self one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. We need to remember that, phishing is when hackers attempt to lure us into revealing personal new stories, so keep informed on the latest news related scams. Secondly, we can use a firewall. Firewalls monitor traffic between our computer or network and the internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with our security software. And if we have a home wireless network, enable the firewall that comes with our router. We need to be careful not to click on any links in messages from people we do not know. The link could take us to a fake website that asks for our private information, such as user names and passwords, or it could download malware onto our computer. Even if the message is from someone we know, be cautious. Some viruses replicate and spread through email, so look for information that indicates that the message is legitimate. Then, we also should practice safe surfing. When navigating the web, we need to take precautions to avoid phony websites that ask for our personal information and pages that contain malware. Use a search engine to help us navigate to the correct web address since it will correct misspellings. That way, we would notwind up on a fake page at a commonly misspelled address. We may also want to use a product like McAfee software to help our computer navigate. The site 10
  • 8. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 advisor software is a free browser tool that tells us if a site is safe or not right in our search results, so we are warned before we click. Then, in order to practice safe shopping, we also need to be careful where we shop online. Be cautious when shopping at a site that we have never visited before and do a little investigation before we enter into payment information. Most people become victims of these at one time or another, but there are ways to avoid or deal with cyber crime by protecting yourself appropriately. Besides that, we must use comprehensive security software and keep our system updated. It is because the hackers have a wide variety of ways to access the system and information. So, we need comprehensive security software that can protect us from all angles. Just make sure that we keep our security software up to date by selecting the automatic update function on your security control panel and do not forget to perform regular scans. The other way to prevent cyber crime is secure our wireless network it is because hackers can access data while it is in transit on an unsecured wireless network. We can keep the hackers out by enabling the firewall on our router and changing the router’s administrator password. The cybercriminals often know the default passwords and they can use them to hack into our network. Then, we may also want to set up our router so, it only allows access to people with passwords that are encrypted. We must check our owner’s manual for instructions on setting up encryption. In order to protect our system from being the victim of cyber crime, we must use strong passwords. Although it may be easier for us to remember short passwords that reference our birthday, middle name, or pet’s name, these kinds of passwords also make it easy for hackers. Strong passwords can go a long way in helping secure our information, so choose a password that is at least ten characters long and consists of a combination of letters, numbers and special characters. Also consider changing the password periodically to reduce the likelihood of it being compromised. Last but not least, use common sense is also a proper way to curb cyber crime. Despite the warnings, cybercrime is increasing, fueled by common mistakes people make such as responding to spam and downloading attachments from people they do not know. So, use common sense whenever we are on the internet. Never post personal information online or share sensitive information such as our social security number and credit card number. Exercise caution when clicking on any links or downloading any programs. Althoughwe do take some effort, remember 10
  • 9. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 that there are a lot of resources and tools to help us. And by adopting a few precautions and best practices, we can help keep cyber crime from growing. 3.0 CONCLUSION Cyber crime means any criminal activity in which a computer or network is the source, tool or target or place of crime. Cyber crime comes in many forms, but most of these crimes deal with stolen information. The most common types of cyber crime include identity theft, phishing scams and fraud. It is crimes committed with the use of computers or relating to computers, especially through internet. Crimes involving use of information or usage of electronic means in furtherance of crime are covered under the scope of cyber crime committed against person. It can be classified into four major categories as cyber crime against individual, cyber crime against property, cyber crime against organization and cyber crime against society, property and government. Therefore we need to take a serious action and a drastic ways in order to curb cyber crime from becoming more serious like in United States. The United States still leads in identity theft and phishing. We need to make sure that the antivirus, anti malware, and anti spyware programmers t are to be updated from the internet to keep up with newly introduced malicious computer programmers. Then, make sure that our system having effective firewalls to keep out malicious programmers from entering into a local or wide area networks. Besides that, the encryption technologies must work well and use a strong password in order to protect our computer. In conclusion, Malaysia, in its bid to be technologically advanced has put into place its various national Information Communication and Technology (ICT) projects such as the Multimedia Super Corridor and the various technology parks to promote the use and development of ICT. Such promotion will result in a widespread use of the Internet and the Internet culture. It is submitted that Malaysia must have up-to-date laws to effectively deal with the cybercrimes that comes along with the Internet. To this end, Malaysia must constantly check and conduct measurements to determine the use utility of its current laws to combat cybercrime. One cannot 10
  • 10. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 deny that the online environment cannot and will never be rid of cybercrimes due to the Internet’s unique architecture. 4.0 REFERENCES The Future Challenges of Cyber Crime: Volume 5; Proceeding of the Future Working Group; Toby Finnie, Tom Petee and John Jarvis, Quantico Virginia 2010. Cybercrimes continue to rise. Retrieved November 7, 2011, from http://www. Apecdoc.org/ site/Malaysia/ 2011 / 09 / 26 / cybercrime Consumer Fraud Reporting Crime Statistics, Retrieved November 8, 2011, from http://www. consumer fraud reporting. Org/ internet-scam-statistics. html. Top 10 Steps to Protect Against Cybercrime. Retrieved November 8, 2011, from http://www. dell. com/ 10 steps to protect against cybercrime_dell_en. pdf. How to Prevent Cyber Crime. Retrieved November 7, 2011, from http://www. ehow. com _4967690_ prevent cyber-crime-html. 10