The document summarizes a case of alleged cyberstalking between two individuals, Antarestawati and Khoiriatul Masruroh, in Malang, Indonesia. Antarestawati, a doctor, uploaded a photo of Khoiriatul to a WhatsApp group along with a caption implying she was a prostitute. Feeling harassed, Khoiriatul reported the matter to police. Under Indonesia's ITE Law, Antarestawati faced up to 6 months in prison or a fine for violating decency and defamation. Both parties later reconciled and withdrew the complaint after signing a letter and paying a fine. The document also provides background on cybercrime and cyberstalk
Makalah ini membahas tentang cybercrime dan cyberlaw. Tujuannya adalah untuk memenuhi syarat UAS mata kuliah Etika Profesi Teknologi Informasi dan Komunikasi, serta menambah wawasan mahasiswa tentang cyber crime dan cara penanggulangannya. Beberapa contoh kasus cyber crime yang dijelaskan adalah pencurian akun, deface, port scanning, virus dan trojan, serta denial of service attack.
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
Phishing is an attempt to acquire personal information like usernames, passwords, credit card details by pretending to be a trustworthy entity. It began in 1995 targeting AOL users and has increased in threat level and sophistication over time. Phishers target customers of banks and payment services for financial gain through identity theft. They employ techniques like spear phishing, clone phishing and website forgery. While phishing emails affect a small percentage of recipients, they can yield significant financial rewards for phishers with little effort. Users can detect and prevent phishing by keeping software updated, using firewalls, avoiding links in suspicious emails, and never responding to requests for personal information.
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
Bad Actors (cyber criminals, terrorists, foreign spies) and their Tactics, Techniques, and Procedures (TTPS).
How is evolving the criminal underground in the Dark Web?
The response of the law enforcement.
This document provides contact information for an individual named Boonlia, including their Gmail address, Facebook profile URL, an alternative way to find their Facebook profile by searching for their Gmail address, and their Twitter profile URL.
Makalah ini membahas tentang cybercrime dan cyberlaw. Tujuannya adalah untuk memenuhi syarat UAS mata kuliah Etika Profesi Teknologi Informasi dan Komunikasi, serta menambah wawasan mahasiswa tentang cyber crime dan cara penanggulangannya. Beberapa contoh kasus cyber crime yang dijelaskan adalah pencurian akun, deface, port scanning, virus dan trojan, serta denial of service attack.
CYBER CRIME - A Threat To Internet UsersAman Sharma
the presentation include a description of what cyber crime is and what are the different methods of cyber crimes. in further slides it tells about the punishment for the cyber criminals and various methods to stop or reduce the chances of cyber crime.
Phishing is an attempt to acquire personal information like usernames, passwords, credit card details by pretending to be a trustworthy entity. It began in 1995 targeting AOL users and has increased in threat level and sophistication over time. Phishers target customers of banks and payment services for financial gain through identity theft. They employ techniques like spear phishing, clone phishing and website forgery. While phishing emails affect a small percentage of recipients, they can yield significant financial rewards for phishers with little effort. Users can detect and prevent phishing by keeping software updated, using firewalls, avoiding links in suspicious emails, and never responding to requests for personal information.
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
Bad Actors (cyber criminals, terrorists, foreign spies) and their Tactics, Techniques, and Procedures (TTPS).
How is evolving the criminal underground in the Dark Web?
The response of the law enforcement.
This document provides contact information for an individual named Boonlia, including their Gmail address, Facebook profile URL, an alternative way to find their Facebook profile by searching for their Gmail address, and their Twitter profile URL.
This document discusses remote access Trojans (RATs) and the DarkComet RAT in particular. It explains that RATs allow attackers full control of infected machines like they are sitting in front of it. The document goes on to discuss using a NO-IP account and DUC to host a RAT despite dynamic IP addresses. It provides details on what DarkComet is and does, then lists common RAT tools. Finally, it outlines many things a RAT can do on a remote system like keylogging, downloading/uploading files, and more. It concludes with a disclaimer that using RATs without permission would be illegal.
This document provides an overview of cyber crime, including its history, definitions, types, perpetrators, and prevention. It discusses how cyber crime involves the use of computers and the internet for illegal activities such as hacking, phishing, stalking, and fraud. The document also outlines classifications of cyber crimes like those against individuals, organizations, and society. It provides examples of specific cyber crimes and describes common cyber criminals like hackers, phishers, and hackers. The document concludes with recommendations for preventing cyber crimes through tools like antivirus software, firewalls, and user education.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
Nowadays mobile networks are the most dynamic part of critical communication infrastructures and the key instrument used to perform daily activities ranging from voice and text messaging to providing signaling for emergency services and critical infrastructure.
This document provides an overview of email forensics techniques and tools used in network forensics investigations. It discusses the typical architecture of email systems and protocols like SMTP, POP, and IMAP. Key points covered include email headers, the information contained in Received headers, and how an email travels from sender to recipient through various mail servers. Spoofing emails is also briefly explained. The document aims to introduce investigators to analyzing email evidence at different layers of the network and tools needed for forensic analysis of email messages and server logs.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
The keylogger software allows monitoring of keyboard activity on a target computer without the user's knowledge. The summarizes the steps to use a keylogger software:
1. Download and extract the keylogger software files.
2. Configure the keylogger by generating a server name and specifying settings like self-destruct timing, file icon, and binding to another file.
3. The keylogger will then covertly monitor and log all keyboard activity on the target computer without being visible to the user. The logs can be sent via email or other methods for the attacker to access the recorded keystrokes.
Keyloggers allow unauthorized surveillance of keyboard input, allowing an attacker to obtain passwords and sensitive information entered
Cyber crime is a growing issue as more financial transactions occur online. There are many types of cyber crimes including hacking, phishing, software piracy, and credit card fraud. Cyber criminals can be disgruntled employees, teenagers, or those seeking financial gain or revenge. Victims are often gullible, desperate, or inexperienced users. Uncovering digital evidence from things like hard drives, networks, and memory sticks is important to investigate cyber crimes which often happen across multiple countries. Prevention requires tools like antivirus software, firewalls, and being cautious about sharing personal information online.
The document discusses cybercrime in Bangladesh. It provides an overview of the history of cybercrime, common types of cybercrimes, cyber laws in Bangladesh and other countries, and cybersecurity technologies. It notes that cybercrime is increasing in Bangladesh, with most victims being women aged 15-25 facing cyber harassment. While law enforcement is trying to tackle the problem, the conviction rate for cybercrime in Bangladesh is only 3%. The document calls for recommendations to address cybercrime and increase cybersecurity.
The document discusses cyber crime and distinguishes it from conventional crime. Cyber crime involves unlawful acts where a computer is used as a tool or target. Common cyber crimes include hacking, theft of electronic information, email spoofing, computer viruses, and cyber terrorism against organizations. The reasons for cyber crime include the vulnerability of computers due to their storage capacity, easy accessibility, complexity, and potential for human negligence. Cyber criminals can include children, organized hackers, professional hackers, and discontented employees. The document also discusses different modes of committing cyber crimes like unauthorized access, denial of service attacks, and intellectual property violations.
The document discusses various security threats that exist on social networks, including phishing attacks, vulnerabilities in third-party applications, weak password security, cross-site scripting attacks, clickjacking, insecure frameworks, SQL injections, and DDOS attacks. It provides examples of each type of attack, such as phishing links that install malware, apps that access too much user data if hacked, passwords being easily guessed, malicious JavaScript that can be installed through photo tags, and privacy settings being exploited to view other profiles. The document emphasizes that with over a billion users exchanging personal information, social networks face many potential threats but that Facebook focuses heavily on security to prevent hacks of its own system.
Cyber crime - Kejahatan di Dunia Maya / InternetHendi Hendratman
Dokumen tersebut membahas tentang cyber crime dan upaya pencegahannya. Jenis cyber crime yang dijelaskan antara lain carding, domain name, hacking, data leakage, software piracy, hoax, dan lainnya. Dokumen juga menjelaskan teknik hacker seperti reconnaissance, scanning, gaining access, maintaining access, dan covering tracks. Untuk mencegah cyber crime, dianjurkan mengamankan password, mengenkripsi data, menggunakan antivirus dan firewall, memperbarui sistem secara berkala, menut
This presentation is based on the lectures delivered for students of B. Voc. (Semester 2 ) Computing Skills (TISS) at HMMRA, Vile Parle, Mumbai during January – February 2019
Contents of this presentation may also be useful to other students pursuing similar courses.
Firewall merupakan sistem yang dirancang untuk mencegah akses tak diinginkan ke dan dari jaringan internet dengan mengontrol, memfilter, dan memutuskan lalu lintas data berdasarkan aturan. Ada beberapa metode dan teknik yang digunakan firewall seperti packet filtering, stateful inspection, kontrol pengguna, kontrol layanan, dan arah kontrol. Jenis-jenis firewall meliputi packet filtering, NAT, circuit level gateway, virtual, application level gateway, transparent, dan hybrid firewall.
Email fraud takes many forms, including lottery and sweepstakes scams, work-from-home schemes, health and diet scams, credit repair scams, and vacation prize promotions. Phishing scams impersonate legitimate businesses and organizations to steal personal or financial information. Recipients are encouraged to click links and fill out forms, but should avoid providing any sensitive data or clicking unknown links in emails. Government agencies are also commonly impersonated in phishing attempts. Recipients should be wary of any emails promising prizes or financial gains that seem too good to be true.
This document provides a summary of cyber crime and security. It discusses the definition and history of both conventional crime and cyber crime. Some key differences between the two are that cyber crime involves the use of computers or digital technology as either a tool or target of criminal activity. The document also discusses reasons for cyber crime such as the vulnerability of computer systems, as well as categories of cyber criminals and common modes of committing cyber crimes like hacking, theft of electronic information, email bombing, and data manipulation.
Identity theft is one of the fastest growing crimes in America. It involves stealing someone's personal information like Social Security numbers or credit card numbers to assume their identity and open fraudulent accounts or make purchases. Victims can spend thousands of dollars and many hours resolving the issues. It is important to protect personal information, monitor accounts, and take action if identity theft is suspected. The government provides resources to prevent identity theft and assist victims.
This document discusses the importance of the English language for the present and future. It begins by providing background on why English is studied by over 1 billion people worldwide and its importance as a global language. The purpose of the paper is then stated as knowing the importance, applications, and reasons for English being used internationally. The paper goes on to discuss reasons why English is used globally including historical factors from British imperialism, its structured order, and the advanced development of the United Kingdom. It also outlines how English is important now for fields like business, media, and tourism. The conclusion is that English proficiency in Indonesia remains low but is important for jobs and opportunities, and that the role of English will continue growing in Indonesia.
Makalah ini membahas tentang cybercrime di Indonesia. Jenis-jenis cybercrime yang dijelaskan meliputi pengiriman dan penyebaran virus, pemalsuan identitas, penyebaran pornografi, pencurian data, pengaksesan data secara illegal (hacking), pembobolan rekening bank, perusakan situs, pencurian nomor kartu kredit, penyediaan informasi palsu, transaksi bisnis illegal, phishing, dan botnet. Undang-undang Indonesia dapat diterapkan untuk se
This document discusses remote access Trojans (RATs) and the DarkComet RAT in particular. It explains that RATs allow attackers full control of infected machines like they are sitting in front of it. The document goes on to discuss using a NO-IP account and DUC to host a RAT despite dynamic IP addresses. It provides details on what DarkComet is and does, then lists common RAT tools. Finally, it outlines many things a RAT can do on a remote system like keylogging, downloading/uploading files, and more. It concludes with a disclaimer that using RATs without permission would be illegal.
This document provides an overview of cyber crime, including its history, definitions, types, perpetrators, and prevention. It discusses how cyber crime involves the use of computers and the internet for illegal activities such as hacking, phishing, stalking, and fraud. The document also outlines classifications of cyber crimes like those against individuals, organizations, and society. It provides examples of specific cyber crimes and describes common cyber criminals like hackers, phishers, and hackers. The document concludes with recommendations for preventing cyber crimes through tools like antivirus software, firewalls, and user education.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
Nowadays mobile networks are the most dynamic part of critical communication infrastructures and the key instrument used to perform daily activities ranging from voice and text messaging to providing signaling for emergency services and critical infrastructure.
This document provides an overview of email forensics techniques and tools used in network forensics investigations. It discusses the typical architecture of email systems and protocols like SMTP, POP, and IMAP. Key points covered include email headers, the information contained in Received headers, and how an email travels from sender to recipient through various mail servers. Spoofing emails is also briefly explained. The document aims to introduce investigators to analyzing email evidence at different layers of the network and tools needed for forensic analysis of email messages and server logs.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
The keylogger software allows monitoring of keyboard activity on a target computer without the user's knowledge. The summarizes the steps to use a keylogger software:
1. Download and extract the keylogger software files.
2. Configure the keylogger by generating a server name and specifying settings like self-destruct timing, file icon, and binding to another file.
3. The keylogger will then covertly monitor and log all keyboard activity on the target computer without being visible to the user. The logs can be sent via email or other methods for the attacker to access the recorded keystrokes.
Keyloggers allow unauthorized surveillance of keyboard input, allowing an attacker to obtain passwords and sensitive information entered
Cyber crime is a growing issue as more financial transactions occur online. There are many types of cyber crimes including hacking, phishing, software piracy, and credit card fraud. Cyber criminals can be disgruntled employees, teenagers, or those seeking financial gain or revenge. Victims are often gullible, desperate, or inexperienced users. Uncovering digital evidence from things like hard drives, networks, and memory sticks is important to investigate cyber crimes which often happen across multiple countries. Prevention requires tools like antivirus software, firewalls, and being cautious about sharing personal information online.
The document discusses cybercrime in Bangladesh. It provides an overview of the history of cybercrime, common types of cybercrimes, cyber laws in Bangladesh and other countries, and cybersecurity technologies. It notes that cybercrime is increasing in Bangladesh, with most victims being women aged 15-25 facing cyber harassment. While law enforcement is trying to tackle the problem, the conviction rate for cybercrime in Bangladesh is only 3%. The document calls for recommendations to address cybercrime and increase cybersecurity.
The document discusses cyber crime and distinguishes it from conventional crime. Cyber crime involves unlawful acts where a computer is used as a tool or target. Common cyber crimes include hacking, theft of electronic information, email spoofing, computer viruses, and cyber terrorism against organizations. The reasons for cyber crime include the vulnerability of computers due to their storage capacity, easy accessibility, complexity, and potential for human negligence. Cyber criminals can include children, organized hackers, professional hackers, and discontented employees. The document also discusses different modes of committing cyber crimes like unauthorized access, denial of service attacks, and intellectual property violations.
The document discusses various security threats that exist on social networks, including phishing attacks, vulnerabilities in third-party applications, weak password security, cross-site scripting attacks, clickjacking, insecure frameworks, SQL injections, and DDOS attacks. It provides examples of each type of attack, such as phishing links that install malware, apps that access too much user data if hacked, passwords being easily guessed, malicious JavaScript that can be installed through photo tags, and privacy settings being exploited to view other profiles. The document emphasizes that with over a billion users exchanging personal information, social networks face many potential threats but that Facebook focuses heavily on security to prevent hacks of its own system.
Cyber crime - Kejahatan di Dunia Maya / InternetHendi Hendratman
Dokumen tersebut membahas tentang cyber crime dan upaya pencegahannya. Jenis cyber crime yang dijelaskan antara lain carding, domain name, hacking, data leakage, software piracy, hoax, dan lainnya. Dokumen juga menjelaskan teknik hacker seperti reconnaissance, scanning, gaining access, maintaining access, dan covering tracks. Untuk mencegah cyber crime, dianjurkan mengamankan password, mengenkripsi data, menggunakan antivirus dan firewall, memperbarui sistem secara berkala, menut
This presentation is based on the lectures delivered for students of B. Voc. (Semester 2 ) Computing Skills (TISS) at HMMRA, Vile Parle, Mumbai during January – February 2019
Contents of this presentation may also be useful to other students pursuing similar courses.
Firewall merupakan sistem yang dirancang untuk mencegah akses tak diinginkan ke dan dari jaringan internet dengan mengontrol, memfilter, dan memutuskan lalu lintas data berdasarkan aturan. Ada beberapa metode dan teknik yang digunakan firewall seperti packet filtering, stateful inspection, kontrol pengguna, kontrol layanan, dan arah kontrol. Jenis-jenis firewall meliputi packet filtering, NAT, circuit level gateway, virtual, application level gateway, transparent, dan hybrid firewall.
Email fraud takes many forms, including lottery and sweepstakes scams, work-from-home schemes, health and diet scams, credit repair scams, and vacation prize promotions. Phishing scams impersonate legitimate businesses and organizations to steal personal or financial information. Recipients are encouraged to click links and fill out forms, but should avoid providing any sensitive data or clicking unknown links in emails. Government agencies are also commonly impersonated in phishing attempts. Recipients should be wary of any emails promising prizes or financial gains that seem too good to be true.
This document provides a summary of cyber crime and security. It discusses the definition and history of both conventional crime and cyber crime. Some key differences between the two are that cyber crime involves the use of computers or digital technology as either a tool or target of criminal activity. The document also discusses reasons for cyber crime such as the vulnerability of computer systems, as well as categories of cyber criminals and common modes of committing cyber crimes like hacking, theft of electronic information, email bombing, and data manipulation.
Identity theft is one of the fastest growing crimes in America. It involves stealing someone's personal information like Social Security numbers or credit card numbers to assume their identity and open fraudulent accounts or make purchases. Victims can spend thousands of dollars and many hours resolving the issues. It is important to protect personal information, monitor accounts, and take action if identity theft is suspected. The government provides resources to prevent identity theft and assist victims.
This document discusses the importance of the English language for the present and future. It begins by providing background on why English is studied by over 1 billion people worldwide and its importance as a global language. The purpose of the paper is then stated as knowing the importance, applications, and reasons for English being used internationally. The paper goes on to discuss reasons why English is used globally including historical factors from British imperialism, its structured order, and the advanced development of the United Kingdom. It also outlines how English is important now for fields like business, media, and tourism. The conclusion is that English proficiency in Indonesia remains low but is important for jobs and opportunities, and that the role of English will continue growing in Indonesia.
Makalah ini membahas tentang cybercrime di Indonesia. Jenis-jenis cybercrime yang dijelaskan meliputi pengiriman dan penyebaran virus, pemalsuan identitas, penyebaran pornografi, pencurian data, pengaksesan data secara illegal (hacking), pembobolan rekening bank, perusakan situs, pencurian nomor kartu kredit, penyediaan informasi palsu, transaksi bisnis illegal, phishing, dan botnet. Undang-undang Indonesia dapat diterapkan untuk se
Dokumen tersebut membahas tentang cybercrime dan cyberterorisme, termasuk definisi, contoh, karakteristik, modus operandi, motif, pelacakan pelaku, aspek keamanan seperti kerahasiaan data, integritas, ketersediaan, dan non-repudiation, serta cara-cara antisipasi.
The document discusses arrays and matrices in Pascal programming. It defines arrays as collections of related data elements that all have the same data type. Matrices are two-dimensional arrays that have rows and columns. The document shows how to declare, initialize, and fill arrays and matrices using loops. It also demonstrates accessing individual elements and printing the contents.
Makalah ini membahas tentang etika profesi teknologi informasi khususnya terkait cyber crime dan cyber law. Cyber crime dijelaskan sebagai perbuatan melawan hukum yang memanfaatkan teknologi informasi seperti internet, dengan motif ekonomi atau intelektual. Jenis cyber crime meliputi pencurian akun, deface, virus komputer. Sedangkan cyber law merupakan aturan hukum untuk menangani cyber crime seperti privasi, hak cipta, dan yurisd
Makalah ini membahas tentang cybercrime dan cyberlaw. Cybercrime adalah kejahatan yang dilakukan melalui internet, seperti pencurian data, penipuan, dan kerusakan sistem komputer. Cyberlaw adalah hukum yang mengatur aktivitas di dunia maya seperti hak cipta, privasi data, dan transaksi elektronik. Makalah ini juga membahas jenis cybercrime serta upaya yang ditempuh Indonesia dalam membuat peraturan tentang cyberlaw.
The document discusses the importance of education for the future of a nation. It states that education plays a major role in shaping the personality, abilities, and skills of a nation's citizens so they can face challenges in an increasingly competitive global environment. It also argues that improving the education system through reform is necessary for producing graduates who can meet the uncertainties of the future. Finally, it concludes that education is very important and inseparable from human life, and that a nation's development and progress depends greatly on the quality of its education system and human resources.
Ringkasan dokumen tersebut adalah:
Makalah ini membahas tentang cyber crime di Indonesia, termasuk jenis, penyebab, dan contoh kasus cyber crime serta cara penanganannya. Jenis cyber crime yang dijelaskan antara lain pencurian akun, deface, virus dan trojan horse. Kasus yang dibahas adalah penipuan dengan membuat situs palsu mirip situs resmi perusahaan. Upaya pencegahan meliputi peningkatan keamanan jaringan dan kesadaran
1. The document defines a website as a collection of related web pages that share a common domain name and are published on at least one web server. Websites can be public and accessible via the internet or private on a local network.
2. It discusses positive effects of websites such as vast market coverage, global accessibility, easy access to information, and quick updates. Search engines are software that searches the world wide web and presents results. Positive effects include access to vast information, but negative effects include spam and privacy issues.
3. Examples of websites discussed are Detik.com and Crunchyroll. Examples of search engines are Google and Bing. The conclusion states that as users we must be selective in
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)
Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.
Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security
https://sites.google.com/site/ijcsis/vol-18-no-6-jun-2020
This document discusses the motivations behind cybercrimes and categorizes cyber attackers. It identifies the main categories of cyber attackers as insiders and outsiders, with insiders further divided into disgruntled employees, financially motivated insiders, and unintentional insiders. Outsiders include organized attackers such as terrorists, hacktivists, nation states, and criminal organizations, as well as hackers and amateurs. The motivations for cyber attacks are identified as political, economic, and social motivations. The risks from cyber attacks arise from inadvertent actions, deliberate harmful actions, and inaction. Understanding the motivations and categories of cyber attackers can help address the operational cybersecurity risks they pose.
What are cybercrimes? How cybercrime works?FarjanaMitu3
Today is the time of the internet, computers, and digital technology.
And, in this age of the Internet, we spend much of our lives online. However, there are many reasons why the internet is so fun and popular.
Getting the latest news through various websites, talking to our loved ones from anywhere, chatting and communicating via video call, shopping online through the internet, getting accurate information on any subject, watching videos for entertainment, playing online games, and online bills. Today it has become possible to do almost all kinds of work like payment easily through the internet.
Honestly, I think the internet is a contribution to us
Simply, if there is no complete internet for one day, it can have a lot of impact on public life.
At any given time, billions of people are active on the Internet and use various websites or applications to access the Internet on their mobile phones or computers.
In this case, there are many people who use computers and the internet to steal their personal information, cheat, and extort money from these "online traffic" or "online internet users" through various illegal means. More other crimes.
Thus, the crimes of cheating, privacy, and data theft or misuse of data online through a mobile, computer, and internet are called cyber crime or cybercrime. And, those who commit this kind of cybercrime are called cybercriminals. There are different types of cybercrime on the internet. This means that cybercriminals can deceive you through various illegal means online. You may be the next victim if you are not careful when using the Internet.
What are cybercrimes?
This document provides an overview of cyber crime including its history, types, and examples. It begins with a taxonomy that defines common cyber crimes like computer intrusions, viruses/malware, and fraud. The document then discusses challenges in enforcement given the rise of organized cyber criminals operating across borders. It analyzes specific cases of cyber crime in India and provides conclusions on continuing issues and the need for improved prosecution of cyber criminals.
This document is a technical report submitted by Nikhil Kumar Chaudhary on the topic of cyber crime and security. It includes an abstract, introduction, sections on what cyber crime means and different types of cyber crimes. It also discusses the threats of cyber crimes in India, trends in India, and ways to tackle cyber crimes. Tables and figures are included to illustrate country distributions of cyber crimes and the rise of cyber crimes in India.
Cybercrimes take many forms and are increasingly common as internet usage rises. Some key cybercrimes discussed include cyber bullying, cheating by personation, distribution of obscene material, offensive messages, cyber defamation, cyber stalking, phishing, hacking, skimming, identity theft, and spreading of viruses. It is important for internet users to be aware of these risks and take appropriate precautions like using antivirus software and strong passwords to protect themselves from becoming victims of cybercrime.
Cyber crime has increased with the growth of internet usage. While the internet initially aimed to improve communication and research, it now enables crimes to be committed remotely from a computer. Some criminals began exploiting the internet for illegal acts in the 1980s, termed "cyber crimes". These can include hacking, theft of information, computer viruses, and other online offenses. While laws have been implemented to address cyber crimes, legislation alone cannot eliminate all criminal acts. Continued education of legal rights and responsibilities, as well as stringent enforcement of laws, are needed to help control cyber crime.
Cybercrimes are crimes that involve computers and computer networks. This document discusses jurisdiction as a major issue with cybercrimes due to the borderless nature of the internet. It notes that while the Information Technology Act 2000 allows for extra-territorial application of the law, provisions are needed for mutual legal assistance between law enforcement agencies internationally regarding sharing of cybercrime evidence and materials. The document also briefly mentions that cybercrimes in India are classified according to the computer networks involved and type of illegal act committed.
1. The document discusses various types of cyber crimes and frauds, providing definitions and examples. It covers topics like social engineering, phishing, cyber stalking, ransomware attacks, and viruses.
2. Types of fraud discussed include COVID-19 related scams, synthetic identity theft, and cyber warfare. Social engineering, phishing emails, SMS phishing ("smishing"), and phone phishing ("vishing") are described as common techniques used.
3. Details are given on how different cyber crimes are carried out, including stages of cyber attacks, how synthetic identities are created, and how viruses and trojans can infiltrate systems covertly. A wide range of attacks targeting individuals and organizations are outlined
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
1. This document provides an overview of cyber crimes and fraud, defining key terms like fraud, cyber crimes, and social engineering.
2. It describes common types of cyber crimes such as phishing, smishing, vishing, and synthetic identity theft. Cyber stalking, hacking, viruses, and ransomware attacks are also outlined.
3. Safety tips are provided to help prevent people from becoming victims of cyber crimes, including using strong passwords, avoiding public WiFi for financial transactions, and reporting any suspected criminal activity to the police.
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain ac.
Computer hackers are defined as computer experts who try to breach security systems to find weaknesses. There are two main types - intelligent adolescents who gain knowledge through reading and spending excessive time learning programming, and experienced hackers who cause damage. Cyber attacks in Estonia in 2007 crippled key infrastructure through distributed denial-of-service attacks. The attacks were anonymous and fast-acting, bringing aspects of the definition of cyber war. Cyber crime is a growing issue, including identity theft and money transfer scams online.
This document provides an overview of cyber ethics topics including:
- An introduction to cyber ethics and its history dating back to the 1940s.
- The importance of teaching cyber ethics to protect personal information, promote fair competition, and encourage responsible internet use.
- Common cyber ethics issues like copyright infringement, cyberbullying, hacking, and understanding appropriate online behavior.
- Examples of cyber ethics rules and the do's and don'ts of responsible internet use.
- Frequently asked questions about why cyber ethics is important and what the need is for teaching proper cyber ethics.
This document discusses the growing issue of cybercrime in Bangladesh, particularly among youth. As internet and technology usage increases, so do various forms of cybercrime like hacking, phishing, cyberbullying, and the spreading of misinformation. Many youth are victimized on social media and fall prey to financial crimes. While laws and enforcement agencies have been established to address cybercrime, challenges remain like a lack of skills and resources within law enforcement. The document calls for greater public awareness, strengthened laws and policies, and international cooperation to curb cybercrime and protect Bangladesh's digital progress and national security.
The document discusses the history and types of cybercrimes. It begins by defining cybercrime as unlawful acts where a computer is used as a tool or target. Two main types are discussed: computer as target (hacking, viruses, DOS attacks) and computer as weapon (cyber terrorism, fraud). The document then covers technical aspects of various cybercrimes like unauthorized access, trojans, viruses/worms, and denial of service attacks. It concludes with a brief history noting the first recorded cybercrime occurred in 1820 and early viruses/spam emerged in the 1980s as personal computers became more common.
Cyber crimes involve any illegal activity carried out using computers or the internet. This document discusses the meaning, nature, theories, and classification of cyber crimes. It provides examples of different types of cyber crimes against individuals, organizations, and society, such as cyber bullying, cyber stalking, phishing, and cyber terrorism. Theories discussed include differential association theory, social learning theory, and routine activity theory. Cyber crimes are challenging to address due to their global nature, anonymity of criminals, and lack of physical evidence.
Similar to Makalah cyber crime dalam Bahasa Inggris dan Indonesia (20)
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
1. (WhatsApp Result, The Doctors at the General Hospital of Malang Snared of ITE Law)
created by :
Eko Waluyo : 12135828
Kornelis Zalukhu : 12132942
Dhika Fauzi : 12135473
Wiji Lestari : 12137694
Lilis Sumiati : 12136729
Zena Oktavia : 12135413
Class : 12.4C.06
Akademi Manajemen Informatika dan Komputer
BINA SARANA INFORMATIKA (BSI)
Jakarta - 2015
2. i
PREFACE
Praise God Almighty for all the abundance of His mercy and grace so that we
can complete the preparation of this paper in the form and content very simple. The
paper explains that we made on "Cyber Crime" by lifting a case between
Antarestawati and Khoiriatul Masruroh which originated from uploaded photos
through social networks that eventually threatened criminal penalties ITE Law. We
did not forget to say thank you to Mr. Oktavian as lecturers of EPTIK subjects that
have been guiding and directing us in the preparation of this paper also to the parties
that have been active or indirect role in the continuity of the preparation of this paper.
Our hope that this paper helps increase knowledge and experience for the readers.
The paper is still far from perfection because of the limitations of our
knowledge and ability. So that, we expect it to readers to provide inputs that are build
to perfection this paper.
Bekasi, May 2015
Author
3. ii
TABLE OF CONTENTS
PREFACE .............................................................................................................. i
TABLE OF CONTENTS......................................................................................... ii
CHAPTER I. INTRODUCTION ....................................................................... 1
1.1 Background............................................................................ 1
1.2 Scope ..................................................................................... 1
CHAPTER II. GENERAL KNOWLEDGE CYBERCRIME.............................. 2
2.1. Understanding Cybercrime............................................... 2
2.2. Understanding Cyberstalking ............................................... 2
2.3. Criteria Cyberstalking .................................................... 3
2.4. Action and Purpose Cyberstalker...................................... 3
2.5. Target Cyberstalking............................................................. 4
2.6. CyberStalking & Social Networking ................................ 5
CHAPTER III. CASE STUDY.............................................................................. 7
CHAPTER IV. CLOSING .................................................................................... 9
4.1. Conclusion ............................................................................ 9
4.2. Advice ................................................................................... 9
CHAPTER V. LIST OF REFERENCES............................................................. 11
4. 1
CHAPTER I
INTRODUCTION
1.1 Background
Current computer technology has become an integral part of community
life, its users are also from children to adults. With the rapid advancement in
technology, threat or crime was more prevalent.
Cybercrime is a term that refers to criminal activity with a computer or computer
network into a tool, target or scene of the crime. Many examples of crime in the
virtual world where the computer as a tool, for that we as users should be more
careful in using this technology so as not to get stuck in the crime.
Globalization brings people in a world without borders to the flow of
information superfast (information superhighway) worldwide. Globalization of
the world sparked a revolution (rather than evolutionary) in the field of ICT
(Information and Communication Technology).
The challenges of globalization on the development of ICT for young people are
most concerned about is Social Networking Sites.
1.2 Scope
In writing this paper, we discuss a glimpse of cyber crime in general and
more detailed on cyberstalking to facilitate the discussion and that the material
that we describe more specific.
5. 2
CHAPTER II
GENERAL KNOWLEDGE CYBERCRIME
2.1. Understanding Cybercrime
"Cybercrime" is a criminal act committed on Internet technology
(cyberspace), whether that attack public facilities in cyberspace or private
ownership. In techniques such offenses can be divided into off-line crime, semi
on-line crime, and cybercrime. Each one has its own characteristics, but the main
difference between them is the rapport with the public information network
(internet).
Cybercrime can be defined as the unlawful act committed by using the Internet
based on the sophistication of computer technology and telecommunications.
The Prevention of Crime and the Treatment of Offlenderes in Havana, Cuba in
1999 and in Vienna, Austria in 2000, says there are two terms that are known:
1. Cybercrime in the narrow sense is called computer crime, is illegal
behavior / violate that directly attack the computer systems security and /
or data that is processed by a computer.
2. Cybercrime in the broad sense is called computer related crime, is illegal
behavior / violate related to computer system or network.
From some of the above, cybercrime formulated as an unlawful act committed by
using computer networks as a tool / instrument or computer as an object, either
for benefit or not, to the detriment of the other party.
2.2. Understanding Cyberstalking
"Cyberstalking" is the use of the Internet or other electronic device to
harass a person, group, or organization.
Cyberstalking is the latest form of criminal behavior involving threats persistent
or unwanted attention using the internet and other means of communication
computer.
6. 3
Cyberstalking can include harassing, threatening, excessive spamming,
harassment or live chat known as chat, inappropriate messages on a message
board or guest book online, electronic dangerous viruses are sent, unsolicited
emails and electronic identity theft. Including false accusations, monitoring,
making threats, our identity theft, damage to data or equipment, or collecting
information in order to harass. Cyberstalking action can be very dangerous and
frightening, especially for children and adolescents. This is because one's personal
identity information is not known on the Internet provides an opportunity for the
stalker (talker) to roam freely carry out the action. Cyberstalker (actors
cyberstalking) and often extreme action because they feel can not be arrested or
punished because it is difficult to detect.
2.3. Criteria Cyberstalking
How to identify cyberstalking?
When identifying cyberstalking "in the field", and especially when considering
whether to report it to any authority of law, the following features or
combinations of features can be considered to characterize the situation lurking
right: malice, premeditation, repetition, sorrow, obsession, revenge, no legitimate
purposes, personally directed, ignoring warnings to stop, harassment, and threats.
If only one time someone mocked in cyberspace, it is not called a bully or talker.
We have to see what its context, whether in activities kidding between friends,
discuss, it is also to be seen, if they were just mock each (joke), not called
cyberstalking.
2.4. Action and Purpose cyberstalker
2.4.1 Action Cyberstalker
False accusations
Many cyberstalkers try to damage the reputation of the victim. They
post false information about them on the site and certain websites. They
may set up their own website, blog or page the user for the purpose of
7. 4
this crime. They post about the alleged victim to a newsgroup, chat
room or other sites that allow community contribution.
Attempts to collect information about the victims
Cyberstalkers may engage with their victim's friends, family and co-
workers to obtain personal information. They can monitor the
information on the Internet, or rent a private detective. They will
frequently monitor the online activities of the victim and attempted to
trace their IP address in an attempt to gather more information about
their victims.
Encouraging others to harass victims
Many cyberstalkers trying to involve third parties in this harassment.
They may claim the victim has impaired the stalker or his family in
several ways, for example by posting the victim's name and phone
number to encourage others to join disturb the victim.
The attack on the data and equipment
They may try to damage the victim's computer by sending virus.
Ordering goods and services
They ordered goods or magazine subscription on behalf of the victim. It
often involves a subscription to perform acts of pornography or order a
sex toy is then sent to the victim.
Set up meetings
The youths face a high risk, especially against cyberstalkers are trying to
arrange a meeting between them.
2.4.2. Purpose Cyberstalker
Supervise the victim's online activities via spyware, which is a
program designed to spy on someone's computer or mobile phone
remotely.
Keep track of the location of the victim using GPS technology
8. 5
Intercept with a cell phone call or text message someone
Impersonate victims
Supervise and watch the activity of the victim through a hidden
camera.
2.5. Target Cyberstalking
1) Man
2) Woman
3) Intimate Partner
4) Mass
5) Company
2.6. CyberStalking & Social Networking
Along with Facebook, another popular sites such as Path, WhatsApp,
Line has available cyberstalkers to see updates on their prey and in some cases,
allowing them to see where their victims. The latest application software utilizes
global positioning (GPS) technology, such as Foursquare, making the action more
easily find their victims. Check the dangers of GPS technology and its correlation
with cyberstalking.
Cyberstalking is an act of spying or stalking the privacy of internet users via
technology including computers, cell phones, cameras and other technologies.
Cyberstalking could eventually lead to acts of harassment, seduction, vulgar or
threatening messages, slanderous or unwanted messages. His motives are diverse,
ranging from revenge, anger, just for fun or want to control someone.
The fact that cyber stalking does not involve physical contact may create
the misperception that it is more dangerous than physical stalking. This is not
necessarily true. With Internet functions that become an integral part of our lives
private, professional stalkers can take advantage of the ease of communication as
well as increased access to personal information. In other words, the stalker may
be unwilling or unable to confront a victim in person or on the phone, he may
9. 6
have little hesitation sending harassing or threatening electronic communications
to a victim. Eventually, such as physical abuse stalking, threats online may be the
beginning to more serious behavior, including physical violence.
10. 7
CHAPTER III
CASE STUDY
(Antarestawati vs Khoiriatul Masruroh)
Antarestawati Acip Tjokro is a doctor in charge of Regional General Hospital
(Hospital) Kanjuruhan, Malang, East Java, was reported to the police. The cause, the
31-year-old doctor was in the app WhatsApp upload photos without their permission,
Khoiriatul Masruroh.
This case began when Antarestawati upload photos selfie Khoiriatul WhatsApp
group, which consists of a number of hospital employees Kanjuruhan. Photos
Khoiriatul the black shirted football club Paris Saint German was given posts "Buka
Lapak... 150 ewu (ribu)/ jam." Mean “Open Stalls ... 150 thousand/hour”
Khoiriatul Masruroh said initially he did not know his picture in the group
Antarestawati WhatsApp installed. He knew of one of his friends.
"Meanwhile, my photo uploaded to the WA group given writings Open Stalls 150
thousand / hour, it is not a joke. And I consider it seriously in harassing me, when I'm
with Dr. Antarestawati there was never a problem before," he said.
"This seems to me a slut that can be bought with money one hundred and fifty
thousand rupiahs per hour," he said.
Feeling harassed, he took the case to the authorities. He hoped that the case could be
prosecuted.
"The uploaded photos were given posts which was considered insulting Khoiriatul
Masruroh, victims who feel abused later reported the matter on March 12 last," said
Criminal Police, Adj Adj Malang Police Commissioner Wahyu Hidayat as confirmed
in Malang, Sunday (15/03/2015)
11. 8
In this case, the police use Law No. 11 of 2008 on Information and Electronic
Transactions (ITE) Article 27, including the violation of decency and defamation. If it
violates the doctor could be convicted of imprisonment not exceeding 6 months, or
fined up to Rp 1 billion.
Khoiriatul and Antarestawati had visited the Malang police station to undergo
examination. Both come together in a car driven by her husband Antarestawati.
However, both are now reconciled with stamped letters to Rp 6,000. There is also a
signature of the Head of Sub Division of Medical Records, Evapor Riyanto and Vice
Director of Administration and Finance, Mahila Surya Dewi.
"Khoiriatul have considered with himself and his family. Then unplug the report
states. There is no compulsion on the other party" Head of Unit PPA Iptu Sutiyo,
Tuesday (03/24/2015).
12. 9
BAB IV
CLOSING
4.1. Conclusion
Cyberstalking is the use of the Internet or other electronic device to harass a
person, group, or organization.
Cyberstalking is the latest form of criminal behavior involving threats
persistent or unwanted attention using the internet and other means of
communication computer.
4.2. Advice
1. Use Internet services wisely and be careful in any share to the internet, let
alone personal nature. Despite what was sent was intended only for
certain people to believe, the opportunity to spread the content of private
public space is too big. Once a spread content out on the internet, it is
difficult to remove it again because it is scattered everywhere.
2. Let be a good internet users. Teach our youth in order to treat others well,
so that they are treated others the same way.
3. Do not reactive. If someone is less feasible on the internet, and our youth
know, recommend that they do not easily respond to such action. Mutual
applies not feasible will only prolong the problem, and ultimately led to a
chain of cyber stalking continued. Ask them to ignore something that is
considered to be less comfortable.
4. Report unworthy behavior. If you find the perpetrators cyberstalking on
the internet, ask our youth to report to an adult who understands the
problem. If in school, can be reported to the teacher, or to parents if
teachers can not give instructions to resolve it. If necessary, report it
13. 10
online to the parties that might be helpful. Even when it's outrageous,
teach them to report unpleasant acts to the service providers.
14. 11
CHAPTER V
LIST OF REFERENCES
http://news.liputan6.com/read/2191417/akibat-whatsapp-dokter-di-rsud-malang-
dijerat-uu-ite
http://www.tribunnews.com/regional/2015/03/25/kasus-dokter-dan-resepsionis-
cantik-di-malang-akhirnya-damai
http://daerah.sindonews.com/read/977125/23/unggah-foto-selfi-dokter-rsud-malang-
dilaporkan-ke-polisi-1426490167
http://regional.kompas.com/read/2015/03/16/15061471/Unggah.Foto.Cewek.di.Grup.
WhatsApp.Dokter.Ini.Terancam.UU.ITE
http://id.wikipedia.org/wiki/Cyberstalking
http://id.wikipedia.org/wiki/Kejahatan_dunia_maya