Your SlideShare is downloading. ×
0
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
7. cyber law & computer crimes
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

7. cyber law & computer crimes

4,022

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,022
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
144
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. INTRODUCTION TO ICT CYBER LAW
  • 2. PENGENALAN KEPADA ICT UNDANG-UNDANG SIBER
  • 3. CYBER LAWWhat is Cyber Law? Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.NEEDS FOR CYBER LAW In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.
  • 4. UNDANG-UNDANG SIBERApa itu undang-undang siber? Undang-undang siber merujuk kepada mana-mana undang- undang yang berkaitan dengan melindungi internet dan teknologi komunikasi yang lain.KEPERLUAN TERHADAP UNDANG-UNDANG SIBER Dalam beberapa tahun ini, ramai bimbang dan banyak isu telah meningkat terhadap keutuhan dan keselamatan maklumat, status kesahan transaksi atas talian, kerahsiaan dan kesulitan bagi maklumat, undang-undang harta intelek dan keselamatan bagi data kerajaan di internet.
  • 5. CYBER LAW
  • 6. CYBER LAW Keutuhan dan Keselamatan DataKeselamatan Maklumat Kerajaan Undang-undang Siber Status Sah Transaksi Undang-undang Harta Atas Talian Intelek Kerahsiaan dan Kesulitan Maklumat
  • 7. THE CYBER LAW ACTS IN MALAYSIA The Malaysian Government has already passed several cyber laws to control and reduce the Internet abuse. These cyber laws include: – Digital Signature Act 1997 – Computer Crimes Act 1997 – Telemedicine Act 1997 – Communications and Multimedia Act 1998 Beside these cyber laws, there are three other cyber laws being drafted. – Private Data Protection Bill – Electronic Government Activities Bill – Electronic Transactions Bill
  • 8. AKTA UNDANG-UNDANG SIBER DI MALAYSIA Kerajaan Malaysia telah menyediakan beberapa undang- undang siber bagi mengawal dan mengurangkan penyalahgunaan internet. Undang-undang siber termasuklah: – Akta Tandatangan Digital 1997 – Akta Jenayah Komputer 1997 – Akta Teleperubatan 1997 – Akta Komunikasi dan Multimedia 1998 Disamping undang-undang siber ini, terdapat tiga undang- undang siber lagi yang sedang dipinda. – Bil Perlindungan Data Peribadi – Bil Elektronik Aktiviti Kerajaan – Bil Transaksi Elektronik
  • 9. THE CYBER LAW ACTS IN MALAYSIA1) DIGITAL SIGNATURE ACT 1997 The Digital Signature Act 1997 secures electronic communications especially on the Internet. Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.
  • 10. AKTA UNDANG-UNDANG SIBER DI MALAYSIA1) AKTA TANDATANGAN DIGITAL 1997 Akta Tandatangan Digital 1997 melindungi komunikasi elektronik terutamanya di internet. Tandatangan Digital adalah standard pengesahan identiti yang menggunakan teknik pengkripan bagi melindungi daripada pemalsuan e-mail. Kon yang dikripkan mengandungi nama pengguna dan pengolahan bagi semua bahagian mesej. Dengan memasang tandatangan digital, kita dapat memastikan tiada sesiapa dapat mengintip, memintas atau merosakkan data yang dihantar.
  • 11. THE CYBER LAW ACTS IN MALAYSIA2) COMPUTER CRIMES ACT 1997 The Computer Crimes Act 1997 gives protection against the misuses of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks. By implementing the Computer Crimes Act 1997, users can protect their rights to privacy and build trust in the computer system. At the same time, the government can have control at a certain level over cyberspace to reduce cyber crime activities.
  • 12. AKTA UNDANG-UNDANG SIBER DI MALAYSIA2) AKTA JENAYAH KOMPUTER 1997 Akta Jenayah Komputer 1997 melindungi daripada penyalahgunaan komputer dan aktiviti jenayah komputer seperti penggunaan program komputer tanpa kebenaran, transmisi tidak sah data atau mesej menerusi komputer dan pengodaman sistem dan rangkaian komputer. Dengan melaksanakan Akta Jenayah Komputer 1997, pengguna boleh melindungi hak-hak untuk kerahsiaan dan membina kepercayaan terhadap sistem komputer. Pada masa yang sama, kerajaan boleh mengawal pada tahap tertentu menerusi ruang siber bagi mengurangkan aktiviti jenayah komputer.
  • 13. THE CYBER LAW ACTS IN MALAYSIA3) TELEMEDICINE ACT 1997 The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patients rights and interests are protected. These act provides the future development and delivery of healthcare in Malaysia.
  • 14. AKTA UNDANG-UNDANG SIBER DI MALAYSIA3) AKTA TELEPERUBATAN 1997 Akta Teleperubatan 1997 memastikan hanya pengamal perubatan yang berkelayakkan boleh mengamalkan teleperubatan dan dengan itu hak-hak dan keinginan pesakit mereka dilindungi. Akta ini menyediakan pembangunan masa hadapan penyelamatan bagi penjagaan kesihatan di Malaysia.
  • 15. THE CYBER LAW ACTS IN MALAYSIA4) COMMUNICATIONS AND MULTIMEDIA ACT 1998 The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and the service is affordable all over Malaysia. This Act also ensures high level of users confidence in the information and communication technology industry.
  • 16. AKTA UNDANG-UNDANG SIBER DI MALAYSIA4) AKTA KOMUNIKASI DAN MULTIMEDIA 1998 Perlaksanaan Akta Komunikasi dan Multimedia 1998 memastikan keselamatan bagi maklumat, rangkaian dipercayai dan kemampuan perkhidmatan di seluruh Malaysia. Akta ini juga bagi memastikan keyakinan pengguna pada tahap yang tinggi di dalam industri teknologi maklumat dan komunikasi.
  • 17. INTRODUCTION TO ICT COMPUTER CRIMES
  • 18. PENGENALAN KEPADA ICT JENAYAH-JENAYAH KOMPUTER
  • 19. COMPUTER CRIMESCOMPUTER CRIMES DEFINITION A computer crime is defined as any criminal activity that is related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.
  • 20. JENAYAH-JENAYAH KOMPUTERDEFINISI JENAYAH KOMPUTER Jenayah komputer didefinisikan sebagai aktiviti jenayah yang berkaitan dengan penggunaan komputer. Aktiviti ini termasuklah penipuan, pelanggaran hak cipta, kecurian komputer dan serangan komputer.
  • 21. COMPUTER CRIMES1) COMPUTER FRAUD Computer fraud is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers. There are many forms of computer fraud which include e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields. Students need to be aware of other computer frauds such as health frauds, scams and hacking. Students will also most likely get false information while researching information on the Internet.
  • 22. JENAYAH-JENAYAH KOMPUTER1) PENIPUAN COMPUTER Penipuan komputer didefinisikan sebagai mempunyai niat untuk mengambil keuntungan atau menyebabkan kehilangan kepada orang lain, terutamanya yang melibatkan kewangan menerusi penggunaan komputer. Terdapat pelbagai bentuk penipuan komputer termasuklah penipuan e-mail, penipuan program, skema pelaburan, promosi jualan dan tuntutan kepakaran bagi lapangan tertentu. Pelajar perlu berhati-hati terhadap penipuan komputer yang lain seperti penipuan kesihatan, pengkomplotan dan penggodaman. Pelajar akan selalunya mendapat maklumat yang salah apabila mencari maklumat di internet.
  • 23. COMPUTER CRIMES2) COPYRIGHT INFRINGEMENT Copyright infringement is defined as a violation of the rights secured by a copyright. Copyright infringement involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal. With the current technology, the most perfect copy of the original copy can be downloaded from the internet.
  • 24. JENAYAH-JENAYAH KOMPUTER2) PELANGGARAN HAK CIPTA Pelanggaran hak cipta didefinisikan sebagai pencabulan terhadap perlindungan hak oleh sebuah hak cipta. Pelanggaran hak cipta melibatkan salinan tidak sah (haram) atau pengeluaran semula bahan- bahan hak cipta oleh kumpulan pasaran gelap. Penjualan terbuka secara komersial bagi item cetak rompak juga adalah salah di sisi undang-undang. Dengan teknologi yang terkini, salinan yang paling sempurna bagi salinan original boleh dimuat turun dari internet.
  • 25. COMPUTER CRIMES3) COMPUTER THEFT Computer theft is defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Examples of computer theft include: – transfer of payments to the wrong accounts – tap into data transmission lines on database at no cost – divert goods to the wrong destination
  • 26. JENAYAH-JENAYAH KOMPUTER3) KECURIAN KOMPUTER Kecurian komputer didefinisikan sebagai penggunaan tanpa kebenaran milikan orang lain dengan niat untuk menafikan hak-hak milikan pemilik terhadap harta atau kegunaannya. Contoh bagi kecurian komputer termasuklah: – Pemindahan pembayaran ke akaun yang salah – Memasuki ke talian penghantaran data pada pangkalan data tanpa sebarang kos atau pembayaran. – Mengalihkan peralatan ke destinasi yang salah.
  • 27. COMPUTER CRIMES4) COMPUTER ATTACK Computer attack may be defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data. Computer attack can be in the forms of: – physical attack that disrupt the computer facility or its transmission lines. – an electronic attack that uses the power of electromagnetic energy to overload computer circuitry. – a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user
  • 28. JENAYAH-JENAYAH KOMPUTER4) SERANGAN KOMPUTER Serangan komputer didefinisikan sebagai aktiviti yang dilakukan bagi menganggu peralatan sistem komputer, mengubah kawalan pemprosessan atau merosakkan data yang disimpan. Serangan komputer boleh terdapat dalam beberapa keadaan: – Serangan fizikal yang menganggu kemudahan komputer atau talian transmisinya. – Serangan elektronik yang menggunakan tenaga elektromagnetik bagi merosakkan litar-litar komputer. – Serangan rangkaian komputer yang menggunakan kod malicious bagi mengeksploitasi kelemahan di dalam perisian atau amalan keselamatan komputer bagi pengguna komputer.
  • 29. INTRODUCTION TO ICT COMPUTER SECURITY
  • 30. PENGENALAN KEPADA ICT KESELAMATAN KOMPUTER
  • 31. COMPUTER SECURITYDEFINITION OF COMPUTER SECURITY Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. We need to protect our computer from any intruders such as hackers, crackers and script kiddie.TYPES OF COMPUTER SECURITY Three types of computer security are:a) hardware securityb) software security/data securityc) network security
  • 32. KESELAMATAN KOMPUTERDEFINISI KESELAMATAN KOMPUTER Keselamatan komputer bermaksud melindungi sistem komputer dan maklumat kita daripada akses yang tidak dikehendaki, kerosakkan, pemusnahan dan pengubahsuaian. Kita perlu melindungi komputer kita daripada sebarang pencerobohan seperti pengodam, cracker dan script kiddie.JENIS-JENIS KESELAMATAN KOMPUTER Terdapat tiga jenis keselamatan komputer iaitu:a) Keselamatan perkakasanb) Keselamatan perisian/keselamatan datac) Keselamatan rangkaian
  • 33. TYPES OF COMPUTER SECURITYa) HARDWARE SECURITY Hardware security refers to security measures used to protect the hardware specifically the computer and its related documents. The examples of security measures used to protect the hardware include PC-locks, keyboard-locks, smart cards and biometric devices.
  • 34. JENIS-JENIS KESELAMATAN KOMPUTERa) KESELAMATAN PERKAKASAN Keselamatan perkakasan merujuk kepada pengukuran keselamatan yang digunakan untuk melindungi perkakasan terutamanya komputer dan dokumen-dokumen yang berkaitan. Contoh bagi pengukuran keselamatan yang digunakan bagi melindungi perkakasan termasuklah PC-locks, keyboard-locks, kad pintar dan peralatan biometrik.
  • 35. TYPES OF COMPUTER SECURITYb) SOFTWARE AND DATA SECURITY Software and data security refers to the security measures used to protect the software and the loss of data files. Examples of security measures used to protect the software are activation code and serial number. An example of security measure used to protect the loss of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe place that will not be affected by any major destruction.
  • 36. JENIS-JENIS KESELAMATAN KOMPUTERb) KESELAMATAN PERISIAN DAN DATA Keselamatan perisian dan data merujuk kepada pengukuran keselamatan yang digunakan bagi melindungi perisian dan kehilangan fail-fail data. Contoh bagi pengukuran keselamatan yang digunakan bagi melindungi perisian adalah kod pengaktifan dan nombor siri. Contoh bagi pengukuran keselamatan yang digunakan bagi melindungi kehilangan data adalah dengan kaedah pelan pemulihan semula kemusnahan. Idea bagi pelan ini adalah dengan menyimpan data, program dan dokumen penting yang lain di tempat yang selamat yang tidak akan dijejaskan oleh kemusnahan besar-besaran.
  • 37. TYPES OF COMPUTER SECURITYc) NETWORK SECURITY The transfer of data through network has become a common practice and the need to implement network security has become significant. Network security refers to security measures used to protect the network system. One example of network security measures is firewall. With firewall, network resources can be protected from the outsiders.
  • 38. JENIS-JENIS KESELAMATAN KOMPUTERc) KESELAMATAN RANGKAIAN Penghantaran data menerusi rangkaian telah menjadi amalan biasa dan keperluan untuk melaksanakan keselamatan rangkaian telah menjadi satu keperluan. Keselamatan rangkaian merujuk kepada pengukuran keselamatan yang digunakan bagi melindungi sistem rangkaian. Satu contoh bagi pengukuran keselamatan rangkaian adalah firewall. Dengan firewall, sumber-sumber rangkaian boleh dilindungi daripada orang luar.
  • 39. PERSONAL COMPUTER SECURITY CHECKLIST In order to make sure our computers are secured, here are the computer security checklist to follow.  Do not eat, drink or smoke near the computer  Do not place the computer near open windows or doors  Do not subject the computer to extreme temperatures  Clean the equipment regularly  Place a cable lock on the computer  Use a surge protector  Store disks properly in a locked container  Maintain backup copies of all files  Stores copies of critical files off sites  Scan a floppy disk before you open it  Do not open any unknown email received
  • 40. SENARAI SEMAK KESELAMATAN KOMPUTER PERIBADI Bagi memastikan komputer kita dilindungi, di sini adalah senarai semak keselamatan komputer yang perlu diikuti.  Jangan makan, minum atau merokok berhampiran komputer  Jangan menempatkan komputer berdekatan tingkap atau pintu yang terbuka  Jangan menggunakan komputer pada suhu yang melampau  Bersihkan peralatan dengan kerap  Tempatkan kabel pengunci pada komputer  Gunakan pelindung haba  Simpan disk dengan baik di dalam bekas berkunci  Kekalkan salinan sokongan bagi semua fail  Simpan salinan bagi fail kritikal secara tertutup  Imbas disket sebelum kamu membukanya  Jangan buka sebarang e-mail tidak dikenali yang diterima

×