SlideShare a Scribd company logo
1 of 29
HACKING & HACKTIVISM



• Muhammad Rashidi Bin Razali (2010391069)
• Muhamad Fadzile Bin Abd Malek (2010158019)
• Muhammad Haziq Bin Mazlan (2010715319)
TOPICS COVERED IN THIS PRESENTATION



• HISTORY OF HACKING
• INTRODUCTION
• PURPOSE OF HACKING
• HACKTIVISM OR POLITICAL HACKING IN MALAYSIA
• EFFECT OF HACKING

• SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA
• CONCLUSION
HISTORY OF HACKING
1960s
MIT’s artificial lab
Ken Thompson invented UNIX

1970s
Dennis Ritchie invented C

1980s
Cyber Space coined
414s arrested
Two hacker group formed

1990s
National Crackdown on hackers
Kevin Mitnick arrested
Microsoft’s NT operating system
World Most Famous Hacker
                                    Kevin Mitnick

  Stephen wozniak




                          At the time of his arrest, he was the
Tsutomu Shimomura         most-wanted computer criminal in the
                          United States.
INTRODUCTION

• Hacker is a person who access computer system and network
  without authorization

• There are 3 types of hacker which is white hat, black hat and
  grey hat

• Hacker hierarchy is divided into there which is script
  kiddies, intermediate hackers and elite hackers
PURPOSE OF HACKING
• To steal
    Money
    Important data / information

• To test their knowledge in understanding network and
  computer system

• To harm someone’s privacy

• To become a cyber warrior

• To espionage other people
EFFECT OF HACKING


• Data loss

• Increasing maintenance cost

• Negative reputation
HACKTIVISM OR POLITICAL HACKING IN MALAYSIA



•   Hactivism
      The act of hacking, or breaking into computer system,
      for a political or socially motivated purpose. The
      individual who performs an act of hacktivism is said to
      be a hacktivist.

      They uses the same tools and techniques as a hacker,
      but does so in order to disrupt services and bring
      attention to a political or social cause.
THEIR MESSAGE

Greetings, Malaysia, We have seen the censorship taken by the Malaysian
government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the
world’s strictest governments, even blocking out movies, and television shows. These
acts of censorship are inexcusable. You are taking away a basic human right. The
internet is here for freedom, without fear of government interference. Do not think
that no one else notices. Your structured government has done the talking, and we
hear loud and clear. Let this be an announcement to all your people. This is a sign, a
warning, and an opportunity to listen to ideas above your own. In a way you are
being stubborn. But how will this help anyone or your country. We fear that if you
make further decisions to take away human freedom. We are obligated to act fast
and have no mercy. For rules were meant to be broken. And corruption was meant to
be washed away and forgiven. Now we will wash your corruption away so be
prepared. Take this as a favor.

We are Anonymous.
Indonesia attacked Malaysia

• This happen when Harimau Malaya won against Garuda
  Indonesia in AFF Suzuki Cup 2010.

• Attacked launched by angry Indonesian Hackers because they
  could not accept their team defeated.
UiTM Website Hacked!
THEIR MESSAGE

• This is a message the hacker leave at the website.

“You never learn…You never learn…You never learn…I email you
remember? And I notice you have changed, most of the
password after that. (And thanks to unknown Wifi
owner, borrow your line for a while ya!)”
List of website hacked by Indonesia hackers


•   SabahTourism.com – Hacked + leaked
•   Tour Malaysia (Not Tourism Malaysia) – Hacked
•   Tourism Malaysia – Unaffected
•   UiTM Penang – Hacked
•   JBiotech – Hacked
•   Social Welfare Department (Ezi2Care) – Hacked
•   CIDB – Hacked but back up 12:20am
•   Land Public Transport Commision – Hacked but back up 12:15am
•   1Malaysia – DoS / Switched off 3:45am
•   Malaysian Communications and Multimedia Commission –Unaffected
•   ASEANConnect – DoS / Switched off
    Malaysian Meteorological Service – DoS / Switched off
List of website hacked by Indonesia hackers (cont)



•   Ministry of Education – DoS / Switched off
•   Suruhanjaya Pilihanraya Malaysia – DoS / Switched off
•   Bomba - DoS / Switched off
•   TMNet – Unaffected
•   Perbendaharaan Malaysia - DoS / Switched off
•   Kementerian Kerja Raya Malaysia - DoS / Switched off
•   Parlimen Malaysia – DoS / Switched off
•   Malaysian Treasury – DoS / Switched off
•   University Kebangsaan Malaysia – DoS / Switched off
•   Jobs Malaysia – DoS / Switched off
•   Information, Communications and Culture – DoS / Switched off
•   Human Resouce Ministry – DoS / Switched off 3:59am
•   National Sports Council – DoS / Switched off
•   Polis Diraja Malaysia (PDRM) – DoS / Switched off
Myanmar attacked Malaysia
Myanmar attacked Malaysia (cont)


This issues was find at blog. The url is http://blog.wanzul.net/2012/isu-
myanmar-rohingya-web-malaysia-di-hack/

Why Myanmar attacked Malaysia :
   • 17 Ogos 2012, based on sermons, the people of Myanmar now in serious
      condition.
   • They were brutally murdered. Actually, this was already old things.
   • However, its not be noted from "world".
   • We as a neighbor of the Myanmar do not give attention to them but still
      focus on Palestin, Afghanistan and Arab.

    Maybe their intention is to alert us to give attention to them but, the way
    they do is not Halal.
Political Hacking in Malaysia
Political Hacking in Malaysia (cont)

KUALA LUMPUR, Aug 18 —Datuk Seri Anwar Ibrahim’s blog was hacked late last
night and defaced with a fake post that portrayed him as an apologist for the
Zionist regime in Israel.

It also included an apology to Prime Minister Datuk Seri Najib Razak as part of
the opposition leader’s message ahead of the Aidilfitri celebration tomorrow.

“We understand a screen capture of the posting had been successfully recorded
and is now being spread by Umno cybertroopers with the intention to discredit
and defame Dato’ Seri Anwar Ibrahim,” the blog administrator said.
Malay daily Sinar Harian reported that the hackers had uploaded a message
from Anwar, claiming he felt ashamed for his party’s “sinful extremist position
chasing after the prime minister’s office to the extent of defaming Najib and the
latter’s family”.
Cyber law in Malaysia

Some of the cyber law in Malaysia:
• Digital Signature Act 1997
• Computer Crimes Act 1997
• Copyright (Amendment) Act 1997
• Communication and Multimedia Act 1998
Digital Signature Act 1997

• Enforced on October 1998
• Secures electronic communications especially
  on the Internet
• Digital Signature is an identity verification
  standard using encryption techniques to
  protect against e-mail forgery.
• The encrypted code consists of the user’s
  name and a hash of all the parts of the
  message.
• By attaching the digital signature, one can
  ensure that nobody can eavesdrop, intercept
  or temper with the transmitted data.
• By doing so, a more secure and safe electronic
  communication could be done.
Computer Crimes Act 1997

• Protection against the misuses of computers and
  computer criminal activities are ensured by the
  Act.
• Example of crimes:
  – Unauthorized use of programs
  – Illegal transmission of data or messages over
    computers
  – Hacking or cracking of computer systems and
    networks.
• Computer crimes are banned by this law. Those
  who disobey this law can be charged.
• By implementing the Computer Crimes Act
  1997, computer users can now protect their
  rights to privacy and build trust in the
  computer system.
• This Act also enable the government to track
  the illegal activities, thus reducing the cyber
  crimes cases.
Copyright (Amendment) Act
                     1997
• Brought into force on April 1999.
• The Copyright (Amendment) Act amends the
  Copyright Act 1987 to extend copyright law to
  the new and converged multimedia
  environment.
• It serves to protect the expression of thought
  and creative ideas from unauthorized copying
  or alteration.
Communication and
                 Multimedia Act 1998

• Endorsed in April 1999.
• The Communication and Multimedia Act 1998
  creates a new system of licenses and defines the
  roles and responsibilities of those providing
  communication and multimedia services.
• The implementation of Communication and
  Multimedia Act 1998 ensures that information is
  secure, the network is safe, reliable and the
  service is affordable all over Malaysia.
• In Malaysia, you can use this Act for any cases
  regarding your internet service provider and
  see whether they got accuses of part of this
  law.
• This Act also ensures high level of user’s
  confidence in the information and
  communication technology industry.
CONCLUSION

• Hacking is a good computing skill that can be
  used for good or bad intention.
• There is reason to do the hack, and there are
  ways to prevent it.
Q/A

Thank you

More Related Content

What's hot

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 

What's hot (20)

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
System security
System securitySystem security
System security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 

Viewers also liked (20)

Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
( malaysia ) Company Law
( malaysia ) Company Law ( malaysia ) Company Law
( malaysia ) Company Law
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
ROM Hacking for Fun, Profit & Infinite Lives
ROM Hacking for Fun, Profit & Infinite LivesROM Hacking for Fun, Profit & Infinite Lives
ROM Hacking for Fun, Profit & Infinite Lives
 
Fuerza del derecho
Fuerza del derechoFuerza del derecho
Fuerza del derecho
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Ophcrack
OphcrackOphcrack
Ophcrack
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
ACM Teach - Hackathon Tips and Tricks - Spring 2014
ACM Teach - Hackathon Tips and Tricks - Spring 2014ACM Teach - Hackathon Tips and Tricks - Spring 2014
ACM Teach - Hackathon Tips and Tricks - Spring 2014
 
ICHack '13 Prep Presentation
ICHack '13 Prep PresentationICHack '13 Prep Presentation
ICHack '13 Prep Presentation
 
Copyright act
Copyright actCopyright act
Copyright act
 

Similar to Hacking and Hacktivism

shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfsheryl90
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.Rushabh Shah
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cybercrime
CybercrimeCybercrime
CybercrimeFraz Ali
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 

Similar to Hacking and Hacktivism (20)

shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Hacking and Hacktivism

  • 1. HACKING & HACKTIVISM • Muhammad Rashidi Bin Razali (2010391069) • Muhamad Fadzile Bin Abd Malek (2010158019) • Muhammad Haziq Bin Mazlan (2010715319)
  • 2. TOPICS COVERED IN THIS PRESENTATION • HISTORY OF HACKING • INTRODUCTION • PURPOSE OF HACKING • HACKTIVISM OR POLITICAL HACKING IN MALAYSIA • EFFECT OF HACKING • SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA • CONCLUSION
  • 3. HISTORY OF HACKING 1960s MIT’s artificial lab Ken Thompson invented UNIX 1970s Dennis Ritchie invented C 1980s Cyber Space coined 414s arrested Two hacker group formed 1990s National Crackdown on hackers Kevin Mitnick arrested Microsoft’s NT operating system
  • 4. World Most Famous Hacker Kevin Mitnick Stephen wozniak At the time of his arrest, he was the Tsutomu Shimomura most-wanted computer criminal in the United States.
  • 5. INTRODUCTION • Hacker is a person who access computer system and network without authorization • There are 3 types of hacker which is white hat, black hat and grey hat • Hacker hierarchy is divided into there which is script kiddies, intermediate hackers and elite hackers
  • 6. PURPOSE OF HACKING • To steal  Money  Important data / information • To test their knowledge in understanding network and computer system • To harm someone’s privacy • To become a cyber warrior • To espionage other people
  • 7. EFFECT OF HACKING • Data loss • Increasing maintenance cost • Negative reputation
  • 8. HACKTIVISM OR POLITICAL HACKING IN MALAYSIA • Hactivism The act of hacking, or breaking into computer system, for a political or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
  • 9.
  • 10. THEIR MESSAGE Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world’s strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favor. We are Anonymous.
  • 11. Indonesia attacked Malaysia • This happen when Harimau Malaya won against Garuda Indonesia in AFF Suzuki Cup 2010. • Attacked launched by angry Indonesian Hackers because they could not accept their team defeated.
  • 13. THEIR MESSAGE • This is a message the hacker leave at the website. “You never learn…You never learn…You never learn…I email you remember? And I notice you have changed, most of the password after that. (And thanks to unknown Wifi owner, borrow your line for a while ya!)”
  • 14. List of website hacked by Indonesia hackers • SabahTourism.com – Hacked + leaked • Tour Malaysia (Not Tourism Malaysia) – Hacked • Tourism Malaysia – Unaffected • UiTM Penang – Hacked • JBiotech – Hacked • Social Welfare Department (Ezi2Care) – Hacked • CIDB – Hacked but back up 12:20am • Land Public Transport Commision – Hacked but back up 12:15am • 1Malaysia – DoS / Switched off 3:45am • Malaysian Communications and Multimedia Commission –Unaffected • ASEANConnect – DoS / Switched off Malaysian Meteorological Service – DoS / Switched off
  • 15. List of website hacked by Indonesia hackers (cont) • Ministry of Education – DoS / Switched off • Suruhanjaya Pilihanraya Malaysia – DoS / Switched off • Bomba - DoS / Switched off • TMNet – Unaffected • Perbendaharaan Malaysia - DoS / Switched off • Kementerian Kerja Raya Malaysia - DoS / Switched off • Parlimen Malaysia – DoS / Switched off • Malaysian Treasury – DoS / Switched off • University Kebangsaan Malaysia – DoS / Switched off • Jobs Malaysia – DoS / Switched off • Information, Communications and Culture – DoS / Switched off • Human Resouce Ministry – DoS / Switched off 3:59am • National Sports Council – DoS / Switched off • Polis Diraja Malaysia (PDRM) – DoS / Switched off
  • 17. Myanmar attacked Malaysia (cont) This issues was find at blog. The url is http://blog.wanzul.net/2012/isu- myanmar-rohingya-web-malaysia-di-hack/ Why Myanmar attacked Malaysia : • 17 Ogos 2012, based on sermons, the people of Myanmar now in serious condition. • They were brutally murdered. Actually, this was already old things. • However, its not be noted from "world". • We as a neighbor of the Myanmar do not give attention to them but still focus on Palestin, Afghanistan and Arab. Maybe their intention is to alert us to give attention to them but, the way they do is not Halal.
  • 19. Political Hacking in Malaysia (cont) KUALA LUMPUR, Aug 18 —Datuk Seri Anwar Ibrahim’s blog was hacked late last night and defaced with a fake post that portrayed him as an apologist for the Zionist regime in Israel. It also included an apology to Prime Minister Datuk Seri Najib Razak as part of the opposition leader’s message ahead of the Aidilfitri celebration tomorrow. “We understand a screen capture of the posting had been successfully recorded and is now being spread by Umno cybertroopers with the intention to discredit and defame Dato’ Seri Anwar Ibrahim,” the blog administrator said. Malay daily Sinar Harian reported that the hackers had uploaded a message from Anwar, claiming he felt ashamed for his party’s “sinful extremist position chasing after the prime minister’s office to the extent of defaming Najib and the latter’s family”.
  • 20. Cyber law in Malaysia Some of the cyber law in Malaysia: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Copyright (Amendment) Act 1997 • Communication and Multimedia Act 1998
  • 21. Digital Signature Act 1997 • Enforced on October 1998 • Secures electronic communications especially on the Internet • Digital Signature is an identity verification standard using encryption techniques to protect against e-mail forgery. • The encrypted code consists of the user’s name and a hash of all the parts of the message.
  • 22. • By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with the transmitted data. • By doing so, a more secure and safe electronic communication could be done.
  • 23. Computer Crimes Act 1997 • Protection against the misuses of computers and computer criminal activities are ensured by the Act. • Example of crimes: – Unauthorized use of programs – Illegal transmission of data or messages over computers – Hacking or cracking of computer systems and networks. • Computer crimes are banned by this law. Those who disobey this law can be charged.
  • 24. • By implementing the Computer Crimes Act 1997, computer users can now protect their rights to privacy and build trust in the computer system. • This Act also enable the government to track the illegal activities, thus reducing the cyber crimes cases.
  • 25. Copyright (Amendment) Act 1997 • Brought into force on April 1999. • The Copyright (Amendment) Act amends the Copyright Act 1987 to extend copyright law to the new and converged multimedia environment. • It serves to protect the expression of thought and creative ideas from unauthorized copying or alteration.
  • 26. Communication and Multimedia Act 1998 • Endorsed in April 1999. • The Communication and Multimedia Act 1998 creates a new system of licenses and defines the roles and responsibilities of those providing communication and multimedia services. • The implementation of Communication and Multimedia Act 1998 ensures that information is secure, the network is safe, reliable and the service is affordable all over Malaysia.
  • 27. • In Malaysia, you can use this Act for any cases regarding your internet service provider and see whether they got accuses of part of this law. • This Act also ensures high level of user’s confidence in the information and communication technology industry.
  • 28. CONCLUSION • Hacking is a good computing skill that can be used for good or bad intention. • There is reason to do the hack, and there are ways to prevent it.