Vous êtes sur la page 1sur 17

SEPTEMBER/ 2011

OUMH1203

ENGLISH FOR WRITTEN COMMUNICATION

NAMA NO. MATRIKULASI NO. KAD PENGENALAN E-MEL

: : : :

Norizawati binti Baba 741020115672001 741020-11-5672 norizawatib@yahoo.com

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

1.0

INTRODUCTION
1.1 Definition 1.1.1 Cyber is referred to the technology of computers or of the culture of computer. (Dictionary-Meriam Webster, 2011) 1.1.2 Crime is defined as illegal activities (Dictionary.com, 2011) 1.1.3 Cyber crime is defined as computer crime (Wikipedia, 2011).

1.2 What is Cyber Crime? Based on http://en.wikipedia.org/wiki/Computer_crime defined computer crime or known as cybercrime as any crime that involves a computer and a network @ internet. Cybercrime can appear on nowadays communication tools such as Skype, Face book, Twitter or any other communication and interactive sources. This crime becomes worst and the cracking, copyright infringement, child pornography and child grooming. For those who are lack of information technology, they will feel that these crimes will collapse them to cyber crime. From http://www.crime-

research.org/analytics/702/ defined cyber crime as a criminal activity connected on the internet. There are three types of cyber crime which are against person, property and also government. In more specific point, cybercrime can be identified into eight categories which are telecommunications, electronic vandalism, terrorism and extortion, stealing telecommunication services, telecommunication privacy,

pornography and other offensive material, telemarketing fraud and electronic money laundering. Based on http://cybercrime.planetindia.net/intro claimed first recorded cyber crime appeared on 1820. A textile manufacturer in Franca, Joseph-Marie Jacquard produced the loom. The device allowed continuously of a series of steps in the weaving of special fabrics. This is consequence to his employment and livelihood was being threatened and this is the first cyber crime that has been recorded. Recently, issues concerning on computer security have considerable received on academic attention. Cyber security has become a top priority for many organizations,

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

industries or even government especially in education. These kinds of crime have focused on primarily on the technical dimension of computer crime nowadays. Based on the explanation of cyber crimes defined from different web pages above it can be concluded that Cyber crimes is a type of crime which uses computer and software as a medium to do crime by which the target victim is also the computer as well as individual. This, furthermore, influence the functioning of computer or the computer system.

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

2.0

CONTENT 2.1 CLASSIFICATION OF CYBERCRIME


Based on http://www.lawyersclubindia.com/articles/Classification-Of-

CyberCrimes--1484.asp there are 4 major categories of cyber crimes classification which are: (A) Cyber crime against Individual This type of cyber crime includes email spoofing, spamming, cyber defamation and harassment & cyber stalking.

(B) Cyber crime Against Property It includes credit card fraud, intellectual property crimes and Internet time theft.

(C) Cyber crime Against Organization This includes unauthorized accessing computer, denial of service, virus attack, email bombing, Salami attack, logic bomb, Trojan horse and Data diddling.

(D) Cyber crime Against Society This type of Cyber crimes includes forgery, cyber terrorism and web jacking. \ While in http://www.crime.hku.hk/cybercrime.htm has classified nine types of cybercrime, which are: Theft of telecommunications services Communications in furtherance of criminal conspiracies Telecommunications piracy Dissemination of offensive materials

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

Electronic money laundering and tax evasion Electronic vandalism, terrorism and extortion Sales and investment fraud Illegal interception of telecommunications Electronic funds transfer fraud

Computer crime or cyber crime is an abuse of computer crime which performed on electronic media with the purpose of influencing on the functioning of computer or on computer system. Computer crime is a crime which focused on computer target, computer as a tool of crime and computer is incidental to crime. These are based on what defined by http://www.cybercellmumbai.com. Based on this website too, it has listed some type of cyber crime which are hacking, denial of serving attack hacking, virus dissemination, software piracy, pornography, IRC crime, credit card fraud, net extortion, phishing, spoofing, cyber stalking and etc. . 2.1.1 HACKING Hacking is known as cracking which the crime that committed towards collapsed into a network/ computer. The English verb hacking commonly defined as

referring to the act of re-designing of the configuration of hardware or even software system to alter the intended function. Based on

http://www.cybercellmumbai.com defined hacking is an illegal intrusion into a computer system without the owner permission. This is an act by criminal who floods the band width of the victims network and spam his/her email box which is depriving them to access what they want to. Hackers could hack user account in order to send virus through posting something to user wall. For example in facebook account. When user received the messages send by the hacker, the viruses automatically send and collapsed the whole computer. The hackers

motives are, might be they are greedy, have power to do that, to earn the publicity, to take revenge, to have some adventures, they desire to access forbidden

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

information, they have destructive mindset and wants to sell or offer security services. Cyber crime in USA is not new for them. There are many type of viruses that attaches itself to other software; virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and others that can collapsed the computer tools.

2.1.2

PORNOGRAPHY Pornography is the first consistently successful ecommerce product although nobody realized it. Pornography is aim to encourage their customer to access their website no matter what age they are. Even the children could access log in to the website with just a mouse click on. Based on

http://en.wikipedia.org/wiki/pornography cited pornography could be use in any of a variety of media such as took from books, magazines, photos, sculpture, drawing, painting, animation, video and even video game. Unluckily, when these sexual acts are going to performs for a live audience, the definition is not come to pornography thus as the term that applies to the depiction of the act rather than the act itself. Child pornography is a big issue in cyber crime which involved children since in the mid 1990s onwards. The awareness influences the child pornography by the media increasing in both respects to itself and even with regard to child pornography using the use of internet. People did not realize that child pornography has spread into a key arena of law enforcement and similar social focus and it has become an international business. There are a number of sexually candid photographs of children at any given point of time. Internet has undoubtedly makes this crime easily available and this easy availability has most probably intends that psychological obstruction such like embarrassment or fear of revelation are lack of efficient in restricting accessibility.

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

2.1.3

ELECTRONIC VANDALISM From http://www.nap.edu/openbook.php website cited the electronic vandalism and other computer-related crime is still unknown. In United States has been estimated 2 million up to 730 million but only 14 percent are reported. As we know antivirus programs have become wide and based on Eberhard Wunderlich of AT&T noted there is a trend in moving beyond user passwords to smart cards for access control, encryption and electronic signature. Many cases of the internet are successful. The internet has become a main part of commerce and culture but it is still a free for all users when it comes to face in computer meltdown which means the dangerous effect.

2.1.4

ELECTRONIC MONEY LAUNDERING From http://en.wikipedia.org/wiki/Electronic_money website defined electronic money laundering is known as e-currency, e-money, electronic cash, electronic currency, digital cash, digital currency and cyber currency. It is refers to money which is only transfer to electronically. Normally, all these type of crime involves the use of internet and digital stored value. Only the expert user knows how to manipulate the internet importance. Electronic money has been an attractive problem for cryptography. Cryptography is a kind of secret writing or secret code. Hong Kong and Singapore are two cities that have implemented the function of electronic money systems. Electronic money transfer is not only focus in the use of internet but in Singapore, they have an electronic money program for their own public transportation system such as commuter trains, transit fare collection bus, LRT and so on. Quite a big number of electronic money systems use contactless payment transfer due to facilitate easy payment and make the payee more confidence in not leave it their electronic wallet goes during the transaction. http://en.wikipedia.org/wiki/contactless_payment defined the contactless payment systems are the example of credit cards and debit cards, key fobs, smartcards or other procedure which used to make secure payments.

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

2.2

COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA

2.2.1

CYBER CRIME IN MALAYSIA

The most cyber crime entrust in Malaysia is financial which it is based stated on Bernama news outlet. Based on Tommy Seah in Bernama, voluntary group chairperson of International Cybercrime and Forensics Examiner Group of Companies said the most widespread of financial crimes in Malaysia were financial statement frauds, procurement frauds and misappropriation of assets. Although Malaysia is well- known as a pretty peaceful country but it cannot be avoid in preventing such crimes. Malaysian people commit that economic crimes via cyber is an attempt as to fulfill the desire for a better life. When they could not achieve it by using the legitimate task, people will do any simple and easy task and willing to adopt and edit the illegal ways of getting what they aimed to get. Usually, their aims involve in this crime are steal the money, revenge and treacherous. According to Broadhurst, and Grabosky (2005) Malaysias

government has invented an Act in 1997 as to handle this kind of crimes. Here is the Computer Crimes Act invented by the Malaysias.

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

Based

on

Cyber

Security

in

Malaysia

on

http://www.cybersecurity.my/

en/media_centre/media_faqs/media_faqs/main/detail/1691/index.html, Cyber crimes had increased to 100 per cent. In 2008 the Cyber Security has handled a total of 2,123 incidents, more than 100 per cent increase compared with 2007. They analyzed the rates of incident by the complaints received and referrals given to them. At the same time this Cyber Security has stated that they not able to see the bigger picture of the cyber-crimes statistic because the police, Bank Negara, Securities Commission and Malaysian Communications and Multimedia Commission (MCMC) have their own statistics. This also might be due to lack of technology which can analyze the statistic thoroughly. During this moment, they have a statistical data captured from their cyber help centre, the Cyber999 service. They found out that many factors can contribute to the increase.

One is that cyber crimes have gone up.


Second is that the number of Internet users has gone up. There are 13.5 million Internet users in the country today and the number is increasing.

So the base has expanded and, correspondingly, complaints have also increased.

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

2.2.2

CYBER CRIME IN AMERICA

According to Casey (2011), in the United States, police departments are establishing computer crimes units, and cybercrime makes up a large proportion of the offences investigated by these units. The National Cybercrime training Partnership (NCTP) encompasses local, state, and federal law enforcement agencies in the United States.25 The International Association of Chiefs of Police (IACP) hosts an annual Law Enforcement Information Management training conference that focuses on IT security and forum on Cybercrime, and a number of European states have signed the Council of Europes. Convention on Cybercrime treaty, which seeks to standardize European laws concerning cybercrime. From this perspective, each organization and the authors of each piece of legislation have their own ideas of what cybercrime is-and isnt. These definitions may vary a little or a lot. To effectively discuss cybercrime in this part, however, we need a working definition. Toward that end, we start with a board, general definition and then define specific one. The US government has also invented IC3 or Internet Cyber Cyber Complaint Center which is responsible to handle cyber-crimes in US.

10

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

Figure 1: 2009 Top 10 Most Common IC3 Complaint Categories (percent of total complaints received) in USA

This figure 1 shows the top 10 most common complaint received by IC3 (Internet Cyber Complaint Center) in USA. This graph is taken from FBI

http://scamfraudalert.wordpress.com/2010/03/13/fbi-2009-cybercrime-statistics/.

scams was the most highest complains received by IC3 and the lowest is the cyber crime which caused the computer damage.

11

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

Figure 2 : Number of cyber-crimes reported every day.

Regarding to first graph above, the graph had shown the number of cyber crime that has been reported every year. The cyber crime incidents happen in America are: IOT Telecommunication Fraud Sabotage of data or network Financial fraud System penetration-outsider Theft of hands or held computers Website defacement Identity theft Computer system abuse TBPCI

12

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

UAPII Unauthorized privilege access TOCH DNPAHS Denial of service attacks Laptop theft Virus, Trojan effected

The project shown above tells us the increasing number of cyber crime incidents that are taking wide place on our internet today. Based on Rust L, 2008 cited that the America is the top rank in having the highest incidence of cyber crime in this global world. In addition based on his study on cyber crime in America, United State, France, Germany, Italy, Spain, Sweden, Brazil and Czech Republic found that up to 39 percent of American has been the victim in cyber crime issues compared to other country. The most common forms of cyber crime feel by American were they are not receiving goods paid at an online auction while they are order something online. American is a progressive country and it was not be a little surprising although it might be an impacted by the fact that that kingdom has an active online users.

According to the Norton Cybercrime report on 2011, seven up to ten online adults are the cyber crime victims. More than 4.5 million Aussies fell into the cyber crime last year which has to suffer 1.8 billion directly on financial losses and additional of 2.8 billion in time to spend in resolving the crime. There are around 8 percent of adult have earn their own experienced in cyber crime using their own mobile phone. The percent has been actively increased a year over year. Not only America, Malaysia too most of the adult nowadays owned their own mobile phone. Based on Norton Cybercrime report on 2011, the number of reported a new mobile operating system vulnerabilities increased from 115 in 2009 to 163 in 2010. This is quite a big number. Lack of protection is the main problem that hardly to protect

13

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

by parents or even government. Cybercrime is much more widespread than people realized. 74 percent of respondents aware of cyber crime but many are not taking the indispensible precautions due to not have the latest security software like AVG antivirus, Kaspersky or even Avira to protect their personal information online. In credit card crime, about 61 percent user does not use the complex passwords or even change it regularly

There is not much differences between cyber crime in Malaysia and America since both kingdoms comes in well develop field. If we could dig the differences between both country might be the different is America is has more expert internet online user since they are from wealthy country. Royal Malaysian Police website posted a written document by Supt. Lim Hong Shuan about the Computer Crimes Act of 1997, Digital Signature act of 1997 and the Telemedicine act of 1997.

2.3

SUGGESTION
Cyber crime is an illegal activity that use internet to carry out some illegal tasks. It is including fraud, spam, identity theft, computer viruses, pornography, electronic money laundering, electronic vandalism, hacking and many more cyber. The victims are not only the working people but also the adult and also the children who have expertise in using the internet. To avoid these things happen in Malaysian education system, the school organizer and also parents have to make sure they have adequate anti-virus software in all computers that provided in school. The examples of anti-viruses software that normally use by internet user are McAfee, Norton Anti-Virus, Stopzilla or other similar programs. The anti-virus that they used should be updated regularly or should be done once a week to locate and eliminate any malware, spyware, viruses and many other problems that related that they could scan using the antivirus software that they could download from the internet or otherwise buy from the computer branches.

14

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

The parents themselves should aware on their children activities in using the internet. They could block the websites by blocking them with useful password. Children are our nations most valuable asset because they represent the bright future of our country and the person who can hold our high hopes for a better nation. Parents and education management have to protect children against the crime to produce a better generations year over year. All individual have to look for these crimes from a security and safety perspective. They have to subscribe to the internet banking and learn about the risk factors. While in social networking sites like Facebook, Friendster, Skype or even Twister, they especially parents should learn about the risk factors and be aware on the risk that deal with people all over the world. They should never strictly blindly trust on people that they did not know from top to toe and must be critical about what they read and see.

15

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

3.0

CONCLUSION
Everybody is using the computers. Not only the students in high education but also in primary education. Many cyber crimes such as collar criminals and also those we have to know the kidnapping crime are also being committed with the help of computer and also the internet. New generation nowadays growing up with computer not only in their home environment but also in their school environment. Everyone aim to build a peace culture of security throughout the awareness programs and best production among children, teenagers, adults, parents and also the organizations. Government have organized and created many activities to improve the level of awareness to prevent this cyber crime to not poison to these individual. The most important thing that Malaysian people have to be aware is the monetary transactions are continuously moving to the internet. Parents themselves have to be alert on their children activities especially while using the internet. Parents should be conscious of the fact that their children may hide the pornographic files on pen drive from them. This problem has to prevent seriously because this might be especially true if the computer is used by other family members. Internet could make children knowledgeable but parents have to play the role in order to prevent any problematic behavior among their children.

16

Comparison Cyber crime in USA and Malaysia

Norizawati Baba 741020115672001

REFERENCES
Casey, E. (2011). Digital Evidence and Computer Crime. Forensic Science, Computers and the Internet.3rd Edition. Academic Press. Wyman Street, Waltham, USA Maya Babu, (2004). What is Computer Crime? Computer Crime Research Center. Retrieved on 27 October, 2011 from http://www.crime-research.org/analytics/702/ Broadhurst, R.G. & Grabosky P.N. (2005). Cyber Crime The Challenge in Asia. Hong Kong University Press. Hing Wai Centre, Aberdeen, Hong Kong. Wikipedia (2011). Computer Crime. retrieved on October 24, 2011 from http://en.wikipedia.org/wiki/Computer_crime Wikipedia (2011). Pomography. retrieved on October 24, 2011 from http://en.wikipedia.org/wiki/pornography Wikipedia (2011). Contacless Payment.. retrieved on October 24, 2011 from http://en.wikipedia.org/wiki/contactless_payment

17

Vous aimerez peut-être aussi