SlideShare a Scribd company logo
1 of 29
Download to read offline
HACKING & HACKTIVISM
• Muhammad Rashidi Bin Razali (2010391069)
• Muhamad Fadzile Bin Abd Malek (2010158019)
• Muhammad Haziq Bin Mazlan (2010715319)
TOPICS COVERED IN THIS PRESENTATION
• HISTORY OF HACKING
• PURPOSE OF HACKING
• EFFECT OF HACKING
• HACKTIVISM OR POLITICAL HACKING IN MALAYSIA
• SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA
• INTRODUCTION
• CONCLUSION
HISTORY OF HACKING
1960s
MIT’s artificial lab
Ken Thompson invented UNIX
1970s
Dennis Ritchie invented C
1980s
Cyber Space coined
414s arrested
Two hacker group formed
1990s
National Crackdown on hackers
Kevin Mitnick arrested
Microsoft’s NT operating system
World Most Famous Hacker
Stephen wozniak
Tsutomu Shimomura
Kevin Mitnick
At the time of his arrest, he was the
most-wanted computer criminal in the
United States.
INTRODUCTION
• Hacker is a person who access computer system and network
without authorization
• There are 3 types of hacker which is white hat, black hat and
grey hat
• Hacker hierarchy is divided into there which is script
kiddies, intermediate hackers and elite hackers
PURPOSE OF HACKING
• To steal
 Money
 Important data / information
• To test their knowledge in understanding network and
computer system
• To harm someone’s privacy
• To become a cyber warrior
• To espionage other people
EFFECT OF HACKING
• Data loss
• Increasing maintenance cost
• Negative reputation
HACKTIVISM OR POLITICAL HACKING IN MALAYSIA
• Hactivism
The act of hacking, or breaking into computer system,
for a political or socially motivated purpose. The
individual who performs an act of hacktivism is said to
be a hacktivist.
They uses the same tools and techniques as a hacker,
but does so in order to disrupt services and bring
attention to a political or social cause.
Greetings, Malaysia, We have seen the censorship taken by the Malaysian
government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the
world’s strictest governments, even blocking out movies, and television shows. These
acts of censorship are inexcusable. You are taking away a basic human right. The
internet is here for freedom, without fear of government interference. Do not think
that no one else notices. Your structured government has done the talking, and we
hear loud and clear. Let this be an announcement to all your people. This is a sign, a
warning, and an opportunity to listen to ideas above your own. In a way you are
being stubborn. But how will this help anyone or your country. We fear that if you
make further decisions to take away human freedom. We are obligated to act fast
and have no mercy. For rules were meant to be broken. And corruption was meant to
be washed away and forgiven. Now we will wash your corruption away so be
prepared. Take this as a favor.
We are Anonymous.
THEIR MESSAGE
• This happen when Harimau Malaya won against Garuda
Indonesia in AFF Suzuki Cup 2010.
• Attacked launched by angry Indonesian Hackers because they
could not accept their team defeated.
Indonesia attacked Malaysia
UiTM Website Hacked!
• This is a message the hacker leave at the website.
“You never learn…You never learn…You never learn…I email you
remember? And I notice you have changed, most of the
password after that. (And thanks to unknown Wifi
owner, borrow your line for a while ya!)”
THEIR MESSAGE
• SabahTourism.com – Hacked + leaked
• Tour Malaysia (Not Tourism Malaysia) – Hacked
• Tourism Malaysia – Unaffected
• UiTM Penang – Hacked
• JBiotech – Hacked
• Social Welfare Department (Ezi2Care) – Hacked
• CIDB – Hacked but back up 12:20am
• Land Public Transport Commision – Hacked but back up 12:15am
• 1Malaysia – DoS / Switched off 3:45am
• Malaysian Communications and Multimedia Commission –Unaffected
• ASEANConnect – DoS / Switched off
Malaysian Meteorological Service – DoS / Switched off
List of website hacked by Indonesia hackers
• Ministry of Education – DoS / Switched off
• Suruhanjaya Pilihanraya Malaysia – DoS / Switched off
• Bomba - DoS / Switched off
• TMNet – Unaffected
• Perbendaharaan Malaysia - DoS / Switched off
• Kementerian Kerja Raya Malaysia - DoS / Switched off
• Parlimen Malaysia – DoS / Switched off
• Malaysian Treasury – DoS / Switched off
• University Kebangsaan Malaysia – DoS / Switched off
• Jobs Malaysia – DoS / Switched off
• Information, Communications and Culture – DoS / Switched off
• Human Resouce Ministry – DoS / Switched off 3:59am
• National Sports Council – DoS / Switched off
• Polis Diraja Malaysia (PDRM) – DoS / Switched off
List of website hacked by Indonesia hackers (cont)
Myanmar attacked Malaysia
This issues was find at blog. The url is http://blog.wanzul.net/2012/isu-
myanmar-rohingya-web-malaysia-di-hack/
Why Myanmar attacked Malaysia :
• 17 Ogos 2012, based on sermons, the people of Myanmar now in serious
condition.
• They were brutally murdered. Actually, this was already old things.
• However, its not be noted from "world".
• We as a neighbor of the Myanmar do not give attention to them but still
focus on Palestin, Afghanistan and Arab.
Maybe their intention is to alert us to give attention to them but, the way
they do is not Halal.
Myanmar attacked Malaysia (cont)
Political Hacking in Malaysia
KUALA LUMPUR, Aug 18 —Datuk Seri Anwar Ibrahim’s blog was hacked late last
night and defaced with a fake post that portrayed him as an apologist for the
Zionist regime in Israel.
It also included an apology to Prime Minister Datuk Seri Najib Razak as part of
the opposition leader’s message ahead of the Aidilfitri celebration tomorrow.
“We understand a screen capture of the posting had been successfully recorded
and is now being spread by Umno cybertroopers with the intention to discredit
and defame Dato’ Seri Anwar Ibrahim,” the blog administrator said.
Malay daily Sinar Harian reported that the hackers had uploaded a message
from Anwar, claiming he felt ashamed for his party’s “sinful extremist position
chasing after the prime minister’s office to the extent of defaming Najib and the
latter’s family”.
Political Hacking in Malaysia (cont)
Cyber law in Malaysia
Some of the cyber law in Malaysia:
• Digital Signature Act 1997
• Computer Crimes Act 1997
• Copyright (Amendment) Act 1997
• Communication and Multimedia Act 1998
Digital Signature Act 1997
• Enforced on October 1998
• Secures electronic communications especially
on the Internet
• Digital Signature is an identity verification
standard using encryption techniques to
protect against e-mail forgery.
• The encrypted code consists of the user’s
name and a hash of all the parts of the
message.
• By attaching the digital signature, one can
ensure that nobody can eavesdrop, intercept
or temper with the transmitted data.
• By doing so, a more secure and safe electronic
communication could be done.
Computer Crimes Act 1997
• Protection against the misuses of computers and
computer criminal activities are ensured by the
Act.
• Example of crimes:
– Unauthorized use of programs
– Illegal transmission of data or messages over
computers
– Hacking or cracking of computer systems and
networks.
• Computer crimes are banned by this law. Those
who disobey this law can be charged.
• By implementing the Computer Crimes Act
1997, computer users can now protect their
rights to privacy and build trust in the
computer system.
• This Act also enable the government to track
the illegal activities, thus reducing the cyber
crimes cases.
Copyright (Amendment) Act
1997
• Brought into force on April 1999.
• The Copyright (Amendment) Act amends the
Copyright Act 1987 to extend copyright law to
the new and converged multimedia
environment.
• It serves to protect the expression of thought
and creative ideas from unauthorized copying
or alteration.
Communication and
Multimedia Act 1998
• Endorsed in April 1999.
• The Communication and Multimedia Act 1998
creates a new system of licenses and defines the
roles and responsibilities of those providing
communication and multimedia services.
• The implementation of Communication and
Multimedia Act 1998 ensures that information is
secure, the network is safe, reliable and the
service is affordable all over Malaysia.
• In Malaysia, you can use this Act for any cases
regarding your internet service provider and
see whether they got accuses of part of this
law.
• This Act also ensures high level of user’s
confidence in the information and
communication technology industry.
CONCLUSION
• Hacking is a good computing skill that can be
used for good or bad intention.
• There is reason to do the hack, and there are
ways to prevent it.
Q/A
Thank you

More Related Content

Similar to History of Hacking & Hacktivism in Malaysia

Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to InformationDavid Lewis
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
Internet freedom in cambodia
Internet freedom in cambodiaInternet freedom in cambodia
Internet freedom in cambodiaMoses Ngeth
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxAshwini831102
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxVincentAcapen
 
The Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in IndonesiaThe Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in IndonesiaDamar Juniarto
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final79850
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesFreedom House
 

Similar to History of Hacking & Hacktivism in Malaysia (20)

Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to Information
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Internet freedom in cambodia
Internet freedom in cambodiaInternet freedom in cambodia
Internet freedom in cambodia
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
The Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in IndonesiaThe Struggle for Digital Democracy in Indonesia
The Struggle for Digital Democracy in Indonesia
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
The State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunitiesThe State Department and Net Freedom: A year of great challenges & opportunities
The State Department and Net Freedom: A year of great challenges & opportunities
 

More from sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).pptsheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxsheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.pptsheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.pptsheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptsheryl90
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptxsheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptsheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptxsheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.pptsheryl90
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxsheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptsheryl90
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.pptsheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdfsheryl90
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.pptsheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.pptsheryl90
 

More from sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

History of Hacking & Hacktivism in Malaysia

  • 1. HACKING & HACKTIVISM • Muhammad Rashidi Bin Razali (2010391069) • Muhamad Fadzile Bin Abd Malek (2010158019) • Muhammad Haziq Bin Mazlan (2010715319)
  • 2. TOPICS COVERED IN THIS PRESENTATION • HISTORY OF HACKING • PURPOSE OF HACKING • EFFECT OF HACKING • HACKTIVISM OR POLITICAL HACKING IN MALAYSIA • SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA • INTRODUCTION • CONCLUSION
  • 3. HISTORY OF HACKING 1960s MIT’s artificial lab Ken Thompson invented UNIX 1970s Dennis Ritchie invented C 1980s Cyber Space coined 414s arrested Two hacker group formed 1990s National Crackdown on hackers Kevin Mitnick arrested Microsoft’s NT operating system
  • 4. World Most Famous Hacker Stephen wozniak Tsutomu Shimomura Kevin Mitnick At the time of his arrest, he was the most-wanted computer criminal in the United States.
  • 5. INTRODUCTION • Hacker is a person who access computer system and network without authorization • There are 3 types of hacker which is white hat, black hat and grey hat • Hacker hierarchy is divided into there which is script kiddies, intermediate hackers and elite hackers
  • 6. PURPOSE OF HACKING • To steal  Money  Important data / information • To test their knowledge in understanding network and computer system • To harm someone’s privacy • To become a cyber warrior • To espionage other people
  • 7. EFFECT OF HACKING • Data loss • Increasing maintenance cost • Negative reputation
  • 8. HACKTIVISM OR POLITICAL HACKING IN MALAYSIA • Hactivism The act of hacking, or breaking into computer system, for a political or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
  • 9.
  • 10. Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world’s strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favor. We are Anonymous. THEIR MESSAGE
  • 11. • This happen when Harimau Malaya won against Garuda Indonesia in AFF Suzuki Cup 2010. • Attacked launched by angry Indonesian Hackers because they could not accept their team defeated. Indonesia attacked Malaysia
  • 13. • This is a message the hacker leave at the website. “You never learn…You never learn…You never learn…I email you remember? And I notice you have changed, most of the password after that. (And thanks to unknown Wifi owner, borrow your line for a while ya!)” THEIR MESSAGE
  • 14. • SabahTourism.com – Hacked + leaked • Tour Malaysia (Not Tourism Malaysia) – Hacked • Tourism Malaysia – Unaffected • UiTM Penang – Hacked • JBiotech – Hacked • Social Welfare Department (Ezi2Care) – Hacked • CIDB – Hacked but back up 12:20am • Land Public Transport Commision – Hacked but back up 12:15am • 1Malaysia – DoS / Switched off 3:45am • Malaysian Communications and Multimedia Commission –Unaffected • ASEANConnect – DoS / Switched off Malaysian Meteorological Service – DoS / Switched off List of website hacked by Indonesia hackers
  • 15. • Ministry of Education – DoS / Switched off • Suruhanjaya Pilihanraya Malaysia – DoS / Switched off • Bomba - DoS / Switched off • TMNet – Unaffected • Perbendaharaan Malaysia - DoS / Switched off • Kementerian Kerja Raya Malaysia - DoS / Switched off • Parlimen Malaysia – DoS / Switched off • Malaysian Treasury – DoS / Switched off • University Kebangsaan Malaysia – DoS / Switched off • Jobs Malaysia – DoS / Switched off • Information, Communications and Culture – DoS / Switched off • Human Resouce Ministry – DoS / Switched off 3:59am • National Sports Council – DoS / Switched off • Polis Diraja Malaysia (PDRM) – DoS / Switched off List of website hacked by Indonesia hackers (cont)
  • 17. This issues was find at blog. The url is http://blog.wanzul.net/2012/isu- myanmar-rohingya-web-malaysia-di-hack/ Why Myanmar attacked Malaysia : • 17 Ogos 2012, based on sermons, the people of Myanmar now in serious condition. • They were brutally murdered. Actually, this was already old things. • However, its not be noted from "world". • We as a neighbor of the Myanmar do not give attention to them but still focus on Palestin, Afghanistan and Arab. Maybe their intention is to alert us to give attention to them but, the way they do is not Halal. Myanmar attacked Malaysia (cont)
  • 19. KUALA LUMPUR, Aug 18 —Datuk Seri Anwar Ibrahim’s blog was hacked late last night and defaced with a fake post that portrayed him as an apologist for the Zionist regime in Israel. It also included an apology to Prime Minister Datuk Seri Najib Razak as part of the opposition leader’s message ahead of the Aidilfitri celebration tomorrow. “We understand a screen capture of the posting had been successfully recorded and is now being spread by Umno cybertroopers with the intention to discredit and defame Dato’ Seri Anwar Ibrahim,” the blog administrator said. Malay daily Sinar Harian reported that the hackers had uploaded a message from Anwar, claiming he felt ashamed for his party’s “sinful extremist position chasing after the prime minister’s office to the extent of defaming Najib and the latter’s family”. Political Hacking in Malaysia (cont)
  • 20. Cyber law in Malaysia Some of the cyber law in Malaysia: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Copyright (Amendment) Act 1997 • Communication and Multimedia Act 1998
  • 21. Digital Signature Act 1997 • Enforced on October 1998 • Secures electronic communications especially on the Internet • Digital Signature is an identity verification standard using encryption techniques to protect against e-mail forgery. • The encrypted code consists of the user’s name and a hash of all the parts of the message.
  • 22. • By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with the transmitted data. • By doing so, a more secure and safe electronic communication could be done.
  • 23. Computer Crimes Act 1997 • Protection against the misuses of computers and computer criminal activities are ensured by the Act. • Example of crimes: – Unauthorized use of programs – Illegal transmission of data or messages over computers – Hacking or cracking of computer systems and networks. • Computer crimes are banned by this law. Those who disobey this law can be charged.
  • 24. • By implementing the Computer Crimes Act 1997, computer users can now protect their rights to privacy and build trust in the computer system. • This Act also enable the government to track the illegal activities, thus reducing the cyber crimes cases.
  • 25. Copyright (Amendment) Act 1997 • Brought into force on April 1999. • The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new and converged multimedia environment. • It serves to protect the expression of thought and creative ideas from unauthorized copying or alteration.
  • 26. Communication and Multimedia Act 1998 • Endorsed in April 1999. • The Communication and Multimedia Act 1998 creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services. • The implementation of Communication and Multimedia Act 1998 ensures that information is secure, the network is safe, reliable and the service is affordable all over Malaysia.
  • 27. • In Malaysia, you can use this Act for any cases regarding your internet service provider and see whether they got accuses of part of this law. • This Act also ensures high level of user’s confidence in the information and communication technology industry.
  • 28. CONCLUSION • Hacking is a good computing skill that can be used for good or bad intention. • There is reason to do the hack, and there are ways to prevent it.