Sunteți pe pagina 1din 16

COMPUTER APPLICATION (ACCD 113)

CYBERCRIME IN MALAYSIA

NAME

: NAZURAH BINTI MAHAMAD SOBRI

STUDENT ID

: DIA 0816002

NAME OF LECTURER: MS NORSHAHRIZAN

CONTENTS.
1)
2)
3)
4)
5)
6)
7)

Introduction
Factors of cybercrime
Types of cybercrime
Advantages and Disadvantages
Effects of cybercrime to people
Preventive step to avoid cybercrime
References

PAGE

INTRODUCTON
In this era globalization, there are many cases or crimes that are not approved by the
law such as drug dealing, kidnapping, and sexual assault has been attempted by many people
these days. The most common crime we can see today is cybercrime. What is cybercrime?
Cybercrime is any illegal activity that involves a computer or network-connected device, such as
a mobile phone (Rouse, 2010) . According to the newspaper TheStar online (23 September
2014), Malaysia is the sixth most vulnerable to cyber crime. The Deputy Communication and
Multimedia Minister Datuk Jailani said cyber crime in the country increased to 10,636 cases last
year, from 9,986 cases the previous year. From the statistics of Malaysia Computer Emergency
Response Team (MyCERT), he said the incidents on malicious codes had the highest increase
with 1,106 more cases recorded last year, from 645 cases in 2012, as the data on page 2.(The
Star, 2014)

FACTORS OF CYBERCRIME
Cyber-crime is increasing from day to day. Why is this happening? Here are some
factors on why:
i.

Money
People nowadays are having trouble with money and also facing poverty. Therefore, the
desire to make money is higher. In this century, there are lots of get-rich-quick scheme
now. A get-rich-scheme is designed to earn you a lot of money with a small investment in
a short period of time, often a slightly dishonest or not sensible way to do it (Macmillan
Dictionary). There are many get-rich-schemes without an official license according to the
Central Bank of Malaysia (Bank Negara Malaysia or BNM) such as, Ace Global Sales &
Services, Build Rich Enterprise and Dgreat Network. [refer the next page]

(http://media.themalaymailonline.com/images/sized/ez/ringgit1206c_620_422_100.jpg)
The following page is one of the listed companies and websites that are neither authorized
nor approved under the relevant laws and regulations administered by BNM.

ii.

Easy to access
Accessibility to victims is much easier for
criminals. The amount of people online,
allow criminals to target their victims
without being physically present. The police
find it hard and impossible to implicate
people when the trail is online. One of the
examples is pedophiles who bait heir
victims online; rapist who meet targets
(http://www.startyourbusinessmag.com/wpthrough
online social networks an hackers who gather information and use it in their
content/uploads/2016/03/Easy-Access.jpg)
criminal activities without being traced on the network. (The Causes and Criminals)

iii.

Negligence
Negligence means failure to take the care of that responsible the person usually takes or
in other words, lack of normal care or attention (Merriam-Webster Dictionary).
Sometimes, a simple negligence can give rise to cyber-crime activities. Saving a
password on an official computer and using an official data in a public place such as
cyber caf, and also storing data without protecting it is the examples of negligence, as
shown on the picture below. The cyber criminal can take advantage of such negligence
of a person and use it to obtain, gain, manipulate and use the information for criminal
activities. (The Causes and Criminals)

(https://lh5.googleusercontent.com/ZMSyl97cjLI/T5XOnuaR0eI/AAAAAAAAAOg/RwgHQnCLpuo/s320/6.png )

iv.

Lack of evidence
One of the factors in increasing criminal activities such as cyber-crime is lack of
evidence to bind the criminal law. The reason why it is lack of evidence is because the

criminal can hide the trail of a cyber crime easily in many ways so that the police could
not track them. For instance, consider a pedophile who baits his victim through email or
any social networks. The police can trace the information to the criminal, but unless
there is not a solid physical proof; the trails cannot be used in a court of law. Loss of
evidence is a very common & obvious problem as all the data are routinely destroyed.
Further collection of data outside the territorial extent also paralyses this system of
Crime Investigation. (The Causes and Criminals). One of the law that is used in Malaysia
is Computer Crimes Act 1997. This act is enforced on 1st June 2000. The main reason
for enforcing this act is to ensure that misuse of computer can be overcome. Misuse of
computer will be an offence in Malaysia. (Multimedia Development Corporation, 19962012). (Lawyerment : What is Computer Crimes Act 1997?)

TYPES OF CYBERCRIME
There are many types of cybercrime. Some of them are:
i.

Identity Theft
Fraud is the illegal use of another person's personal recognizing data, (for example, a
Social Security number) in order to get cash or credit. (Merriam-Webster's Learner's
Dictionary).

ii.

Computer Fraud
Computer fraud is defined as any demonstration utilizing PCs, the Internet, Internet
gadgets, and Internet services to defraud individuals, organizations, or government
agencies of revenue, income, or Internet access.(Computer Fraud)

iii.

Plagiarism
In an instructional setting, plagiarism occurs when a writer purposely utilizes another
person's language, ideas, or other unique (not common-knowledge) material without
acknowledging its source. (Defining and Avoiding Plagiarism: The WPA Statement on
Best Practices)

iv.

Pornography
Pornography refers to representations designed to arouse and give sexual pleasure to
those who read, see, hear, or handle them. Although sexual stimulation would seem to
be a splendid goal, it is not always so regarded in a society still characterized as
puritanical. (W.Slade)

v.

Cyber-bullying
Cyber-bullying is bullying that takes place using electronic technology. Electronic
technology includes devices and equipment such as cell phones, computers, and tablets
as well as communication tools including social media sites, text messages, chat, and
websites. Examples of cyber-bullying include mean text messages or emails, rumors
sent by email or posted on social networking sites, and embarrassing pictures, videos,
websites, or fake profiles. (What is Cyberbullying)

vi.

Hacking
Hacking is any technical effort to manipulate the normal behavior of network connections
and connected systems. A hacker is any individual engaged with hacking. The
expression "hacking" generally referred to constructive, cunning specialized work that
was not as a matter of course identified with PC frameworks. Today, be that as it may,

hacking and programmers are most regularly connected with malicious programming
attacks on the Internet and other networks. (Mitchell, 2016)

ADVANTAGES & DISADVANTAGES OF CYBERCRIME


Advantages
i.

The cyber security will defend us from critical attacks.


When a system of the computer has been hacked, the message will directly be sent to
the software security. By that way, the security will be updated and more secured when
facing more critical attacks in the future.

(https://www.msoutlook.info/pictures/outlook-security-warning-send-email-allow-denyii.

progress-bar.png )
It helps us to browse the safe website
Nowadays, there is a build protective security system from the internet browser itself.
Therefore, whenever we accidently clicked a link to a website that has viruses, the
browser will alert us and redirect us to the previous page before any viruses can get
through the computer system.

(https://our.umbraco.org/
media/upload/ece419d2-fd8d-42b6-bb5e-01ee4c91d07a/error.jpg )
iii.

Internet security process all the incoming and outgoing data on our computer
The image below shows a list of applications that have been opened by the user. It
consists of all Application and Process Monitor related rules that a network security such
as Endpoint Security Console is enforcing for the Applications listed. The Process

Monitor filters processes for potentially malicious system API calls used by programmers
(and hackers) to launch process executables. The screen includes the Application and
file executable name, version number, number of rules being enforced, and the
classification Mode of those rules, which can be set to either allow, deny, or filter
incoming or outgoing traffic. Thus, the data on the computer will be safe. (Privacyware)

(http://www.privacyware.com/img/ESC_UG_11.gif )

iv.

Security will defend from hacks and viruses.


The anti-virus security such as Sophos anti-virus, Panda security, and Norton Security
anti-virus can be used to defend the users computer from being hacked. Every time a
virus is detected on the computer, the anti-virus will alert the user and the options on
how to eliminate the virus will be shown.(as shown in the image below).
By that way, the computer will be free from viruses or threats from the hacker.

(http://www.removeonline.com/images/warning15.jpg

Disadvantages
i.

Improves the hackers speed and ability


The hacker can improve its ability once they have
learned to hack and steal more information from
individuals or organizations and directly will ruin
their reputation. Once they have the skill to do it,
they will make more practice, and finally become
invincible.

ii.

It may damage your studies and social life


A cybercrime such as cyber-bullying is one of the examples. Cyber-bullying is
bullying that takes place using electronic technology. (What is Cyberbullying).From
cyber-bullying, a person can be mentally damaged or mental breakdown from the
criticism or negative comments or blackmailing on the social network.

iii.

It could cause violation of privacy


Once the hacker has your personal information such as passwords, banking details, and
important data on your computer, the hackers can steal the money from your banking
account and this will lead to hard cost of living in the future.

http

:/

/i.d

ai

lym

ai

l.co

uk/i

pix/

013

01/

1/ar

ti

cle-

2260221-16E238A1000005DC-318_634x395.jpg )

EFFECTS OF CYBERCRIME TO PEOPLE


Nowadays, criminals take advantage of technology in many different ways. The
Internet is a great tool for scammers and other miscreants, since it allows them to carry out their
specialty while hiding behind a shield of digital anonymity. Cyber crime affects society in a
various different ways, both online and in the offline world. There are a variety of effects that
contribute to cyber crime. Online applications will give a bad impact on the user if there is no
security or safety in the process of online payment transactions.
Negative implications arising from cyber crime is affecting the business through online
(on-line). Now the phrase sentences everything at your fingertips became so popular because
of the power of information technology led us to choose some business done more easily and
quickly. Thus, when the bank offers online services otherwise known as internet banking, the
public welcomes this effort due to assume the service will benefit them. However, activity is
more widespread cybercrime can cause us to feel fear for dealing online because the pin
number one's personal or confidential information may be careless by hackers. Furthermore,
according to a computer expert, a person can create a fake bank web page with only a
computer, Internet, and
navigation software. The
process of creating a fake
website also only takes
about two hours. CEO of
Cyber Security Malaysia
(Cyber Security), Lt Col
(Rtd) Husin Jazri stated
that as many as 2123
complaints cyber crime
was

adopted

in

2008

which covers fraud cases,


cases

of

tampering,
code,

malicious

hackers,

harassment
service.

attempted

and

cyber
denial

Dont trust everything you see. Even salt looks like sugar
(http://i.dailymail.co.uk/i/pix/2013/01/11/article-226022116E238A1000005DC-231_634x482.jpg)

Secondly is loss of companies. This is because of the spread of virus, hacking,


invasion and terrorism will harm companies and internet users. In addition, the virus can cripple
computer systems. The information may be restored, but only a certain part only. There also are
not able to be saved and deleted by the virus as a Trojan virus. Hacking will cause the contents
of the computer be exposed and also successfully hacked. Therefore, we will not be able to
track the hacker.

PREVENTIVE STEP TO AVOID CYBERCRIME


As Desiderius Erasmus will say:
Prevention is better than cure.
With every one of these dangers, what would we be able prevent ourselves against cybercrime?
Some best practices include:
Protect yourself. Use an extensive Internet security solution that includes capabilities for
maximum protection against malicious code and other dangers or threats.
Update regularly. Keep your system, program, and virus definitions up-to-date
Be careful about scareware strategies. Versions of software that claim to be free,
cracked or pirated can expose you to malware or social engineering attacks, which
attempt to deceive you into thinking your computer is infected and getting you to pay
money to have it removed immediately.
Use an effective password policy. Use complex passwords (upper/lowercase and
punctuation) or passphrases. Consider using password management tools such as
Norton Identity Safe
Think before you click. Even when receiving email attachments from trusted users, be
suspicious
Protect your personal data. Limit the amount of personal information you make publicly
available on the Internet (in particular via social networks). Consumers can protect
themselves from like-jacking scams, fake offers or profile takeovers for free with
technologies such as Norton Safe Web. It can scan news feeds for risky connections
and warns you of potential threats so you dont share them impart them to your loved
ones
Always remember if it looks too good to be true, it most likely
is. Follow the above tips and don't be tricked by online media
scams. (Tan, 2015)

(https://cdn3.iconfinder.com/data/ico
ns/e-commerce-andsales/512/shield_protection_securit
y_safe_secure_flat_icon-512.png )

REFERENCES
Computer Fraud. (n.d.). Retrieved September 3, 2016, from Computer Hope:
http://www.computerhope.com/jargon/c/computer-fraud.htm
Defining and Avoiding Plagiarism: The WPA Statement on Best Practices. (n.d.). Retrieved
September 3, 2016, from Council of Writing Program Administors:
http://wpacouncil.org/positions/WPAplagiarism.pdf
Lawyerment : What is Computer Crimes Act 1997? (n.d.). Retrieved September 5, 2016, from
Lawyerment: http://www.lawyerment.com/library/kb/Intellectual_Property/1360.htm
Macmillan Dictionary. (n.d.). Retrieved September 4, 2016, from Macmillan Dictionary:
http://www.macmillandictionary.com/dictionary/british/get-rich-quick
Merriam-Webster Dictionary. (n.d.). Retrieved Septemer 5, 2016, from Merriam-Webster
Dictionary: http://www.merriam-webster.com/dictionary/negligence
Merriam-Webster's Learner's Dictionary. (n.d.). Retrieved September 3, 2016, from MerriamWebster: http://www.merriam-webster.com/dictionary/identity%20theft
Mitchell, B. (2016, February). What is Hacking? Retrieved Septemmber 3, 2016, from About
Tech: http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm
Privacyware. (n.d.). Retrieved September 5, 2016, from Using Endpoint Security ConsoleManaged Network: http://www.privacyware.com/esc_product_tour01.html
Rouse, M. (2010, October). Definition : Cybercrime. Retrieved August 31, 2016, from
Techtarget: http://searchsecurity.techtarget.com/definition/cybercrime
Tan, N. (2015, May 25). Tech Opinion. Retrieved September 3, 2016, from The Star online:
http://www.thestar.com.my/tech/tech-opinion/2015/05/27/cybercriminals-wreak-havoc-on-socialmedia/
The Causes and Criminals. (n.d.). Retrieved September 5, 2016, from Calling off Cyber Crime:
https://sites.google.com/site/callingoffcybercrime/the-causes-and-criminals
The Star. (2014, September 23). Nation. Retrieved September 3, 2016, from The Star online:
http://www.thestar.com.my/news/nation/2014/09/23/cyber-crime-malaysians-sixth-mostvulnerable/
W.Slade, J. (n.d.). The Definition of Pornography. Retrieved September 3, 2016, from Frontline:
http://www.pbs.org/wgbh/pages/frontline/shows/porn/etc/definition.html
What is Cyberbullying. (n.d.). Retrieved September 3, 2016, from Stop bullying.gov:
https://www.stopbullying.gov/cyberbullying/what-is-it/

S-ar putea să vă placă și