SlideShare uma empresa Scribd logo
1 de 8
ASSIGNMENT QUESTION

                     CYBER CRIMES IN MALAYSIA AND U.S.A.:

                       WHAT SHOULD WE DO IN MALAYSIA?



1. INTRODUCTION

- In pursuit modernity current now, Malaysia always expanding as a country that is developed
towards year 2020. For realise that Vision 2020, various efforts that has been undertaken by
government in pass over modernity current so Malaysia continue to developed rapidly
parallel with other developing country. Hence, use of modern technology played an important
part. So exist new generation known as cyber society.

       Internet usage also unable run for achieve this goal. Malaysia itself generally had
appropriated budget that is large to build area of Multimedia Super Corridor (MSC) that high-
tech and rapid developing.Here there was various investments from within and overseas was
being conducted for economic development of the country. Hence, this world usage was very
important.

        However, in achieving this desire, there are still a few society do not know or a lack
of knowledge related internet.Due to this technological sophistication and knowledge
constraint, many society that cheated in this cyber world bring about cybercrime that may not
be realized. Situation this difficult to be prevented because cybercrime carried out in world
which encompasses borderless world. However, the implication can in see in nature real. My
writing will discuss with much further related this issue.

        According to KamusDewanBahasa Dan Pustaka (EdisiEmpat), crime bring act
meaning or evil (such as steal, rob, murder and others) with no beside law or wrongful act
(beside law) or kriminil act. As phrase example of use in sentence, police consider the matter
as a criminal act that is determined. While cyber meaning on the other hand is everything
related to internet. For example internet like giant market that discover buyers and sellers in
cyberspace.

        Generally cybercrime may be classified as an act that is wrong or evil that carried out
through internet which is known as cyber world. Crime this very difficult dam and haunt the
authorities in eradicating this cybercrime.

        There is no definition that right that can imagine cybercrime. Some parties give
definition “cybercrime” are referring to “computer crime”. This based on computer's capacity
capable of discharging conventional criminal activities such as fraud, theft, extortion, and
invasion which could cause adverse impact on individual property or organization.

       According to Donn B. Parker, a researcher in computer crime and security to from
SRI International California, computer crime definable as any performance that have the
intention and associated with computer through any way and creating victim suffering or can
cause suffering, loss and continuously. This statement is supported by Department of
JusticeU.S.A which said that computer crime is any illegal activity use computer
technological knowledge as tool to realize.



2. CONTENT


2.1 Classifications Cybercrime

- All computer usage level is always encounter with crime activity. Whether as victim to
crime or equipment to crime or both. Input operation, data processing, output operation and
data communication was invoked closely for purpose that is unhealthy. Our cyber type of
crime that is usual listen and categorised as following:

1) Fraud
- Phishing namely impersonated legal website and consequently persuade victim clicks link
through which in turn e-mail will be bringing with consumer confidential information.
Usually Phishing carried out through email or short message and usually direct consumer to
pocket details in certain webpages, however telephone relationship also have been used
before. Phishing is social an example engineering technique that used to deceive consumer.

2) Damage or upper modification programme or computer data.
- Refering to software that designed to escape or damage computer system unauthorized
clearly from owners. This term often used by computer professional class as umbrella term to
code forms software that is able detrimental to computer without the consumer knowledge or
most do not upset that consumer privacy.

        Most usual computer user still not used with that term and mostly never used. On the
other hand, computer virus term often used including in the media announce to reflect all pest
types of software, although not all malware is computer virus. Other term that were created
for pest software is malicious software (badware), the possibility due to anti-malicious
software.

       Software regarded as based on malware based on inventor purpose presumption and
not based on certain characteristics. It including computer virus, computer worm, horse
Trojan, most rootkit, spyware (spyware), advertisement software (adware) cheating, and
malicious software and that unwanted other. Legal, pest software sometimes regarded as
computer pollution.

3. Information theft.
- In Internet, there were some unhealthy activity. Among them wasidentity theft incident. It
is crime which is done by certain parties where they steal personal data and later lodged
purchase by using other person's name.
Criminal involved may be solicited and receive credit card on other person's name, or
cheating identity by convince online seller that he is true owner something data. That seller
are going to sell the product and applied cost to others.

        Incident this will be trouble you those involved and would be destroying reputation,
credit card record that is good and creating you facing financial problems that should not. We
understand that personal data theft incident not only occur in cyberspace,in fact in real life
also this incident happen.

4. By void access on system
- Computer intrusion was upper access computer system without state or imagine that
computer system owner's permission. Individual which involved with this activity known as
computer intruders and had powerful interests to break security system that there was in that
computer. Intruder can obtain by access control by using the computer in his own house or
office that connects to network telecommunication. Desire to get by void access upper
computer system may be obtained because some motive or purpose. Among them just
because curious, such as which done by hackers (computer intruders) until computer sabotage
or espionage.

       By void access or without intention by individuals that were not allowed by owners or
system administrator will be brought before as crime behavior. By void access create
opportunity to produce in addition to data damages that unintended, data collision or valuable
information theft.

        In the refractivity access can be implemented through control location during
telecommunication network because either between many reason. Intruder will probably
capable to cash in on from weakness of security system to get access or can get back channel
in security measure or procedure. Usually it also done by obtaining password to enter into
something system.

        The usual password protection not a method that is safe to protect system from access
by individuals that were not allowed. This is because, in the refractivity, computer intruders
can overcome this protection easily him through one of three methodologies. If computer
intruders afford to get keyword access truth. Then, Trojan software Horse will be placed to
get other keyword for other users.

        Usually this type software can operate continuously with security system that is
present and a bit hard to be detected. Eventually, computer intruders get software to get
keyword that had been stolen through control access. Third method that commonly used to
achieve system-is "trapdoor" where access that were not allowed reached through point
access, or trapdoor that created for particular purpose such as to keep something system.



5. Copy by void software.
- Piracy (or copyright violation) mean material utilisationprotege copyright law without
permission, so violate either natural owner exclusive right copyright, such as authority to
reissue or conduct work that in copyright, or produce works products that based on work that
in the copyright.

6. Get rich quick scheme
- Get rich quick scheme is a scheme where certain amount of money will be deposited or
invested to organizer of get rich quick scheme with promise and condition that deposit money
that will be returned back with interest or profit that promised for money that is deposited
usually higher from what offered by licensed finance institutions. There is various get rich
quick scheme type, among them is Skim pyramid and Skim Ponzi.

        In Malaysia get rich quick scheme that is most famous is Pak Man Telo scheme. In
that scheme beginning, organiser used money deposit received from new depositor to pay
return or depositor capital predecessor. In the mass, get rich quick scheme organisers not
investing deposit received into investments or industry that cause profit that is same or
higher.

        Due to this, they cannot continue to bear return payment that is high to investor that is
present. If no deposit recently accepted by organiser or this scheme cancelled, it would be
failing and investors or depositor will lost their money.

      Between get rich quick scheme that there was in Malaysia is Pak Man Telo,
LabuPeram (around 1980 an), LinggamTelo (1990 Klang Valley), Skim 350 (1980 an Kulim,
Kedah), Platinum Lane SdnBhd (PLSB) (1991 Kulim Kedah), and Sri Emas Enterprise.

7. Hacker
- Hacker is one that create and modify computer software and hardware including computer
programming, administration and business related to security. This term usually carry strong
connotation, but may be good or bad depend on to cultural context.

        In computer programming, hacker was a programmer that hack or achieving goals by
use one modification serial to exploit or extend code or source. Hacker was the person which
specialises in work related computer systems security mechanism and network. Even though
it including those try to strengthen that mechanisms, it more often used, are mainly in mass
media, to consult to those are trying to get in pass that mechanisms.

        In fields different techniques, hacker also meant people which made things function
outside limit shows through their technical skill such as hardware hacker or reality hacker. In
hacker culture, hacker is one that has attained certain social status and known among that
cultural expert for his commitment on cultural value and technical know-how certain amount.

8. Virus transmission
- Computer virus was the name that taken from biological virus, is computer program that
able copy himself and infecting computer unauthorized or consumer knowledge. However the
simple virus word used to refer to various pest types of software that is different. Virus
original may be modifying the copy or copy itself that modify himself, as in metamorphic
virus. Virus only diffusible when the host reach to different computer, for example through
network or portable intermediary such as floppy disk, compact disc or flash drive USB. Apart
from that, virus also could be spread by infect file in network file system or any filing system
that achieved different computer.

         Some virus designed to be affected computer by damage program, wipe out file, or
formatting again hard disk, while viruses that is other designed not to damages any, but only
to change self and perhaps to push the existence through text broadcasting, video, or audio
message. Although virus that is second harmless, it also can cause a problem to computer
user because it swallowing computer memory that used by program that is legal. Due to this,
it often causing action that uncertain and could result in system failure. Apart from that, many
virus also contains bug which could cause system failure and loss of data.

         The occasionally computer virus confounded with computer worm and Trojan. Both
this differ with respect to that computer worm could be spread to different computers without
need evacuate as part of host file, while Trojan is file that seemingly harmless until
implemented. Contrasts with virus, Trojan also excludes the code into computer files that is
other.

        Most personal computer currently connected with internet and local area network
thereby, facilitate virus transmission. It cash in on that administered by network service such
as World Wide Web's systems, e-mail, and file sharing to spread thereby, obscure difference
between virus with computer worm. Furthermore, some resources use terminology alternative
that define virus as any form self reproduction malicious software.



2.2 Compares Cybercrime in Malaysia and USA

- As much as 8,090 criminal case cyber reported in this country in two months time this year
compared 3,064 cases during last year. CyberSecurity Malaysia chairman, Jeneral (B) Datuk
Seri Mohd. Azumi Mohamed said, increase more 100% very worrying and it could be
generating new threat on otherwise national security dam. He stresses, among the causes that
increase is consumer attitude that not considerate on current security surfing Internet.

       “We will increase awareness campaign in ensuring cyber security so that public and
student unexposed to danger when surfing Internet,” he said in Perak Wifi launching
ceremony and KarnivalSiber 2011 by MenteriBesar, Datuk Seri Dr. ZambryAbd. Kadir here,
today.

       Also present Perak Chief Executive Officer, Dr. Ahmad KamilMahmood.
Mohd.Azumi said, as agency that accountable for in matters related cyber security,
CyberSecurity take seriously that development and drafting specific plan to handle.
He said, most people unconscious they are exposed to cyber threat including attack by
hacker, virus threat and password stolen when surfing Internet.

        In accordance with that , he ask consumer so that more cautious and be careful to
avoid their personal information invaded when using Internet.
(Utusan Online - domestic, April 2, 2011)
Computer security firm, Symantec report about two-thirds from Internet users in the
world become cyber crime victim. According to cybercrime survey report Norton, consumer
in China occupying highest position become victims when 83% users attacked computer
virus, credit card forgery, identity fraud and various other criminal on the Internet. Brazil and
India occupying second position with 76%, while United States on the other hand record 73%
crime victim cyber in third grade.

       Although feeling cheated victim and angry, however they hesitate to take up action
because consider the effort would not be fruitful, report Norton consumer unit.

        Hard cybercrime reported because sometimes police found case involved has no solid
proof. Deliberately cyber criminal steal in total that a little to avoid being detected , said
Adam Palmer, cyber security adviser chief, Norton. If you failed to report, you may be
protecting cyber criminal continue doing things them , said Palmer more.

        According to associate professor in Loyola Marymount university, Joseph LaBrie on
the other hand, lack of awareness on cybercrime among Internet users caused it getting
rampant. The state same when you do not know much matter on your car will be submitting
all matter to mechanics if your vehicle break down , said LaBrie.

       Research showed most consumers think downloading song or film on the Internet
without making any payment is not wrong. About 24% from research findings on the other
hand state read secretly other people e-mail also not a crime. (Harian Metro, September 9,
2010)

       Generally cyber criminal is knowledgeable or professional group. Perhaps our friend,
might be students, may be professor or whoever. They will commit crime on their own party
or competitor or they waged by certain parties for example. Business organization may
become the competitor target, employee or former employee. Bank and financial institution
by robber and professional criminal.While, university become student target or former
student. Government agency on the other hand may become terrorist victim and computer
may be sabotaged. If people that commit crime not in get to know law that in framework to
prevent would not be meaningful.

      In America that sophisticated the technology also fail to track event mastermind
September 11. During event September 11 2001, 19 aircraft hijackers enter the United States
of America by using visa that is legal. Apart from personally , they relating over Internet or
making phone calls by using prepaid card to draw attack on New York and Washington.



2.3 Recommendations Prevent Cybercrime

- By right, all parties played an important part in overcoming this problem. Apart from the
authorities, member of the community also played role in giving information, awareness and
also lesson to teenagers on risk and also danger cyber world. Parents, teacher and the school
should also played important role in oversee their children or their student which carried out
activity on-line and their behaviour. There is various computer software that staying in
market can be used to check and oversee activities that is potential appear danger to
teenagers. This including limit access on content characterized by porn graphic, and limit
their period staying on-line.

       Psychological approach such as youth guidance program such as motivation
programme, awareness programme, individual development programme, healthy youth
programme without aids (Prostar) was held and can help teenagers in overcoming crime
problem and social problem. Apart from that with crime prevention club establishment in
school nationwide, is hoped able to decrease teenagers involvement such as school student in
criminal activity such as damage property, bully, gambling and so on.

       Government has enacted various laws to protect society especially society young
members such as teenagers from social problem and also crime related cyber world, such as
JenayahKomputer Act 1997, Tandatangan Digital Act 1997, Komunikasi Act and Multimedia
1998 and present law which allocates normal criminal offence and sentence for her such as
penal code, law which allocates protection to users, PerlindunganPengguna Act 1998,
Perlindungan Data Peribadi Act (still deep legislation), and Telekomunikasi Act and Hakcipta
Act.

        With Act legislation KanakKanak 2001 and PencegahanPemerdaganganManusia Act
2008, can set aside protection that is sufficiently to children and youth from
commercialization children, pornography, pornographic, incest barrier, and sexual
exploitation. In overcoming pornographic dumping materials, danger and immoral that occur
in internet, a law that is strict need to be created to inflict punishment that heavier to internet
service provider for example so that more responsible with what displayed in websites.



3. Conclusion

- In world borderless, attack could be done the thousands of miles away or from people that
beside we and very unlucky we difficult to recognize who are they and from where they
attack us. However we have to take move to protect our own computer system. Complete
ourselves with knowledge on computer and perhaps we can protect our computer system with
software that there is in market such as anti-virus, firewall, pop-up blocker, anti- spyware and
anything security software that is other.

        In conclusion, technology nowadays increasingly sophisticated, but at the same time
there was also the lack, namely cybercrime also increasingly sophisticated. Most cyber
criminal could not be caught because difficult to be traced. As such, we should cautious at
every time . Save something for a rainy day, we should protect our computer system with
software that is best and be careful while using internet network .
Bi

Mais conteúdo relacionado

Mais procurados

Name parul
Name parulName parul
Name parulParul231
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet BankingChiheb Chebbi
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 

Mais procurados (20)

12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Name parul
Name parulName parul
Name parul
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cyber security
Cyber securityCyber security
Cyber security
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
E0334035040
E0334035040E0334035040
E0334035040
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber law
Cyber law Cyber law
Cyber law
 
Shilpa
ShilpaShilpa
Shilpa
 

Destaque

Destaque (20)

Wes j3 asl790_hostseminar
Wes j3 asl790_hostseminarWes j3 asl790_hostseminar
Wes j3 asl790_hostseminar
 
งานนำเสนอ2
งานนำเสนอ2งานนำเสนอ2
งานนำเสนอ2
 
BSE/NSE indices snapshot for 18 July 2014
BSE/NSE indices snapshot for 18 July 2014BSE/NSE indices snapshot for 18 July 2014
BSE/NSE indices snapshot for 18 July 2014
 
Susan fleury Networking Presentation V2 Aug 2015
Susan fleury Networking Presentation V2 Aug 2015Susan fleury Networking Presentation V2 Aug 2015
Susan fleury Networking Presentation V2 Aug 2015
 
2012 appf ppt
2012 appf ppt2012 appf ppt
2012 appf ppt
 
Indices 15 feb2013061100
Indices 15 feb2013061100Indices 15 feb2013061100
Indices 15 feb2013061100
 
Presentatie Het Cognitieve Paard
Presentatie Het Cognitieve PaardPresentatie Het Cognitieve Paard
Presentatie Het Cognitieve Paard
 
Wordpress: It's more than just a Blog
Wordpress: It's more than just a BlogWordpress: It's more than just a Blog
Wordpress: It's more than just a Blog
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Vocabulary b slim
Vocabulary b slimVocabulary b slim
Vocabulary b slim
 
Indices 09 may2014063918
Indices 09 may2014063918Indices 09 may2014063918
Indices 09 may2014063918
 
SmartMedia
SmartMediaSmartMedia
SmartMedia
 
My flip book
My flip bookMy flip book
My flip book
 
Indices 06 mar2013051332
Indices 06 mar2013051332Indices 06 mar2013051332
Indices 06 mar2013051332
 
Groomerupdatejan3
Groomerupdatejan3Groomerupdatejan3
Groomerupdatejan3
 
Lleis circuits
Lleis circuitsLleis circuits
Lleis circuits
 
Indices 11 mar2013050249
Indices 11 mar2013050249Indices 11 mar2013050249
Indices 11 mar2013050249
 
FOSDEM 2012 git-annex talk
FOSDEM 2012 git-annex talkFOSDEM 2012 git-annex talk
FOSDEM 2012 git-annex talk
 
ikonomics
ikonomicsikonomics
ikonomics
 

Semelhante a Bi

Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Semelhante a Bi (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Bi

  • 1. ASSIGNMENT QUESTION CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA? 1. INTRODUCTION - In pursuit modernity current now, Malaysia always expanding as a country that is developed towards year 2020. For realise that Vision 2020, various efforts that has been undertaken by government in pass over modernity current so Malaysia continue to developed rapidly parallel with other developing country. Hence, use of modern technology played an important part. So exist new generation known as cyber society. Internet usage also unable run for achieve this goal. Malaysia itself generally had appropriated budget that is large to build area of Multimedia Super Corridor (MSC) that high- tech and rapid developing.Here there was various investments from within and overseas was being conducted for economic development of the country. Hence, this world usage was very important. However, in achieving this desire, there are still a few society do not know or a lack of knowledge related internet.Due to this technological sophistication and knowledge constraint, many society that cheated in this cyber world bring about cybercrime that may not be realized. Situation this difficult to be prevented because cybercrime carried out in world which encompasses borderless world. However, the implication can in see in nature real. My writing will discuss with much further related this issue. According to KamusDewanBahasa Dan Pustaka (EdisiEmpat), crime bring act meaning or evil (such as steal, rob, murder and others) with no beside law or wrongful act (beside law) or kriminil act. As phrase example of use in sentence, police consider the matter as a criminal act that is determined. While cyber meaning on the other hand is everything related to internet. For example internet like giant market that discover buyers and sellers in cyberspace. Generally cybercrime may be classified as an act that is wrong or evil that carried out through internet which is known as cyber world. Crime this very difficult dam and haunt the authorities in eradicating this cybercrime. There is no definition that right that can imagine cybercrime. Some parties give definition “cybercrime” are referring to “computer crime”. This based on computer's capacity capable of discharging conventional criminal activities such as fraud, theft, extortion, and invasion which could cause adverse impact on individual property or organization. According to Donn B. Parker, a researcher in computer crime and security to from SRI International California, computer crime definable as any performance that have the
  • 2. intention and associated with computer through any way and creating victim suffering or can cause suffering, loss and continuously. This statement is supported by Department of JusticeU.S.A which said that computer crime is any illegal activity use computer technological knowledge as tool to realize. 2. CONTENT 2.1 Classifications Cybercrime - All computer usage level is always encounter with crime activity. Whether as victim to crime or equipment to crime or both. Input operation, data processing, output operation and data communication was invoked closely for purpose that is unhealthy. Our cyber type of crime that is usual listen and categorised as following: 1) Fraud - Phishing namely impersonated legal website and consequently persuade victim clicks link through which in turn e-mail will be bringing with consumer confidential information. Usually Phishing carried out through email or short message and usually direct consumer to pocket details in certain webpages, however telephone relationship also have been used before. Phishing is social an example engineering technique that used to deceive consumer. 2) Damage or upper modification programme or computer data. - Refering to software that designed to escape or damage computer system unauthorized clearly from owners. This term often used by computer professional class as umbrella term to code forms software that is able detrimental to computer without the consumer knowledge or most do not upset that consumer privacy. Most usual computer user still not used with that term and mostly never used. On the other hand, computer virus term often used including in the media announce to reflect all pest types of software, although not all malware is computer virus. Other term that were created for pest software is malicious software (badware), the possibility due to anti-malicious software. Software regarded as based on malware based on inventor purpose presumption and not based on certain characteristics. It including computer virus, computer worm, horse Trojan, most rootkit, spyware (spyware), advertisement software (adware) cheating, and malicious software and that unwanted other. Legal, pest software sometimes regarded as computer pollution. 3. Information theft. - In Internet, there were some unhealthy activity. Among them wasidentity theft incident. It is crime which is done by certain parties where they steal personal data and later lodged purchase by using other person's name.
  • 3. Criminal involved may be solicited and receive credit card on other person's name, or cheating identity by convince online seller that he is true owner something data. That seller are going to sell the product and applied cost to others. Incident this will be trouble you those involved and would be destroying reputation, credit card record that is good and creating you facing financial problems that should not. We understand that personal data theft incident not only occur in cyberspace,in fact in real life also this incident happen. 4. By void access on system - Computer intrusion was upper access computer system without state or imagine that computer system owner's permission. Individual which involved with this activity known as computer intruders and had powerful interests to break security system that there was in that computer. Intruder can obtain by access control by using the computer in his own house or office that connects to network telecommunication. Desire to get by void access upper computer system may be obtained because some motive or purpose. Among them just because curious, such as which done by hackers (computer intruders) until computer sabotage or espionage. By void access or without intention by individuals that were not allowed by owners or system administrator will be brought before as crime behavior. By void access create opportunity to produce in addition to data damages that unintended, data collision or valuable information theft. In the refractivity access can be implemented through control location during telecommunication network because either between many reason. Intruder will probably capable to cash in on from weakness of security system to get access or can get back channel in security measure or procedure. Usually it also done by obtaining password to enter into something system. The usual password protection not a method that is safe to protect system from access by individuals that were not allowed. This is because, in the refractivity, computer intruders can overcome this protection easily him through one of three methodologies. If computer intruders afford to get keyword access truth. Then, Trojan software Horse will be placed to get other keyword for other users. Usually this type software can operate continuously with security system that is present and a bit hard to be detected. Eventually, computer intruders get software to get keyword that had been stolen through control access. Third method that commonly used to achieve system-is "trapdoor" where access that were not allowed reached through point access, or trapdoor that created for particular purpose such as to keep something system. 5. Copy by void software. - Piracy (or copyright violation) mean material utilisationprotege copyright law without permission, so violate either natural owner exclusive right copyright, such as authority to
  • 4. reissue or conduct work that in copyright, or produce works products that based on work that in the copyright. 6. Get rich quick scheme - Get rich quick scheme is a scheme where certain amount of money will be deposited or invested to organizer of get rich quick scheme with promise and condition that deposit money that will be returned back with interest or profit that promised for money that is deposited usually higher from what offered by licensed finance institutions. There is various get rich quick scheme type, among them is Skim pyramid and Skim Ponzi. In Malaysia get rich quick scheme that is most famous is Pak Man Telo scheme. In that scheme beginning, organiser used money deposit received from new depositor to pay return or depositor capital predecessor. In the mass, get rich quick scheme organisers not investing deposit received into investments or industry that cause profit that is same or higher. Due to this, they cannot continue to bear return payment that is high to investor that is present. If no deposit recently accepted by organiser or this scheme cancelled, it would be failing and investors or depositor will lost their money. Between get rich quick scheme that there was in Malaysia is Pak Man Telo, LabuPeram (around 1980 an), LinggamTelo (1990 Klang Valley), Skim 350 (1980 an Kulim, Kedah), Platinum Lane SdnBhd (PLSB) (1991 Kulim Kedah), and Sri Emas Enterprise. 7. Hacker - Hacker is one that create and modify computer software and hardware including computer programming, administration and business related to security. This term usually carry strong connotation, but may be good or bad depend on to cultural context. In computer programming, hacker was a programmer that hack or achieving goals by use one modification serial to exploit or extend code or source. Hacker was the person which specialises in work related computer systems security mechanism and network. Even though it including those try to strengthen that mechanisms, it more often used, are mainly in mass media, to consult to those are trying to get in pass that mechanisms. In fields different techniques, hacker also meant people which made things function outside limit shows through their technical skill such as hardware hacker or reality hacker. In hacker culture, hacker is one that has attained certain social status and known among that cultural expert for his commitment on cultural value and technical know-how certain amount. 8. Virus transmission - Computer virus was the name that taken from biological virus, is computer program that able copy himself and infecting computer unauthorized or consumer knowledge. However the simple virus word used to refer to various pest types of software that is different. Virus original may be modifying the copy or copy itself that modify himself, as in metamorphic virus. Virus only diffusible when the host reach to different computer, for example through network or portable intermediary such as floppy disk, compact disc or flash drive USB. Apart
  • 5. from that, virus also could be spread by infect file in network file system or any filing system that achieved different computer. Some virus designed to be affected computer by damage program, wipe out file, or formatting again hard disk, while viruses that is other designed not to damages any, but only to change self and perhaps to push the existence through text broadcasting, video, or audio message. Although virus that is second harmless, it also can cause a problem to computer user because it swallowing computer memory that used by program that is legal. Due to this, it often causing action that uncertain and could result in system failure. Apart from that, many virus also contains bug which could cause system failure and loss of data. The occasionally computer virus confounded with computer worm and Trojan. Both this differ with respect to that computer worm could be spread to different computers without need evacuate as part of host file, while Trojan is file that seemingly harmless until implemented. Contrasts with virus, Trojan also excludes the code into computer files that is other. Most personal computer currently connected with internet and local area network thereby, facilitate virus transmission. It cash in on that administered by network service such as World Wide Web's systems, e-mail, and file sharing to spread thereby, obscure difference between virus with computer worm. Furthermore, some resources use terminology alternative that define virus as any form self reproduction malicious software. 2.2 Compares Cybercrime in Malaysia and USA - As much as 8,090 criminal case cyber reported in this country in two months time this year compared 3,064 cases during last year. CyberSecurity Malaysia chairman, Jeneral (B) Datuk Seri Mohd. Azumi Mohamed said, increase more 100% very worrying and it could be generating new threat on otherwise national security dam. He stresses, among the causes that increase is consumer attitude that not considerate on current security surfing Internet. “We will increase awareness campaign in ensuring cyber security so that public and student unexposed to danger when surfing Internet,” he said in Perak Wifi launching ceremony and KarnivalSiber 2011 by MenteriBesar, Datuk Seri Dr. ZambryAbd. Kadir here, today. Also present Perak Chief Executive Officer, Dr. Ahmad KamilMahmood. Mohd.Azumi said, as agency that accountable for in matters related cyber security, CyberSecurity take seriously that development and drafting specific plan to handle. He said, most people unconscious they are exposed to cyber threat including attack by hacker, virus threat and password stolen when surfing Internet. In accordance with that , he ask consumer so that more cautious and be careful to avoid their personal information invaded when using Internet. (Utusan Online - domestic, April 2, 2011)
  • 6. Computer security firm, Symantec report about two-thirds from Internet users in the world become cyber crime victim. According to cybercrime survey report Norton, consumer in China occupying highest position become victims when 83% users attacked computer virus, credit card forgery, identity fraud and various other criminal on the Internet. Brazil and India occupying second position with 76%, while United States on the other hand record 73% crime victim cyber in third grade. Although feeling cheated victim and angry, however they hesitate to take up action because consider the effort would not be fruitful, report Norton consumer unit. Hard cybercrime reported because sometimes police found case involved has no solid proof. Deliberately cyber criminal steal in total that a little to avoid being detected , said Adam Palmer, cyber security adviser chief, Norton. If you failed to report, you may be protecting cyber criminal continue doing things them , said Palmer more. According to associate professor in Loyola Marymount university, Joseph LaBrie on the other hand, lack of awareness on cybercrime among Internet users caused it getting rampant. The state same when you do not know much matter on your car will be submitting all matter to mechanics if your vehicle break down , said LaBrie. Research showed most consumers think downloading song or film on the Internet without making any payment is not wrong. About 24% from research findings on the other hand state read secretly other people e-mail also not a crime. (Harian Metro, September 9, 2010) Generally cyber criminal is knowledgeable or professional group. Perhaps our friend, might be students, may be professor or whoever. They will commit crime on their own party or competitor or they waged by certain parties for example. Business organization may become the competitor target, employee or former employee. Bank and financial institution by robber and professional criminal.While, university become student target or former student. Government agency on the other hand may become terrorist victim and computer may be sabotaged. If people that commit crime not in get to know law that in framework to prevent would not be meaningful. In America that sophisticated the technology also fail to track event mastermind September 11. During event September 11 2001, 19 aircraft hijackers enter the United States of America by using visa that is legal. Apart from personally , they relating over Internet or making phone calls by using prepaid card to draw attack on New York and Washington. 2.3 Recommendations Prevent Cybercrime - By right, all parties played an important part in overcoming this problem. Apart from the authorities, member of the community also played role in giving information, awareness and also lesson to teenagers on risk and also danger cyber world. Parents, teacher and the school should also played important role in oversee their children or their student which carried out
  • 7. activity on-line and their behaviour. There is various computer software that staying in market can be used to check and oversee activities that is potential appear danger to teenagers. This including limit access on content characterized by porn graphic, and limit their period staying on-line. Psychological approach such as youth guidance program such as motivation programme, awareness programme, individual development programme, healthy youth programme without aids (Prostar) was held and can help teenagers in overcoming crime problem and social problem. Apart from that with crime prevention club establishment in school nationwide, is hoped able to decrease teenagers involvement such as school student in criminal activity such as damage property, bully, gambling and so on. Government has enacted various laws to protect society especially society young members such as teenagers from social problem and also crime related cyber world, such as JenayahKomputer Act 1997, Tandatangan Digital Act 1997, Komunikasi Act and Multimedia 1998 and present law which allocates normal criminal offence and sentence for her such as penal code, law which allocates protection to users, PerlindunganPengguna Act 1998, Perlindungan Data Peribadi Act (still deep legislation), and Telekomunikasi Act and Hakcipta Act. With Act legislation KanakKanak 2001 and PencegahanPemerdaganganManusia Act 2008, can set aside protection that is sufficiently to children and youth from commercialization children, pornography, pornographic, incest barrier, and sexual exploitation. In overcoming pornographic dumping materials, danger and immoral that occur in internet, a law that is strict need to be created to inflict punishment that heavier to internet service provider for example so that more responsible with what displayed in websites. 3. Conclusion - In world borderless, attack could be done the thousands of miles away or from people that beside we and very unlucky we difficult to recognize who are they and from where they attack us. However we have to take move to protect our own computer system. Complete ourselves with knowledge on computer and perhaps we can protect our computer system with software that there is in market such as anti-virus, firewall, pop-up blocker, anti- spyware and anything security software that is other. In conclusion, technology nowadays increasingly sophisticated, but at the same time there was also the lack, namely cybercrime also increasingly sophisticated. Most cyber criminal could not be caught because difficult to be traced. As such, we should cautious at every time . Save something for a rainy day, we should protect our computer system with software that is best and be careful while using internet network .