Académique Documents
Professionnel Documents
Culture Documents
“Computer hackers are a big threat when It comes to the computer security. It is a big
question how computer security can be affected by computer hackers. The one that create
threats on the computer are the people who victimize others for their own gain while
computer is the platform to perform the activity. Computer hackers are unauthorized users
who illegally break and access into computer systems of the victim in order to steal, modify,
alter or destroy information. Often, the computer hacker usually will destroy information by
installing dangerous malware without knowledge or consent of the victim. The computer
hacker’s clever tactics and good computer skills will help them to access valuable
information that people would not want them to have.”
“Other than that, in order the computer hackers to give a threat to people, they will
perform their activity by targeting anyone who uses a computer which connected to the
internet as it is one of the threats that computer hackers pose. The methods that computer
hackers typically use are phishing scams, spam email and suspicious Web sites to send
dangerous malware to victim’s computer and compromise the computer security illegally.
Besides, if the victim’s computer is not protected with a firewall, computer hackers can easily
access to their computer and private information directly. The computer hackers can monitor
your conversation on any medium or intruding your personal Web page.”
“One of the big threats that computer hackers do to us is while user connected to the
internet, the malware that computer hacker has installed on our PC will be able to transmits
our personal and financial information without out consent or authorization. They also can
hijack victim’s usernames and passwords, steal victim’s money and open credit card and
bank accounts in their name, ruin victims credit card, request new account Personal
Identification Numbers (PINs) or additional credit cards, make purchases online, use and
abuse victim’s Social Security number and etc.”
“This paper examines concept of the computer hackers and its relation to
Malaysia/society and to understand the law applied in Malaysia. The law applied in Malaysia
for computer hackers is falls under Malaysia’s CCA 1997. The authors need to understand
the basis of policy that gives powers of investigation and sets penalties in computer crime
legislation for the computer hackers. The Malaysian legislation will be compared with that
from other countries. The paper will seek to answer several questions: What is the current
computer crime situation in Malaysia? Is Malaysia enforcing its CCA 1997, and what are the
difficulties? What can Malaysia learn from other countries in order to amend or fine tune the
CCA 1997? The paper focuses on violations that deal with hacking and unauthorized access
to computer-based information systems.”
2. Literature Review
“Indeed, hacking is a very complicated ethical and legal issue that causes problems
regarding the creation of laws and the enforcement of policies. Computer hackers may be
driven by greed, power, revenge, adventure and the desire to be able to penetrate a secured
system. It can also be ideologically motivated, as when someone attacks the web site of
religious or political groups to erase or change their content, therein entailing an element of a
dangerous adventure. The fact that these destructive activities will bring official”
condemnation is often sufficient to attract the defiant, the rebellious, or the curious
(Grabasky, 2001). “An example of hacking attack is Denial of Service, a crime that is unique
to computer systems. In February 2000, a number of targeted sites which included amongst
others, Amazon.com, Yahoo.com, and CNN.com who were flooded with phony connection
requests. Bogged down by efforts to handle all the requests, these sites slowed to a crawl or
crashed.”
“As for the prevention of such attacks, a number of fixes have been proposed
(Bellouin, 2001), including encryption and firewalls. Despite all these efforts, computers are
still being hacked. Why haven’t these solutions worked? Hackers have ways to overcome
these solutions and come out with new methods of breaking into systems. Certainly,
computers will still face threats with the emergence of new technologies (Posch, 2001).
Detecting an intrusion is a first step in defending against a hacking attack (Durst et. al 1999).”
“In Malaysia as elsewhere, there has been an increase in the number of Internet
Providers (IPs), and in the number of users. Within a population of 27.4 million in the year
2006, there are about 11.0 million Internet users in Malaysia today (Malaysian Statistics
Dept., 2006). The growth of the Internet has meant more windows of opportunities for
computer crimes. To anticipate such abuses, the Malaysian Parliament has passed several
pieces of cyber related legislation since 1997.”
The Royal Malaysia Police (RMP) as the main law enforcement agency in the country
has specific offences to deal with. Among the offences investigated by the Commercial
Crime Investigation Department (CCID) of RMP are cyber crime under the Computer Crime
Act 1997 such as hacking, email fraud, Internet fraud, ATM or credit card fraud. (Shuan,
2005). According to the South China Morning Post (2016) There has been a sharp spike in
computer hacking cases detected by CyberSecurity Malaysia (CSM) over the past two years,
and explained that the use of “ransomware” has been on the rise since 2015. “These were
cases where victims’ computers were infected by malicious software, preventing users from
accessing the system until a sum of money was paid and hackers will take over the system
before blackmailing the victim” says Malaysia’s Science, Technology and Innovation Deputy
Minister Datuk Dr Abu Bakar Mohamad Diah.
“According to the case of United States of America V. Gregory (N.D. TX). This case
is classified as a telecommunication fraud and computer hacking. This case was chosen for
discussion, as it is involved in computer hacking. Among other things, it includes use of
stolen access devices, PIN obtained from other hacking organization and stolen credit card
information. With access to these equipment and information, Gregory could make free
teleconferences at the expense of the Telecommunication Service Provider. An important
lesson or reminder that we can take from this case is that the hacker network is large and they
are willing to trade information amongst themselves. Therefore, there are both pros and cons
about this situation. The obvious disadvantage against the authorities is that they are fighting
against a very large network of cyber criminals. The advantage for the authorities is that there
are more leads to follow up on. The more people who are involved or know about a crime,
the higher the likelihood of obtaining useful leads to the criminals.”
According to Ishak (2005) Malaysia is a hacker’s heaven. People think that the
internet security of most organizations in Malaysia is far from secure. "The system
administrators of the organisations or companies should pay attention to the latest in
information technology It is easy to hack a website and to find weaknesses in the system.
Even a primary school kid can do it. If a hacker is malicious, he can do a lot of damage to a
system or to individuals. Hackers can re-create a bogus website that looks exactly like the
real one and no one can tell the difference. This is not such good news if you are a banking
website, for example. It does not even take a computer genius to hack, according to hackers.
You can find hacking software on the Internet and downloading the programmes and using
them maliciously is just a click away.” said Anonymous, 24, a hacker from Shah Alam.
References
Fadzil, F (2016, 2 November) Sharp rise in Malaysian hacking cases. Soutch China
rise-hacking-cases-over-past-two-years