Vous êtes sur la page 1sur 2

Definition of Cyber Crime

Criminal activities carried out by means of computers or the Internet.


Facts
1. Cyber crime has surpassed illegal drug trafficking as a criminal moneymaker.
2. Somebodys identity is stolen every 3 seconds as a result of cybercrime around the world.
Without a sophisticated security package, an unprotected PC can become infected within four minutes
Categories
Generally, there are two types of cyber crimes:
1. Type 1 cybercrime is usually a single event from the perspective of the victim. An example would be
where the victim unknowingly downloads a Trojan horse virus, which installs a keystroke logger on his
or her machine. The keystroke logger allows the hacker to steal private data such as internet banking
and email passwords.
Example: Phishing
2. Type 2 cybercrime tends to be more serious and cover things such as cyberstalking and harassment,
child predation and extortion.
Example: The target is contacted in a chatroom by someone, over time, attempts to establish a
relationship. Eventually, the criminal exploits the relationship to commit a crime.
3. of connecting to the internet.
Methods
Criminals committing cybercrime use a number of methods, depending on their skills and goals. Here are some
of the different ways cybercrime can take shape :
1. Fraud (Bank fraud, identity theft, extortion, theft of classified information)
2. Copyright infringement
3. Child pornography
4. Cyberbullying (When the Internet, cell phones or other devices are used to send or post text or images
intended to hurt or embarrass another person)
Explanation
1. The National Crime Prevention Association lists tactics often used by teen :
- Pretend they are other people online to trick others
- Spread lies and rumours about victims
- Trick people into revealing personal information
- Send or forward mean text messages
- Post pictures of victims without their consent

Example of Foreign Cases
1. A 17 year old hacker hacked his friends Gmail account without permission and changed the settings so
that the account owner could not access, in a bid of depression as his friend had told another friend not
to spend time with him.
2. A 12-year-old girl stole virtual currency called Ameba Gold by hacking dozens of people IDs she met
though the membership-based social networking site Ameba Pigg.
3. Metropolitan Police Department reported early in the year 2013 that around 160 user IDs of Tokyo-
based e-book sellers Kinokuniya Co. were confirmed to have been hacked to illegally download some
36,000 e-books worth about 21.7 million yen (around 200,000 US dollars) for free from Kinokuniyas e-
book sales application.
Example of Local Cases
1.
Statistics
1. In 2013, between January and July, RM 1 billion has already been stolen through cybercrime, making
losses due to online fraud in Malaysia the sixth highest in the world.

Preventive Actions
1. Teach Malaysians about how these crimes work (so that they avoid falling into some traps) Aimed at
young people who frequently use internet-enabled devices, but who may also be more vulnerable to
online criminals due to a lack of knowledge about fraud.

Vous aimerez peut-être aussi