Date post: | 24-Oct-2014 |
Category: |
Documents |
Upload: | ibrahim-drahman |
View: | 60 times |
Download: | 4 times |
(ASSIGNMENT TEMPLATE – ENGLISH VERSION) (COVER PAGE)
< FACULTY >
< SEMESTER SEPTEMBER/ YEAR 2011>
< COURSE CODE OUMH1203>
< COURSE TITLE ENGLISH FOR WRITTEN COMMUNICATION>
MATRICULATION NO : <730620135307001>
IDENTITY CARD NO. : <730620135307>
TELEPHONE NO. : <0138290590>
E-MAIL : <[email protected]>
LEARNING CENTRE : <SIBU LEARNING CENTER>
COURSE> CODE>
Table of Content Page
1. INTRODUCTION 1
2. CONTENT
2.1 CLASSIFICATION OF CYBER CRIMES 2
2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA 7
2.3 SUGGESTIONS TO CURB CYBER CRIMES IN MALAYSIA 10
3. CONCLUSION 12
4. REFERENCES 13
5. APPENDIXES 14
1
COURSE> CODE>1 INTRODUCTION
Globalization, technologies, information systems and the Internet are without a doubt
have become a vital components of successful in shaping the way businesses and
organizations are done today. While these phenomena are known to have brought global
business to a whole new level, they have also brought with them, the mixed blessing
called “cybercrime.” Cybercrime has become a silent global digital epidemic. The effect
of cyber crimes has not only experienced in modern country but it is spreading to all over
the world including Malaysia. Therefore, there is a need to give the matter a serious
concern and to curb it before it is too late. This paper would discuss comparatively
between cyber crimes in Malaysia and United States of America, and making some
suggestion on what should be done in Malaysia to manage and control this epidemic.
Cybercrime is criminal activity done using computers and the Internet. This includes
anything from downloading illegal music files to stealing millions of dollars from online
bank accounts. Cybercrime also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business information on
the Internet. http://www.techterms.com/definition/cybercrime
Fafinski, & Minassian (2008) quoting Wall (2007), define cybercrime as “the
transformation of criminal or harmful behavior by networked technology”, while Wilson
(2007) puts it simply as a “crime that is enabled by, or that targets computers”. Other
synonyms exist like “computer crime” and “internet crime”, are also found in literature.
Cybercrimes can range from criminal activity against data to content and copyright
infringement (Gordon & Ford, 2006).
Further, as the Internet usage in the country grows, the total number of online
transactions along with other activities is likely to increase, which, in turn, increase the
number of online crime incidences. Besides, growth in broadband and wireless capacity
makes the Internet more convenient and quicker to use. But unfortunately, these utilities
could be used as means for Internet crimes. Businesses, governments and individuals
have all played victim to cybercrime. In addition, the ongoing economic crisis across the
2
COURSE> CODE>world will also boost cyber crimes. The problem of insufficient awareness about cyber
security or Internet-safety practices among Malaysians surfing on the Web continues to
pose a big challenge. For example, some users do not own a distinct password while
many are not updating their security software.
2.1 CLASSIFICATION OF CYBER CRIMES
Cyber crime encompasses a wide varieties of criminal offences and activities. Cyber
crime could reasonably include a wide variety of criminal offences and activities. The
scope of this definition becomes wider with a frequent companion or substitute term
“computer-related crime.” Examples activities that are considered cybercrime can be
found in the United Nations Manual on the Prevention and Control of Computer-Related
Crime. The manual includes fraud, forgery, computer sabotage, unauthorized access and
copying of computer programs as examples of cyber crime.
(www.uncjin.org/Documents/EighthCongress.html).
2.1.1 VIRUS DISSEMINATION
Some of the most notorious computer crimes have involved computer viruses, such as the
Melissa virus that appeared on the Internet in March 1999 and infected systems in the
United States and Europe, and the February 2000 distributed denial of service (DDS)
attacks on several leading commercial Web sites including Yahoo!, E*Trade,
Amazon.com, and eBay.
In fact, different countries will have different set of rulings covering various cyber
crimes. For example, in U.S. if you intent to extort from anyone any money with threat to
damage one’s computer or to obtain information in the protected computer without
permission.
2.1.2 SOFTWARE PIRACY
3
COURSE> CODE>Cyber-crimes are frequently grouped into three categories. The first are those in which
the computer comprises the "object" of a crime and in which the perpetrator targets the
computer itself. This includes theft of computer processor time and computerized
services. The second category involves those in which the computer forms the "subject"
of a crime, either as the physical site of the offense or as the source of some form of loss
or damage. This category includes viruses and related attacks. Finally, the third category
includes those in which the computer serves as the "instrument" used to commit
traditional crimes in cyberspace. This encompasses offenses like cyber-fraud, online
harassment, and child pornography.
Though teenage hackers and underage, e-fraud perpetrators have captured headlines, no
"typical" cyber-criminal exists. Perpetrators also commit cyber-crimes for a variety of
reasons. Motives range from a desire to showcase technical expertise, to exposing
vulnerabilities in computer security systems, retaliating against former employers, or
sabotaging government computer systems. Cyber bullying is one of the largest analyzed
crimes of the internet.
Because cybercrime covers such a broad scope of criminal activity, the examples above
are only a few of the thousands of crimes that are considered cybercrimes. While
computers and the Internet have made our lives easier in many ways, it is unfortunate that
people also use these technologies to take advantage of others. Therefore, it is smart to
protect yourself by using antivirus and spyware blocking software and being careful
where you enter your personal information.
2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA
Estimates are that computer crime costs victims in the USA at least US$ 5×108/year, and
the true value of such crime might be substantially higher. According to Norton report, in
order to resolve a cybercrime it can takes on average 28 days with the costs on averages
USA $334*.
Cyber space is a virtual space that has become as important as real space for business,
politics, and communities. Malaysia’s commitment in using Information and
Communication Technology (ICT) as reflected by the investment in the Multimedia
4
COURSE> CODE>Super Corridor (MSC) and its Flagships increases our dependency on cyber space.
However, this dependency places Malaysia in an extremely precarious position because
cyber space is vulnerable to borderless cyber attacks. There is also the National Cyber
Security Policy which aims to reduce the vulnerability of ICT systems and networks. It
tries to instill a culture of cyber security among Internet users and strengthen Malaysian
self-reliance in terms of technology and human resources. Not many countries have such
a policy or enacted laws like the Computer Crime Act 1997 and the Communication and
Multimedia Act 1998.
CyberSecurity Malaysia is the national cyber security specialist under the Ministry of
Science, Technology and Innovation (MOSTI) that runs the Cyber999 Help Centre which
is tasked with eradicating cyber crime.
Ethical hackers are not individuals who trespass and steal information but those who help
strengthen existing systems from being hacked. Moreover, the increase in ethical hackers
allows for more far-reaching cyber security as well as a more thorough examination of
computer systems, including the internet and computer applications.
The fundamentals have been put in place. I believe the security and safety in Malaysian
cyberspace is much better than in some developed countries. For example, if a malicious
virus arrives in Malaysian space, we can stop it within 24 hours. We do this by working
with banks, MCMC, ISPs and the police. If you talk about a 100m sprint, we are the
fastest. Our cyberspace is well governed.
Ethical hackers would be able to determine if any data was at risk of being compromised
and suggest ways of overcoming such weaknesses. Incidents of cyber crime in the
country jumped by 127 per cent last year, or the equivalent of 8,090 cases compared to
3,564 cases in 2009, CyberSecurity Malaysia announced today. – Bernama
Malaysia was amongst the first few countries in the world to introduce cyber laws. An
example of such cyber is the Computer Crimes Act 1997. This cyber law addresses and
looks into areas of cyber crime activities. RESOL
The U.S. Department of Justice (DOJ) broadly defines computer crimes as "any
violations of criminal law that involve knowledge of computer technology for their
perpetration, investigation, or prosecution." Accurate statistics on the extent of this
5
COURSE> CODE>phenomenon have proven to be elusive because of the difficulty in adequately defining
computer crimes. The statistics also are untrustworthy due to victims' failure to report
incidents. The aggregate annual losses to businesses and governments are estimated to be
in the billions of dollars.
According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300
million users around the globe accessed the World Wide Web. Of those, at least 1 million
were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-
crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal
of stolen goods. The potential threat to the overall development of e-commerce was
serious—so much so that online security expenditures were expected to double to $30
billion in 2004.
There is wide variation in state statutes on computer crime in the USA. California,
Minnesota, and Maine are among the few states to prohibit explicitly release of a
computer virus or other malicious program.
2.3 SUGGESTIONS TO CURB CYBER CRIMES IN MALAYSIA
California also provides for the forfeiture of computer systems used in the commission of
a computer crime. Many of the universities in the United States and the United Kingdom
offer criminology programs with a course in cyber crime. The mushrooming courses on
cyber forensics prove that universities are more interested in the practical investigative
part of cyber crimes than the causation of cyber crimes. Cyber crime under the Computer
Crime Act 1997 such as hacking, e-mail fraud, Internet fraud, ATM/credit card fraud.
This report reveals the lack of justice and powerlessness felt by victims worldwide; it
exposes risky online behaviors and advises ways to reclaim the Internet from criminals.
Victims the world over need to start taking a stand against cybercrime. Combining
common sense with the right computer software makes a massive difference to fighting
cybercrime.
It’s time to:
• stop being frozen by fear and turn embarrassment into empowerment
6
COURSE> CODE>• report all incidents to the authorities so the true picture of cybercrime emerges
• support the global Internet community by taking individual actions. The safer you are,
the safer others can be.
Everyone can contribute. Common sense is free, but free security or just antivirus
software is not enough. Cybercriminals are always looking to get around security
software, so the more comprehensive your security suite, the better. The right software
keeps them away.
Suggestions:
At the moment, nearly a third of victims globally (31%) say they never resolved a
cybercrime. Most cyber crimes are financially motivated. The impact of the economic
downturn and financial crisis could potentially lead to the increase in cyber crime cases
globally. With people becoming jobless and unemployed, it can lead to the boom in
spam, especially those related to false job offers. To combat cyber crime effectively, an
integrated approach is needed. The responsibility should be shared by the government,
corporations, industry and public.
To fight computer crime or e-fraud, KPMG Malaysia has set up its own super sleuths
under a new department called Forensic Technology Services (FTS). In business for the
last three years and backed by its own computer gizmos, the FTS team can turn a blank
monitor into a picture of incriminating evidence, which is vital in criminal proceedings.
KPMG analysts use the latest techniques, including data extraction, data storage, data
mining and visualization, password cracking and de-encryption, to provide a cost-
efficient resolution to data investigation. They have also worked closely with the police.
(New Straits Times, 3/6/2005).
If businesses can make great use of these unifying measures, so can the criminals. Inspire
by this perception and also due to the emerging international crime-related issues, there is
a possibility of governments from all over the world to unify in enacting a set of
international laws accepted by most, if not all. To ensure comprehensiveness, such
enactment shall take into consideration cyber activities that are beyond traditional areas.
7
COURSE> CODE>Criminals have adapted the advancements of computer technology to further their own
illegal activities and these inventiveness have however, far out-paced the ability of law
enforcement agencies to react effectively. Therefore, within the law enforcement
agencies, a set of rules must be developed to address the various categories of computer
crime. As such, investigators will know what and which materials to search and seize, the
electronic evidence to recover, and the chain of custody to maintain. Only then we can
truly enforce law and order into “no man’s land”.
As technology in ICT becomes more advanced, law enforcement agencies must provide
their computer crime investigators with the technology required to conduct complex
computer investigations. Besides access to technology, law enforcement agencies must
also be given forensic computer support as many computer crimes leave “footprints” on
the computer as well as on the Internet. Most prosecutors also lack the training and
specialization to focus on the prosecution of criminals who use computer-based and
Internet system as a means of committing crimes. Thus, they must have a working
knowledge of computer-based and Internet investigations if they are to handle these
crimes effectively. Getting quality teachers to teach cyber crimes, laws, and investigation
is one of the biggest challenges in developing programs in cyber criminology.
Firms should secure their networked information. Laws to enforce property rights work
only when property owners take reasonable steps to protect their property in the first
place. As one observer has noted, if homeowners failed to buy locks for their front doors,
should towns solve the problem by passing more laws or hiring more police? Even where
laws are adequate, firms dependent on the network must make their own information and
systems secure. And where enforceable laws are months or years away, as in most
countries, this responsibility is even more significant.www.mcconnellinternational.com
Page 9
2. Governments should assure that their laws apply to cyber crimes. National
governments remain the dominant authority for regulating criminal behavior in most
places in the world. One nation already has struggled from, and ultimately improved, its
legal authority after a confrontation with the unique challenges presented by cyber crime.
It is crucial that other nations profit from this lesson, and examine their current laws to
discern whether they are composed in a technologically neutral manner that would not
8
COURSE> CODE>exclude the prosecution of cyber criminals. In many cases, nations will find that current
laws ought to be updated. Enactment of enforceable computer crime laws that also
respect the rights of individuals are an essential next step in the battle against this
emerging threat.
3. Firms, governments, and civil society should work cooperatively to strengthen legal
frameworks for cyber security. To be prosecuted across a border, an act must be a crime
in each jurisdiction. Thus, while local legal traditions must be respected, nations must
define cyber crimes in a similar manner. An important effort to craft a model approach is
underway in the Council of Europe (see www.coe.int), comprising 41 countries. The
Council is crafting an international Convention on Cyber Crime. The Convention
addresses illegal access, illegal interception, data interference, system interference,
computer-related forgery, computer-related fraud, and the aiding and abetting of these
crimes. It also addresses investigational matters related to jurisdiction, extradition, the
interception of communications, and the production and preservation of data.
Finally, it promotes cooperation among law enforcement officials across national borders.
Late in its process, the Council began to consider the views of affected industry and civil
society. This process is making the Council’s product more realistic, practical, efficient,
balanced, and respectful of due process that protects individual rights. At this point, most
observers support provisions to improve law enforcement cooperation across borders.
However, industry, through the World Information Technology and Services Alliance
(see :www.witsa.org/press/), argues that the requirements on service providers to
monitorcommunications and to provide assistance to investigators, as outlined in the
Draft Convention, would be unduly burdensome and expensive. Another provision
considered objectionable could criminalize the creation and use of intrusive software, or
hacking programs, which are designed for legitimate security testing purposes. This
action could stifle the advances in technology vital to keep up with evolving cyber
threats. Privacy and human rights advocates (see www.gilc.org) object to the Draft
Convention’s lack of procedural safeguards and due process to protect the rights of
individuals, and to the possibility that the ensuing national laws would effectively place
restrictions on privacy, anonymity, and encryption.
9
COURSE> CODE>The Council plans to release a final draft of the Convention in December 2000. In 2001, a
political process involving national governments will determine the scope and coverage
of the final Convention. Because of cyber crime’s international potential, all countries,
and all companies, are affected. Interested parties, including national governments from
outside Europe, and businesses and non-governmental organizations from around the
world, should participate vigorously in a consensus process to develop measures that
support effective international law enforcement and foster continued growth and
innovation. Page 10 www.mcconnellinternational.com
“We’ve become accustomed to getting so much of what we need off the Internet for free.
So it’s difficult to train people to think about paying for something in this otherwise free
place. They don’t regard it in the same way as regular commerce. The psychology around
the Internet is that if it’s out there, it’s fair game.” – Joseph LaBrie, PhD
3 CONCLUSION
The fact of the matter is, however, that people do feel hurt and violated by others on the
web all the time. The Internet is a medium for freely sharing information and opinions.
However the criminals who trash other people's websites are acting as self-appointed
censors who deny freedom of speech to those with whom they disagree. These criminals
often make the self-serving excuse for their actions that they only attack sites sponsored
by bad corporations or bad people.
However,
. By taking responsibility for our own characters and responsibilities on the web, in the
long run we will benefit from it. By protecting ourselves, we protect our best interests,
and that is what freedom is all about. The fundamental issue in most computer crime is
the criminals' lack of respect for the property or privacy of other people. I hope that
society will recognize the seriousness of computer crime and demand more severe
punishment for such criminals. The issue of cyber crime has been a problem in Malaysia
and United States of America and most of the other countries that depend on the
technologies and gadgets that prone to the irresponsible cyber criminals. Therefore with
the cooperation from everybody, I hope this issue can be handled and managed.
10
COURSE> CODE>ATTACHMENT
REFERENCES
Jaishankar, K. (2007). Cyber criminology: Evolving a novel discipline with a new
journal. International Journal of Cyber Criminology, 1(1), 1–6.
Jaishankar, K. (2007). Editorial: Establishing a Theory of Cyber Crimes. International
Journal of Cyber Criminology, 1(2), 7–9.
Branscomb, Anne Wells. "Cyberspaces: Familiar Spaces or Lawless Frontiers?" Nov. 10,
1998.
http://ecommerce.hostip.info/pages/237/Computer-Crime-DEFINITIONS.html
http://mpk.rmp.gov.my/jurnal/2005/whitecollarcrime.pdf
http://www.techterms.com/definition/cybercrime
http://us.norton.com/theme.jsp?
themeid=cybercrime_report&inid=us_hho_downloads_home_link_cybercrimereport
http://www.spamfighter.com/News-11776-Malaysia-Experiencing-Rise-in-Cyber-
Crimes.htm
http://ecommerce.hostip.info/pages/237/Computer-Crime-DEFINITIONS.html
http://ecommerce.hostip.info/pages/237/Computer-Crime-DEFINITIONS.html
http://www.themalaysianinsider.com/malaysia/article/cyber-crime-increased-by-127pc-
in-2010/
http://www.cybersecurity.my/en/media_centre/media_faqs/media_faqs/main/detail/1691/
index.html
http://www.cybersecurity.my/data/content_files/13/134.pdf?.diff=1177182839
http://www.levity.com/julian/cyberculture.html
11
COURSE> CODE>
12