SlideShare a Scribd company logo
1 of 10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011



                    CYBER CRIMES IN MALAYSIA AND U.S.A
                     WHAT SHOULD WE DO IN MALAYSIA?




1.0 INTRODUCTION

Cyber crime is entering the main stream of discussion among authorities especially those who
involve in law.    The vast development in technology obviously has given advantages and
disadvantages to the public generally. This assignment will venture further to the definition and
scope of cyber crime, classification of cyber crime, the comparison of cyber crime between
Malaysia and USA and the suggestions on how to curb the problem.

1.1 Definition and scope

Cyber crime has gained increased attention because computers have become so central at several
areas of social activities connected to everyday life, including, but not limited to, personal and
institutional finances, various recordkeeping functions, interpersonal communications, and
others. Because of its widespread accessibility, the advent of the internet has further served to
facilitate predatory personal crimes and property offenses committed with a computer. The U.S.
Bureau of Census reports that in 2000, there were 94 million people in the United States who
made use of the internet (Newburger, 2001). This greatly expands both the potential victim and
offender pools for both personal and property crimes.

Moreover, the nature of this forum has allowed some potential offenders to move more easily
toward actual criminal behavior because the victims can be depersonalized in the initial stages of
an offense. With the internet, an offender does not have to come face to face with a potential
target, which may make it easier for the offender to complete the victimization of the target. But
what exactly is “cyber-crime”, and is it distinct from other, more traditional forms of crime? To
begin answering these questions, it would be helpful to briefly look at the components of crime
in general. Traditionally, crime has been defined as an intentional violation of the legal code that
is punishable by the state. Central to this definition is the premise that crime occurs within the
boundaries of some physical reference point, that is, a location that constitutes a specific



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


jurisdiction. For example, when a conventional case of fraud occurs, one of the important
considerations is where the actual offense took place so that questions of the appropriate
jurisdiction for prosecution can be addressed. Officials need to know where the victim and
offender came into contact with one another in the perpetration of the offense so that
investigative and prosecutorial authority can be determined.

However, this component is confounded when cyber crime is committed because the location is
no longer a static concept. With the advent of cyberspace, jurisdiction has become much more
problematic, transcending local, state, and even national boundaries. One needs only look at the
various e-mail scams that emanate from such locales as Nigeria, the United Kingdom, or China
to begin to understand how crime is being redefined in the cyber age. An equally confounding
issue has to do with the scope of cyber crime. There is a vast range of illegal behavior that could
be identified as cyber crime. Consequently, there seems to be a degree of ambiguity about what
is beingdiscussed when the subject of cybercrime is broached. Fraud, technology theft, security
breaches, identity theft, child pornography, and even stalking all potentially fall within the realm
of cyber criminality. Even within the computer community, there seems to be some disagreement
about which kinds of behavior should be classified as criminal.

There are some who would argue that certain forms of hacking, where a secure computer system
is breached and perhaps altered, should never be thought of as a criminal act. Advocates for this
position would maintain that the motivation for these actions is often not malicious and may
even prove to be beneficial in terms of identifying security shortcomings. Instead, this group
would rather see a focus on only those cases where sabotage or financial gain is involved (Schell,
Dodge and Moutsatos, 2002). Others, including those in law enforcement communities, would
strongly disagree with this position, pointing out that the so called harmless events of hacking
collectively cost billions of dollars of damage.Some definitions of cyber-crime are relatively
narrow in focus. In some cases, only hacking behavior would fall under the definition of what
constituted cyber-criminality. For example, the Council of Europe’s Cybercrime Treaty makes
reference to only those offenses that involve damage to data or to copyright and content
infringements. However, most experts would agree that this definition is much too narrow and
needs to take into account more traditional crimes, such as fraud and stalking, which make use of
computers (Gordon and Ford, 2006; Zeviar-Geese, 1997-1998).



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


The legal definition of cybercrime used in the United States takes a relatively broad view of the
kinds of behavior constituting computer crime. The United States Code proscribes a range of
conduct related to the use of computers in criminal behavior, including conduct relating to the
obtaining and communicating of restricted information, the unauthorized accessing of
information from financial institutions, the United States government, and “protected
computers”; the unauthorized accessing of a government computer, fraud, the damaging of a
protected computer resulting in certain types of specified harm, trafficking in passwords and
extortionate threats to cause damage to a “protected computer” (United States Code, Section
1030 of title 18). Taking into account the statutory provisions of the United States Code, the
FederalBureau of Investigation identifies a number of computer-related crimes that are part of
their cyber mission,including serious computer intrusions and the spread of malicious code,
online sexual predation of minors and child pornography, the theft of U.S. intellectual property,
breaches of national security and organized criminal activity engaging in Internet fraud (Federal
Bureau of Investigation, 2006). Despite the specific identification of offenses, the legal
definitionof cyber crime tends to read like a grocery list and fails to anticipate future criminal
variations in cyber offending.




2.0     CONTENT

2.1     Classifications of Cyber Crimes

Cyber crime can be classified into four major categories as cyber crime against individual, cyber
crime against property, cyber crime against organization and cyber crime against society.

2.1.1   Cyber Crime Against Individual

Email spoofing,spamming,cyber defamation, harassment and cyber stalking are examples of
cyber crimes against individual. Email spoofing is a spoofed email is one in which e-mail header
is forged so that mail appears to originate from one source but actually has been sent from
another source. Then, the crime of spamming means sending multiple copies of unsolicited mails
or mass e-mails such as chain letters. While cyber defamation occurs when defamation takes
place with the help of computers or the internet. For example when someone publishes



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


defamatory matter about someone on a website or sends e-mails containing defamatory
information. While cyber stalking means following the moves of an individual's activity over
internet. It can be done with the help of many protocols available such at e- mail, chat rooms or
user net groups.

2.1.2   Cyber Crime Against Property

Examples of cyber crime against property are credit card fraud and intellectual property crimes.
These include software piracy, illegal copying of program and distribution of copies of software,
copyright infringement, trademarks violations and theft of computer source code. In addition,
internet time theft. It is the usage of the internet hours by an unauthorized person which is
actually paid by another person.

2.1.3   Cyber Crime Against Organization

An unauthorized accessing of computer which is accessing the computer or network without
permission from the owner is one of the instances of this type of cyber crime. It can be of two
forms. The first one is changing or deleting data. While the second form is computer voyeur. It is
when the criminal reads or copies confidential or proprietary information, but the data is neither
deleted nor changed. The other example of crime against organization is denial of service. When
internet server is flooded with continuous bogus requests so as to denying legitimate users to use
the server or to crash the server. Virus attack is also one of the examples of crime against
organization. A computer virus is a computer program that can infect other computer programs
by modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be
file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the
host to attach them to. Furthermore, the email bombing in order sending large numbers of mails
to the individual or company or mail servers thereby ultimately are resulting into crashing also
crime against organization.

2.1.4   Cyber Crime Against Society

 This type of cyber crime includes forgery, cyber terrorism and web jacking. Forgery is
something like currency notes, revenue stamps or mark sheets which can be forged using
computers and high quality scanners and printers. While cyber terrorism is the use of computer



                                                    10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


resources to intimidate or coerce others. In the case of web jacking, hackers gain access and
control over the website of another, even they change the content of website for fulfilling
political objective or for money.




2.2    COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA

Cybercrime is increasing at an alarming rate worldwide with more than a million people
becoming victims every single day. The victims of cyber crime also paid dearly with a total loss
of US$388bil (RM1.21bil) to cyber criminals in 2010according to the Norton Cyber crime
Report 2011. Globally, in 2008, most scammers operated from the United States. The United
States still held a huge lead in active internet users then, a gap that has since closed considerably.
According to statistic, in 2008, China and United States each has approximately 200 million
internet users, and most of the world has grown commensurately. As the user population have
grown abroad, so havetheir scammer populations also increase day by day. Several countries
stand out in 2008 as have disproportionately huge populations of scammers are Nigeria,
Romania, the Netherlands and China. Lottery and fake money transfer (AFF)frauds seem to be
the specialty of the Nigerians. The United States still leads in identity theft and phishing or
spoofing fraudbased on The Federal Bureau of Investigation (FBI) in collaboration with the
Internet Crime Complaint Center (IC3).

Cyber crimes do not only cost victims financially but emotionally too. However, victims could
have saved themselves of money and regret as the type of cyber crimes which they have been a
victim to be preventable. In Malaysia, the report found that the most common type of
cybercrimes is malware, scams and threats targeted at mobile devices. However many people
tend to underestimate the dangers of online crime thinking that it will happen to everyone else
but themselves. The survey found that seven out of 10 adults thought they would more likely be
a victim of physical crime rather than an online crime. Although Malaysia was not in the list of
countries studied in the report, national cyberspace police Cybersecurity Malaysia said the
findings are representative of the Malaysian threat landscape. It is the same environment, so
whatever that is happening in the world will definitely affect us the same way.




                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


Cyber crime causes damage to global economics in billions dollars and many experts think that it
is a promptly increasing threat for national security and social well being.In Malaysia, the
specific law that governs the misuse of computer is the Computer Crimes Act. Given the
increase in computer related crimes and computer abuse, the enactment of the Computer Crimes
Act was timely to govern and regulate this ‘cyberspace’ activity and impose sanctions for
criminal acts related to it.

FIGURE 1.0 Top Ten Countries by Count (Perpetrators)




These locations are among the most populous in the country.

    1. United States 66.1%

    2. United Kingdom 10.5%

    3. Nigeria 7.5%

    4. Canada 3.1%

    5. China 1.6%

    6. South Africa 0.7%

    7. Ghana 0.6%



                                                    10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


      8. Spain 0.6%

      9. Italy 0.5%

      10. Romania 0.5%




2.3      SUGGESTIONS ON HOW TO CURB CYBER CRIMES

Cyber crime refers to illegal activities that take place online, including fraud, spam, identity
theft, computer viruses and worms, cyber stalking, drug trafficking, sexual predators, malware or
spyware andphishing. There are a lot of ways on how to curb cyber crime. Firstly, we can avoid
it by education. As we know, the hackers are not the only ones who can gain power from
information. By educating ourselves about the types of scams that exist on the internet and how
to avert them, we are putting our self one step ahead of the cybercriminals. Since phishing is
prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt.
We need to remember that, phishing is when hackers attempt to lure us into revealing personal
new stories, so keep informed on the latest news related scams.

Secondly, we can use a firewall. Firewalls monitor traffic between our computer or network and
the internet and serve as a great first line of defense when it comes to keeping intruders out.
Make sure to use the firewall that comes with our security software. And if we have a home
wireless network, enable the firewall that comes with our router. We need to be careful not to
click on any links in messages from people we do not know. The link could take us to a fake
website that asks for our private information, such as user names and passwords, or it could
download malware onto our computer. Even if the message is from someone we know, be
cautious. Some viruses replicate and spread through email, so look for information that indicates
that the message is legitimate.

Then, we also should practice safe surfing. When navigating the web, we need to take
precautions to avoid phony websites that ask for our personal information and pages that contain
malware. Use a search engine to help us navigate to the correct web address since it will correct
misspellings. That way, we would notwind up on a fake page at a commonly misspelled address.
We may also want to use a product like McAfee software to help our computer navigate. The site


                                                       10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


advisor software is a free browser tool that tells us if a site is safe or not right in our search
results, so we are warned before we click. Then, in order to practice safe shopping, we also need
to be careful where we shop online. Be cautious when shopping at a site that we have never
visited before and do a little investigation before we enter into payment information. Most
people become victims of these at one time or another, but there are ways to avoid or deal with
cyber crime by protecting yourself appropriately.

Besides that, we must use comprehensive security software and keep our system updated. It
is because the hackers have a wide variety of ways to access the system and information. So, we
need comprehensive security software that can protect us from all angles. Just make sure that we
keep our security software up to date by selecting the automatic update function on your security
control panel and do not forget to perform regular scans. The other way to prevent cyber crime is
secure our wireless network it is because hackers can access data while it is in transit on an
unsecured wireless network. We can keep the hackers out by enabling the firewall on our router
and changing the router’s administrator password. The cybercriminals often know the default
passwords and they can use them to hack into our network. Then, we may also want to set up our
router so, it only allows access to people with passwords that are encrypted. We must check our
owner’s manual for instructions on setting up encryption.

In order to protect our system from being the victim of cyber crime, we must use strong
passwords. Although it may be easier for us to remember short passwords that reference our
birthday, middle name, or pet’s name, these kinds of passwords also make it easy for hackers.
Strong passwords can go a long way in helping secure our information, so choose a password
that is at least ten characters long and consists of a combination of letters, numbers and special
characters. Also consider changing the password periodically to reduce the likelihood of it being
compromised.

Last but not least, use common sense is also a proper way to curb cyber crime. Despite the
warnings, cybercrime is increasing, fueled by common mistakes people make such as responding
to spam and downloading attachments from people they do not know. So, use common sense
whenever we are on the internet. Never post personal information online or share sensitive
information such as our social security number and credit card number. Exercise caution when
clicking on any links or downloading any programs. Althoughwe do take some effort, remember


                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


that there are a lot of resources and tools to help us. And by adopting a few precautions and best
practices, we can help keep cyber crime from growing.




3.0     CONCLUSION

Cyber crime means any criminal activity in which a computer or network is the source, tool or
target or place of crime. Cyber crime comes in many forms, but most of these crimes deal with
stolen information. The most common types of cyber crime include identity theft, phishing
scams and fraud. It is crimes committed with the use of computers or relating to computers,
especially through internet. Crimes involving use of information or usage of electronic means in
furtherance of crime are covered under the scope of cyber crime committed against person. It can
be classified into four major categories as cyber crime against individual, cyber crime against
property, cyber crime against organization and cyber crime against society, property and
government.

Therefore we need to take a serious action and a drastic ways in order to curb cyber crime from
becoming more serious like in United States. The United States still leads in identity theft and
phishing. We need to make sure that the antivirus, anti malware, and anti spyware programmers t
are to be updated from the internet to keep up with newly introduced malicious computer
programmers. Then, make sure that our system having effective firewalls to keep out malicious
programmers from entering into a local or wide area networks. Besides that, the encryption
technologies must work well and use a strong password in order to protect our computer.

In conclusion, Malaysia, in its bid to be technologically advanced has put into place its various
national Information Communication and Technology (ICT) projects such as the Multimedia
Super Corridor and the various technology parks to promote the use and development of ICT.
Such promotion will result in a widespread use of the Internet and the Internet culture. It is
submitted that Malaysia must have up-to-date laws to effectively deal with the cybercrimes that
comes along with the Internet. To this end, Malaysia must constantly check and conduct
measurements to determine the use utility of its current laws to combat cybercrime. One cannot



                                                   10
Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3.   2011


deny that the online environment cannot and will never be rid of cybercrimes due to the
Internet’s unique architecture.




4.0    REFERENCES

       The Future Challenges of Cyber Crime: Volume 5; Proceeding of the Future Working Group;
                     Toby Finnie, Tom Petee and John Jarvis, Quantico Virginia 2010.

       Cybercrimes continue to rise. Retrieved November 7, 2011, from http://www.
                    Apecdoc.org/ site/Malaysia/ 2011 / 09 / 26 / cybercrime
       Consumer Fraud Reporting Crime Statistics, Retrieved November 8, 2011, from
                   http://www. consumer fraud reporting. Org/ internet-scam-statistics. html.
       Top 10 Steps to Protect Against Cybercrime. Retrieved November 8, 2011, from
              http://www. dell. com/ 10 steps to protect against cybercrime_dell_en. pdf.

       How to Prevent Cyber Crime. Retrieved November 7, 2011, from http://www. ehow.
                    com _4967690_ prevent cyber-crime-html.




                                                   10

More Related Content

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
cyber crime
cyber crimecyber crime
cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 

Similar to Assignment of cyber crimes for oumh1203

I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0drennanmicah
 

Similar to Assignment of cyber crimes for oumh1203 (20)

Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
English in written
English in writtenEnglish in written
English in written
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 

More from Faridah Husin

Hbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksisHbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksisFaridah Husin
 
Hbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quranHbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quranFaridah Husin
 
Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203Faridah Husin
 
Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012Faridah Husin
 
Tugasan peng.pend.seni visual
Tugasan peng.pend.seni visualTugasan peng.pend.seni visual
Tugasan peng.pend.seni visualFaridah Husin
 
Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1Faridah Husin
 
Tugasan rph bahasa melayu
Tugasan rph bahasa melayuTugasan rph bahasa melayu
Tugasan rph bahasa melayuFaridah Husin
 
Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2Faridah Husin
 
Hbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadunHbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadunFaridah Husin
 

More from Faridah Husin (11)

Hbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksisHbml2103 morfologi dan_sintaksis
Hbml2103 morfologi dan_sintaksis
 
Hbae1403 menggambar
Hbae1403 menggambarHbae1403 menggambar
Hbae1403 menggambar
 
Hbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quranHbis2103 pengajian asuhan tilawah al quran
Hbis2103 pengajian asuhan tilawah al quran
 
Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203Tugasan+h bhs melayul1203
Tugasan+h bhs melayul1203
 
Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012Tugasan hbae1203 mei2012
Tugasan hbae1203 mei2012
 
Tugasan hbis 1203
Tugasan hbis 1203Tugasan hbis 1203
Tugasan hbis 1203
 
Tugasan peng.pend.seni visual
Tugasan peng.pend.seni visualTugasan peng.pend.seni visual
Tugasan peng.pend.seni visual
 
Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1Tugasan rph ibadat thn 1
Tugasan rph ibadat thn 1
 
Tugasan rph bahasa melayu
Tugasan rph bahasa melayuTugasan rph bahasa melayu
Tugasan rph bahasa melayu
 
Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2Tugasan pengenalan pend bm 2
Tugasan pengenalan pend bm 2
 
Hbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadunHbef1503 tugasan masyarakat n tamadun
Hbef1503 tugasan masyarakat n tamadun
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Assignment of cyber crimes for oumh1203

  • 1. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 CYBER CRIMES IN MALAYSIA AND U.S.A WHAT SHOULD WE DO IN MALAYSIA? 1.0 INTRODUCTION Cyber crime is entering the main stream of discussion among authorities especially those who involve in law. The vast development in technology obviously has given advantages and disadvantages to the public generally. This assignment will venture further to the definition and scope of cyber crime, classification of cyber crime, the comparison of cyber crime between Malaysia and USA and the suggestions on how to curb the problem. 1.1 Definition and scope Cyber crime has gained increased attention because computers have become so central at several areas of social activities connected to everyday life, including, but not limited to, personal and institutional finances, various recordkeeping functions, interpersonal communications, and others. Because of its widespread accessibility, the advent of the internet has further served to facilitate predatory personal crimes and property offenses committed with a computer. The U.S. Bureau of Census reports that in 2000, there were 94 million people in the United States who made use of the internet (Newburger, 2001). This greatly expands both the potential victim and offender pools for both personal and property crimes. Moreover, the nature of this forum has allowed some potential offenders to move more easily toward actual criminal behavior because the victims can be depersonalized in the initial stages of an offense. With the internet, an offender does not have to come face to face with a potential target, which may make it easier for the offender to complete the victimization of the target. But what exactly is “cyber-crime”, and is it distinct from other, more traditional forms of crime? To begin answering these questions, it would be helpful to briefly look at the components of crime in general. Traditionally, crime has been defined as an intentional violation of the legal code that is punishable by the state. Central to this definition is the premise that crime occurs within the boundaries of some physical reference point, that is, a location that constitutes a specific 10
  • 2. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 jurisdiction. For example, when a conventional case of fraud occurs, one of the important considerations is where the actual offense took place so that questions of the appropriate jurisdiction for prosecution can be addressed. Officials need to know where the victim and offender came into contact with one another in the perpetration of the offense so that investigative and prosecutorial authority can be determined. However, this component is confounded when cyber crime is committed because the location is no longer a static concept. With the advent of cyberspace, jurisdiction has become much more problematic, transcending local, state, and even national boundaries. One needs only look at the various e-mail scams that emanate from such locales as Nigeria, the United Kingdom, or China to begin to understand how crime is being redefined in the cyber age. An equally confounding issue has to do with the scope of cyber crime. There is a vast range of illegal behavior that could be identified as cyber crime. Consequently, there seems to be a degree of ambiguity about what is beingdiscussed when the subject of cybercrime is broached. Fraud, technology theft, security breaches, identity theft, child pornography, and even stalking all potentially fall within the realm of cyber criminality. Even within the computer community, there seems to be some disagreement about which kinds of behavior should be classified as criminal. There are some who would argue that certain forms of hacking, where a secure computer system is breached and perhaps altered, should never be thought of as a criminal act. Advocates for this position would maintain that the motivation for these actions is often not malicious and may even prove to be beneficial in terms of identifying security shortcomings. Instead, this group would rather see a focus on only those cases where sabotage or financial gain is involved (Schell, Dodge and Moutsatos, 2002). Others, including those in law enforcement communities, would strongly disagree with this position, pointing out that the so called harmless events of hacking collectively cost billions of dollars of damage.Some definitions of cyber-crime are relatively narrow in focus. In some cases, only hacking behavior would fall under the definition of what constituted cyber-criminality. For example, the Council of Europe’s Cybercrime Treaty makes reference to only those offenses that involve damage to data or to copyright and content infringements. However, most experts would agree that this definition is much too narrow and needs to take into account more traditional crimes, such as fraud and stalking, which make use of computers (Gordon and Ford, 2006; Zeviar-Geese, 1997-1998). 10
  • 3. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 The legal definition of cybercrime used in the United States takes a relatively broad view of the kinds of behavior constituting computer crime. The United States Code proscribes a range of conduct related to the use of computers in criminal behavior, including conduct relating to the obtaining and communicating of restricted information, the unauthorized accessing of information from financial institutions, the United States government, and “protected computers”; the unauthorized accessing of a government computer, fraud, the damaging of a protected computer resulting in certain types of specified harm, trafficking in passwords and extortionate threats to cause damage to a “protected computer” (United States Code, Section 1030 of title 18). Taking into account the statutory provisions of the United States Code, the FederalBureau of Investigation identifies a number of computer-related crimes that are part of their cyber mission,including serious computer intrusions and the spread of malicious code, online sexual predation of minors and child pornography, the theft of U.S. intellectual property, breaches of national security and organized criminal activity engaging in Internet fraud (Federal Bureau of Investigation, 2006). Despite the specific identification of offenses, the legal definitionof cyber crime tends to read like a grocery list and fails to anticipate future criminal variations in cyber offending. 2.0 CONTENT 2.1 Classifications of Cyber Crimes Cyber crime can be classified into four major categories as cyber crime against individual, cyber crime against property, cyber crime against organization and cyber crime against society. 2.1.1 Cyber Crime Against Individual Email spoofing,spamming,cyber defamation, harassment and cyber stalking are examples of cyber crimes against individual. Email spoofing is a spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source. Then, the crime of spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. While cyber defamation occurs when defamation takes place with the help of computers or the internet. For example when someone publishes 10
  • 4. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 defamatory matter about someone on a website or sends e-mails containing defamatory information. While cyber stalking means following the moves of an individual's activity over internet. It can be done with the help of many protocols available such at e- mail, chat rooms or user net groups. 2.1.2 Cyber Crime Against Property Examples of cyber crime against property are credit card fraud and intellectual property crimes. These include software piracy, illegal copying of program and distribution of copies of software, copyright infringement, trademarks violations and theft of computer source code. In addition, internet time theft. It is the usage of the internet hours by an unauthorized person which is actually paid by another person. 2.1.3 Cyber Crime Against Organization An unauthorized accessing of computer which is accessing the computer or network without permission from the owner is one of the instances of this type of cyber crime. It can be of two forms. The first one is changing or deleting data. While the second form is computer voyeur. It is when the criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. The other example of crime against organization is denial of service. When internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server. Virus attack is also one of the examples of crime against organization. A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach them to. Furthermore, the email bombing in order sending large numbers of mails to the individual or company or mail servers thereby ultimately are resulting into crashing also crime against organization. 2.1.4 Cyber Crime Against Society This type of cyber crime includes forgery, cyber terrorism and web jacking. Forgery is something like currency notes, revenue stamps or mark sheets which can be forged using computers and high quality scanners and printers. While cyber terrorism is the use of computer 10
  • 5. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 resources to intimidate or coerce others. In the case of web jacking, hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. 2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA Cybercrime is increasing at an alarming rate worldwide with more than a million people becoming victims every single day. The victims of cyber crime also paid dearly with a total loss of US$388bil (RM1.21bil) to cyber criminals in 2010according to the Norton Cyber crime Report 2011. Globally, in 2008, most scammers operated from the United States. The United States still held a huge lead in active internet users then, a gap that has since closed considerably. According to statistic, in 2008, China and United States each has approximately 200 million internet users, and most of the world has grown commensurately. As the user population have grown abroad, so havetheir scammer populations also increase day by day. Several countries stand out in 2008 as have disproportionately huge populations of scammers are Nigeria, Romania, the Netherlands and China. Lottery and fake money transfer (AFF)frauds seem to be the specialty of the Nigerians. The United States still leads in identity theft and phishing or spoofing fraudbased on The Federal Bureau of Investigation (FBI) in collaboration with the Internet Crime Complaint Center (IC3). Cyber crimes do not only cost victims financially but emotionally too. However, victims could have saved themselves of money and regret as the type of cyber crimes which they have been a victim to be preventable. In Malaysia, the report found that the most common type of cybercrimes is malware, scams and threats targeted at mobile devices. However many people tend to underestimate the dangers of online crime thinking that it will happen to everyone else but themselves. The survey found that seven out of 10 adults thought they would more likely be a victim of physical crime rather than an online crime. Although Malaysia was not in the list of countries studied in the report, national cyberspace police Cybersecurity Malaysia said the findings are representative of the Malaysian threat landscape. It is the same environment, so whatever that is happening in the world will definitely affect us the same way. 10
  • 6. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 Cyber crime causes damage to global economics in billions dollars and many experts think that it is a promptly increasing threat for national security and social well being.In Malaysia, the specific law that governs the misuse of computer is the Computer Crimes Act. Given the increase in computer related crimes and computer abuse, the enactment of the Computer Crimes Act was timely to govern and regulate this ‘cyberspace’ activity and impose sanctions for criminal acts related to it. FIGURE 1.0 Top Ten Countries by Count (Perpetrators) These locations are among the most populous in the country. 1. United States 66.1% 2. United Kingdom 10.5% 3. Nigeria 7.5% 4. Canada 3.1% 5. China 1.6% 6. South Africa 0.7% 7. Ghana 0.6% 10
  • 7. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 8. Spain 0.6% 9. Italy 0.5% 10. Romania 0.5% 2.3 SUGGESTIONS ON HOW TO CURB CYBER CRIMES Cyber crime refers to illegal activities that take place online, including fraud, spam, identity theft, computer viruses and worms, cyber stalking, drug trafficking, sexual predators, malware or spyware andphishing. There are a lot of ways on how to curb cyber crime. Firstly, we can avoid it by education. As we know, the hackers are not the only ones who can gain power from information. By educating ourselves about the types of scams that exist on the internet and how to avert them, we are putting our self one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. We need to remember that, phishing is when hackers attempt to lure us into revealing personal new stories, so keep informed on the latest news related scams. Secondly, we can use a firewall. Firewalls monitor traffic between our computer or network and the internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with our security software. And if we have a home wireless network, enable the firewall that comes with our router. We need to be careful not to click on any links in messages from people we do not know. The link could take us to a fake website that asks for our private information, such as user names and passwords, or it could download malware onto our computer. Even if the message is from someone we know, be cautious. Some viruses replicate and spread through email, so look for information that indicates that the message is legitimate. Then, we also should practice safe surfing. When navigating the web, we need to take precautions to avoid phony websites that ask for our personal information and pages that contain malware. Use a search engine to help us navigate to the correct web address since it will correct misspellings. That way, we would notwind up on a fake page at a commonly misspelled address. We may also want to use a product like McAfee software to help our computer navigate. The site 10
  • 8. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 advisor software is a free browser tool that tells us if a site is safe or not right in our search results, so we are warned before we click. Then, in order to practice safe shopping, we also need to be careful where we shop online. Be cautious when shopping at a site that we have never visited before and do a little investigation before we enter into payment information. Most people become victims of these at one time or another, but there are ways to avoid or deal with cyber crime by protecting yourself appropriately. Besides that, we must use comprehensive security software and keep our system updated. It is because the hackers have a wide variety of ways to access the system and information. So, we need comprehensive security software that can protect us from all angles. Just make sure that we keep our security software up to date by selecting the automatic update function on your security control panel and do not forget to perform regular scans. The other way to prevent cyber crime is secure our wireless network it is because hackers can access data while it is in transit on an unsecured wireless network. We can keep the hackers out by enabling the firewall on our router and changing the router’s administrator password. The cybercriminals often know the default passwords and they can use them to hack into our network. Then, we may also want to set up our router so, it only allows access to people with passwords that are encrypted. We must check our owner’s manual for instructions on setting up encryption. In order to protect our system from being the victim of cyber crime, we must use strong passwords. Although it may be easier for us to remember short passwords that reference our birthday, middle name, or pet’s name, these kinds of passwords also make it easy for hackers. Strong passwords can go a long way in helping secure our information, so choose a password that is at least ten characters long and consists of a combination of letters, numbers and special characters. Also consider changing the password periodically to reduce the likelihood of it being compromised. Last but not least, use common sense is also a proper way to curb cyber crime. Despite the warnings, cybercrime is increasing, fueled by common mistakes people make such as responding to spam and downloading attachments from people they do not know. So, use common sense whenever we are on the internet. Never post personal information online or share sensitive information such as our social security number and credit card number. Exercise caution when clicking on any links or downloading any programs. Althoughwe do take some effort, remember 10
  • 9. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 that there are a lot of resources and tools to help us. And by adopting a few precautions and best practices, we can help keep cyber crime from growing. 3.0 CONCLUSION Cyber crime means any criminal activity in which a computer or network is the source, tool or target or place of crime. Cyber crime comes in many forms, but most of these crimes deal with stolen information. The most common types of cyber crime include identity theft, phishing scams and fraud. It is crimes committed with the use of computers or relating to computers, especially through internet. Crimes involving use of information or usage of electronic means in furtherance of crime are covered under the scope of cyber crime committed against person. It can be classified into four major categories as cyber crime against individual, cyber crime against property, cyber crime against organization and cyber crime against society, property and government. Therefore we need to take a serious action and a drastic ways in order to curb cyber crime from becoming more serious like in United States. The United States still leads in identity theft and phishing. We need to make sure that the antivirus, anti malware, and anti spyware programmers t are to be updated from the internet to keep up with newly introduced malicious computer programmers. Then, make sure that our system having effective firewalls to keep out malicious programmers from entering into a local or wide area networks. Besides that, the encryption technologies must work well and use a strong password in order to protect our computer. In conclusion, Malaysia, in its bid to be technologically advanced has put into place its various national Information Communication and Technology (ICT) projects such as the Multimedia Super Corridor and the various technology parks to promote the use and development of ICT. Such promotion will result in a widespread use of the Internet and the Internet culture. It is submitted that Malaysia must have up-to-date laws to effectively deal with the cybercrimes that comes along with the Internet. To this end, Malaysia must constantly check and conduct measurements to determine the use utility of its current laws to combat cybercrime. One cannot 10
  • 10. Assignment Of Cyber Crimes. OUMH1203.Faridah Husin. 751008035900001. Sem.3. 2011 deny that the online environment cannot and will never be rid of cybercrimes due to the Internet’s unique architecture. 4.0 REFERENCES The Future Challenges of Cyber Crime: Volume 5; Proceeding of the Future Working Group; Toby Finnie, Tom Petee and John Jarvis, Quantico Virginia 2010. Cybercrimes continue to rise. Retrieved November 7, 2011, from http://www. Apecdoc.org/ site/Malaysia/ 2011 / 09 / 26 / cybercrime Consumer Fraud Reporting Crime Statistics, Retrieved November 8, 2011, from http://www. consumer fraud reporting. Org/ internet-scam-statistics. html. Top 10 Steps to Protect Against Cybercrime. Retrieved November 8, 2011, from http://www. dell. com/ 10 steps to protect against cybercrime_dell_en. pdf. How to Prevent Cyber Crime. Retrieved November 7, 2011, from http://www. ehow. com _4967690_ prevent cyber-crime-html. 10