Sie sind auf Seite 1von 5

INFORMATION AND COMUNICATION TECHNOLOGY IN SCIENCE SBI3013 ESSEY: CYBERCRIME

NAME BALKIS BT SAMSUDDIN MATRIC NO D20091035120

NORKAMALIAH BT OSMAN@ D20091035111 MOHD NORDIN NOORSYAZWANI BT MD D20091035113 SHAIMI NUR ELIANA BT MOHMAD D20091035092

NOOR NURUSHUHADA BT YAHYA


CYBERCRIME ESSEY

D20091035102

Computers and the internet are becoming an essential part of our daily life. They are being used by individuals and societies to make their life easier. The tremendous role of computers stimulated criminals and terrorists to make it their preferred tool for attacking their targets. This transformation in crimes from traditional methods to electronic methods is becoming one of the biggest challenges to modern societies. A nation with high cases of crime cannot grow or develop because crime will affect social and economic consequence of the country. Cybercrime is defining as crimes committed on the internet using the computer as either a tool or a targeted victim. It is very difficult to classify crimes in general into distinct groups as many crimes evolve on a daily basis. Cybercrime can be from downloading illegal music files to stealing millions of dollars from online bank accounts. There are seven types of cybercrime such are spam, fraud, obscene or offensive content, cyber terrorism, drug trafficking and harassments. Harassment covers a wide range of behaviors of an offensive nature. Even on the internet, harassment is a crime. Therefore, harassment via the internet is one of the cyber crime. This cyber crime encompasses all the obscenities and derogatory comments directed towards specific individual or individuals focusing. They may not be deemed criminal activities, depending on the jurisdiction. But, when this activity is committed via computer, all jurisdictions will be able to receive them. Examples of harassment are including harassment on gender, race, religion, nationality and sexual orientation. Most commonly it encountered in chat rooms or through newsgroups and by sending hate e-mail to interested target. Obscene or offensive content also included in the type of cyber crime. The contents of some websites and other electronic communications over the net can be really distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal. Many jurisdictions place limits on certain speech and ban racist or inflammatory material that tends to incite hate crimes. These communications unlawful varies greatly between countries and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong belief. Internet pornography is pornography that is

distributed by means of various sectors of the internet, primarily via websites, peer-to-per file sharing or use net newsgroups. One area of internet pornography that has been the target of the strongest efforts at curtailment is child pornography. Cyber terrorism has very wide meaning. We can define it as the unlawful attacks and threats of attack against computers, networks, with the intention to cause harm or further social, ideological, religious, political and many more. The harms such as violence against persons or property and at lease will make the victim fear. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service attacks, or terrorist threats made via electronic communication. Recently, as we can see there have been several cases reported in the media where the internet has helped terrorists in their cyber activities. For examples the virtual world is indeed used to promote cyber terrorism activities. They just sit in front of the computer with access of internet and they just spread their terrorism activities in very short time. Some of the videos published on the Net are related to explosives, attacks, bombing and hostage-taking. This situation will lead to the terrorist or person to plan the same terrorism like what they see in the internet. Some terrorist groups use the internet for the purpose of inter-group communication and inter-networked grouping. With access of internet they can communicate among them even in different country to plan the terrorism. Besides that, it is used to release manifestos and propaganda statements. Aside from generating propaganda, the net is also used to coordinate missions or call meetings and to recruit new members. So that they can develop their own communities in each part of places without boundaries. Spam is mail sent illegally to users for commercial purpose by junk e-mails. Junk e-mails means email that we did not want to receive it. But, if a long-lost brother finds our e-mail address and sends us a message, this could hardly be called spam, even though its unsolicited. Real spam is generally e-mail advertising for some product sent to mailing list or newsgroup. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasilegal services. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent

junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers. Computer fraud is misrepresentation of facts which lead to ones loss. It is commonly understood as dishonesty calculated for advantage. Fraud is made for personal gain or damage another individual. It is most common in the buying or selling of property, including real estate, personal property, and intangible property, such as stocks, bonds, and copyrights. State and federal statutes criminalize fraud, but not all cases rise to the level of criminality. The industries most commonly affected are banking, manufacturing, and government. Fraud can be committed through many media, including mail, wire, phone, and the Internet (computer crime and Internet fraud). It is an independent criminal offense, but it also appears in different contexts as the means used to gain a legal advantage or accomplish a specific crime. For example, it is fraud for a person to make a false statement on a license application in order to engage in the regulated activity. A person who did so would not be convicted of fraud. Rather, fraud would simply describe the method used to break the law or regulation requiring the license. Have you ever heard about drug trafficking through net? If we say drug, I believe everyone know what is drug. In simple word and explanation, drug trafficking is the person who sell drug by using the internet as their business platform. How this happened? Drug traffickers use the Internet as a medium for trading their illegal substances by sending out enciphered e-mail and other Internet Technology. Most of the drug traffickers can be found arranging their illegal deals at internet cafes, using courier websites for the delivery of illegal packages containing drugs, and sharing formulas for amphetamines in restricted-access chat rooms. In providing Malaysia to be an advance country in term of competitive in technology, we cannot escape from the rising and widespread of cyber crime. However, cyber crime is still able to be addressed by the existence of cyber crime act. Thereby, we should be prudent and vigilant in the use of cyber technology in this challenging age.

Das könnte Ihnen auch gefallen