Documente Academic
Documente Profesional
Documente Cultură
CYBERCRIME IN MALAYSIA
NAME
STUDENT ID
: DIA 0816002
CONTENTS.
1)
2)
3)
4)
5)
6)
7)
Introduction
Factors of cybercrime
Types of cybercrime
Advantages and Disadvantages
Effects of cybercrime to people
Preventive step to avoid cybercrime
References
PAGE
INTRODUCTON
In this era globalization, there are many cases or crimes that are not approved by the
law such as drug dealing, kidnapping, and sexual assault has been attempted by many people
these days. The most common crime we can see today is cybercrime. What is cybercrime?
Cybercrime is any illegal activity that involves a computer or network-connected device, such as
a mobile phone (Rouse, 2010) . According to the newspaper TheStar online (23 September
2014), Malaysia is the sixth most vulnerable to cyber crime. The Deputy Communication and
Multimedia Minister Datuk Jailani said cyber crime in the country increased to 10,636 cases last
year, from 9,986 cases the previous year. From the statistics of Malaysia Computer Emergency
Response Team (MyCERT), he said the incidents on malicious codes had the highest increase
with 1,106 more cases recorded last year, from 645 cases in 2012, as the data on page 2.(The
Star, 2014)
FACTORS OF CYBERCRIME
Cyber-crime is increasing from day to day. Why is this happening? Here are some
factors on why:
i.
Money
People nowadays are having trouble with money and also facing poverty. Therefore, the
desire to make money is higher. In this century, there are lots of get-rich-quick scheme
now. A get-rich-scheme is designed to earn you a lot of money with a small investment in
a short period of time, often a slightly dishonest or not sensible way to do it (Macmillan
Dictionary). There are many get-rich-schemes without an official license according to the
Central Bank of Malaysia (Bank Negara Malaysia or BNM) such as, Ace Global Sales &
Services, Build Rich Enterprise and Dgreat Network. [refer the next page]
(http://media.themalaymailonline.com/images/sized/ez/ringgit1206c_620_422_100.jpg)
The following page is one of the listed companies and websites that are neither authorized
nor approved under the relevant laws and regulations administered by BNM.
ii.
Easy to access
Accessibility to victims is much easier for
criminals. The amount of people online,
allow criminals to target their victims
without being physically present. The police
find it hard and impossible to implicate
people when the trail is online. One of the
examples is pedophiles who bait heir
victims online; rapist who meet targets
(http://www.startyourbusinessmag.com/wpthrough
online social networks an hackers who gather information and use it in their
content/uploads/2016/03/Easy-Access.jpg)
criminal activities without being traced on the network. (The Causes and Criminals)
iii.
Negligence
Negligence means failure to take the care of that responsible the person usually takes or
in other words, lack of normal care or attention (Merriam-Webster Dictionary).
Sometimes, a simple negligence can give rise to cyber-crime activities. Saving a
password on an official computer and using an official data in a public place such as
cyber caf, and also storing data without protecting it is the examples of negligence, as
shown on the picture below. The cyber criminal can take advantage of such negligence
of a person and use it to obtain, gain, manipulate and use the information for criminal
activities. (The Causes and Criminals)
(https://lh5.googleusercontent.com/ZMSyl97cjLI/T5XOnuaR0eI/AAAAAAAAAOg/RwgHQnCLpuo/s320/6.png )
iv.
Lack of evidence
One of the factors in increasing criminal activities such as cyber-crime is lack of
evidence to bind the criminal law. The reason why it is lack of evidence is because the
criminal can hide the trail of a cyber crime easily in many ways so that the police could
not track them. For instance, consider a pedophile who baits his victim through email or
any social networks. The police can trace the information to the criminal, but unless
there is not a solid physical proof; the trails cannot be used in a court of law. Loss of
evidence is a very common & obvious problem as all the data are routinely destroyed.
Further collection of data outside the territorial extent also paralyses this system of
Crime Investigation. (The Causes and Criminals). One of the law that is used in Malaysia
is Computer Crimes Act 1997. This act is enforced on 1st June 2000. The main reason
for enforcing this act is to ensure that misuse of computer can be overcome. Misuse of
computer will be an offence in Malaysia. (Multimedia Development Corporation, 19962012). (Lawyerment : What is Computer Crimes Act 1997?)
TYPES OF CYBERCRIME
There are many types of cybercrime. Some of them are:
i.
Identity Theft
Fraud is the illegal use of another person's personal recognizing data, (for example, a
Social Security number) in order to get cash or credit. (Merriam-Webster's Learner's
Dictionary).
ii.
Computer Fraud
Computer fraud is defined as any demonstration utilizing PCs, the Internet, Internet
gadgets, and Internet services to defraud individuals, organizations, or government
agencies of revenue, income, or Internet access.(Computer Fraud)
iii.
Plagiarism
In an instructional setting, plagiarism occurs when a writer purposely utilizes another
person's language, ideas, or other unique (not common-knowledge) material without
acknowledging its source. (Defining and Avoiding Plagiarism: The WPA Statement on
Best Practices)
iv.
Pornography
Pornography refers to representations designed to arouse and give sexual pleasure to
those who read, see, hear, or handle them. Although sexual stimulation would seem to
be a splendid goal, it is not always so regarded in a society still characterized as
puritanical. (W.Slade)
v.
Cyber-bullying
Cyber-bullying is bullying that takes place using electronic technology. Electronic
technology includes devices and equipment such as cell phones, computers, and tablets
as well as communication tools including social media sites, text messages, chat, and
websites. Examples of cyber-bullying include mean text messages or emails, rumors
sent by email or posted on social networking sites, and embarrassing pictures, videos,
websites, or fake profiles. (What is Cyberbullying)
vi.
Hacking
Hacking is any technical effort to manipulate the normal behavior of network connections
and connected systems. A hacker is any individual engaged with hacking. The
expression "hacking" generally referred to constructive, cunning specialized work that
was not as a matter of course identified with PC frameworks. Today, be that as it may,
hacking and programmers are most regularly connected with malicious programming
attacks on the Internet and other networks. (Mitchell, 2016)
(https://www.msoutlook.info/pictures/outlook-security-warning-send-email-allow-denyii.
progress-bar.png )
It helps us to browse the safe website
Nowadays, there is a build protective security system from the internet browser itself.
Therefore, whenever we accidently clicked a link to a website that has viruses, the
browser will alert us and redirect us to the previous page before any viruses can get
through the computer system.
(https://our.umbraco.org/
media/upload/ece419d2-fd8d-42b6-bb5e-01ee4c91d07a/error.jpg )
iii.
Internet security process all the incoming and outgoing data on our computer
The image below shows a list of applications that have been opened by the user. It
consists of all Application and Process Monitor related rules that a network security such
as Endpoint Security Console is enforcing for the Applications listed. The Process
Monitor filters processes for potentially malicious system API calls used by programmers
(and hackers) to launch process executables. The screen includes the Application and
file executable name, version number, number of rules being enforced, and the
classification Mode of those rules, which can be set to either allow, deny, or filter
incoming or outgoing traffic. Thus, the data on the computer will be safe. (Privacyware)
(http://www.privacyware.com/img/ESC_UG_11.gif )
iv.
(http://www.removeonline.com/images/warning15.jpg
Disadvantages
i.
ii.
iii.
http
:/
/i.d
ai
lym
ai
l.co
uk/i
pix/
013
01/
1/ar
ti
cle-
2260221-16E238A1000005DC-318_634x395.jpg )
adopted
in
2008
of
tampering,
code,
malicious
hackers,
harassment
service.
attempted
and
cyber
denial
Dont trust everything you see. Even salt looks like sugar
(http://i.dailymail.co.uk/i/pix/2013/01/11/article-226022116E238A1000005DC-231_634x482.jpg)
(https://cdn3.iconfinder.com/data/ico
ns/e-commerce-andsales/512/shield_protection_securit
y_safe_secure_flat_icon-512.png )
REFERENCES
Computer Fraud. (n.d.). Retrieved September 3, 2016, from Computer Hope:
http://www.computerhope.com/jargon/c/computer-fraud.htm
Defining and Avoiding Plagiarism: The WPA Statement on Best Practices. (n.d.). Retrieved
September 3, 2016, from Council of Writing Program Administors:
http://wpacouncil.org/positions/WPAplagiarism.pdf
Lawyerment : What is Computer Crimes Act 1997? (n.d.). Retrieved September 5, 2016, from
Lawyerment: http://www.lawyerment.com/library/kb/Intellectual_Property/1360.htm
Macmillan Dictionary. (n.d.). Retrieved September 4, 2016, from Macmillan Dictionary:
http://www.macmillandictionary.com/dictionary/british/get-rich-quick
Merriam-Webster Dictionary. (n.d.). Retrieved Septemer 5, 2016, from Merriam-Webster
Dictionary: http://www.merriam-webster.com/dictionary/negligence
Merriam-Webster's Learner's Dictionary. (n.d.). Retrieved September 3, 2016, from MerriamWebster: http://www.merriam-webster.com/dictionary/identity%20theft
Mitchell, B. (2016, February). What is Hacking? Retrieved Septemmber 3, 2016, from About
Tech: http://compnetworking.about.com/od/networksecurityprivacy/f/what-is-hacking.htm
Privacyware. (n.d.). Retrieved September 5, 2016, from Using Endpoint Security ConsoleManaged Network: http://www.privacyware.com/esc_product_tour01.html
Rouse, M. (2010, October). Definition : Cybercrime. Retrieved August 31, 2016, from
Techtarget: http://searchsecurity.techtarget.com/definition/cybercrime
Tan, N. (2015, May 25). Tech Opinion. Retrieved September 3, 2016, from The Star online:
http://www.thestar.com.my/tech/tech-opinion/2015/05/27/cybercriminals-wreak-havoc-on-socialmedia/
The Causes and Criminals. (n.d.). Retrieved September 5, 2016, from Calling off Cyber Crime:
https://sites.google.com/site/callingoffcybercrime/the-causes-and-criminals
The Star. (2014, September 23). Nation. Retrieved September 3, 2016, from The Star online:
http://www.thestar.com.my/news/nation/2014/09/23/cyber-crime-malaysians-sixth-mostvulnerable/
W.Slade, J. (n.d.). The Definition of Pornography. Retrieved September 3, 2016, from Frontline:
http://www.pbs.org/wgbh/pages/frontline/shows/porn/etc/definition.html
What is Cyberbullying. (n.d.). Retrieved September 3, 2016, from Stop bullying.gov:
https://www.stopbullying.gov/cyberbullying/what-is-it/