Today, all companies can not get out of the utilization of information technology.
According to Gibson, cyberspace "was a consensual hallucination that felt and looked likea physical space but actually was a computer-generated construct representing abstract data". In further developments in line with the widespread use of computers. This term is then used to designate a space electronics (electronic space), which is a virtual community that is formed through communication that exists within a network kornputer (interconnected computer networks). 'At this time, cyberspace as stated by Cavazos and Morin are:
”represents a vast array of computer systems accessible from remote physical locations”.
The types of crimes based on the type of computer and internet activity
Issues - issues / aspects - legal aspects related.
According to Gibson, cyberspace "was a consensual hallucination that felt and looked likea physical space but actually was a computer-generated construct representing abstract data". In further developments in line with the widespread use of computers. This term is then used to designate a space electronics (electronic space), which is a virtual community that is formed through communication that exists within a network kornputer (interconnected computer networks). 'At this time, cyberspace as stated by Cavazos and Morin are:
”represents a vast array of computer systems accessible from remote physical locations”.
All business sectors are in need of a role in running the business. The most standard is employee database storage digitally in the computer server.
Other functions are so diverse:
Other functions are so diverse:
- storing customer data and business partners
- the sale and purchase transaction records
- management information system
- employee data
- and use of the website.
- E-Commerce
- Privacy and Security on the Internet
- Copyright, Defamation
- Content Regulation
- Disptle Settlement, and so on.
Here is a scope or area to be covered by cyberlaw. The scope of these cyberlaw will continue to evolve with developments in the use of the Internet in the future. Consumer protection laws of each country such that Indonesia would not be enough to help, because the E-Commerce operations across borders (borderless) As the handle (while) we look at the definition of E-Commerce from ECEG-Australia (Electronic Cornmerce Expert Group) as follows:
"Electronic commerce is a broad concept that includes any commercial transactions conducted through electronic means and will include a way as facsimile, telex, EDI, Internet and phone"
The types of crimes based on the type of computer and internet activity
- Unauthorized Access to Computer System and Service
- Illegal Contents
- Data Forgery
- Cyber Espionage
- Cyber Sabotage and Extortion
- Offense against Intellectual Property
- Infringements of Privacy
- Cracking
- Carding
- Defacing
- Phising atau Indentity theft
- Spamming
- Malware
- Child pornography Pronografi
The types of computer crime and internet based motif is divided into 2
1. computer and internet crimes as acts of pure evil
2. computer and Internet crime as a crime of gray
Academically, the term "cyber law" does not seem to be entirely acceptable terminology. This was proved by wearing another terminology for the same purpose as the law of the Inlernet, Law and the Information Superhighway, Information Technology Law, The Law of Information, and so on.In this regard Aron Mefford a cyberlaw expert from Michigan State University until the conclusion that with the widespread use of the Internet actually has a kind of "paradigm shift" in determining the identity of the perpetrator of a legal act of the citizens become netizens.
1. computer and internet crimes as acts of pure evil
2. computer and Internet crime as a crime of gray
Academically, the term "cyber law" does not seem to be entirely acceptable terminology. This was proved by wearing another terminology for the same purpose as the law of the Inlernet, Law and the Information Superhighway, Information Technology Law, The Law of Information, and so on.In this regard Aron Mefford a cyberlaw expert from Michigan State University until the conclusion that with the widespread use of the Internet actually has a kind of "paradigm shift" in determining the identity of the perpetrator of a legal act of the citizens become netizens.
Issues - issues / aspects - legal aspects related.
- contract Issues
- consumer protection
- Tax (Taxation)
- Jurisdiction (Jurisdiction)
- Digital Signature (the sender is the person Whom they purport to be).
- Copy Right.
- dispute Settlement
- domain Name
They are usually divided into four teams :
- Incursion team tasked with finding a way into the computer network of the target company . Most popular trick is to send an e - mail spam containing malware to some employees . Another trick for example by breaking through the website - try passwords or security holes that have not been patched - or through SQL injection .
- Discovery Team This team is responsible for mapping a network that has successfully penetrated . From the map , they should be able to understand what the data is there and everywhere storage.
- Team Capture They have the function to determine the data to be retrieved , after analyzing the "price" of the data and how tough protection. Of course the ideal is to select the data most " expensive " hacking effort as easy as possible .
- Team Attack To put it simply , if the first team to three duties related to infiltration , ultimate team is doing well eksfiltrasi . They are working to bring the data out of the network through the choice of the unknown pathway by admin .
Moreover, cyber crime increasingly rife . The target ? Obviously intrusion into the network as well as the theft of confidential data belonging to the company . The main victims are generally financial institutions , such as banks , credit cards , and insurance . Here the valuable data stored very dangerous if it fell into the hands of irresponsible parties . To guide the validity of digital signatures see UNCITR AL Model Law on Electronic Commerce Section 7.Dalam this regard , consumer protection should be carried out by an international approach through legal harmonization and cooperation of law enforcement institutions .
Cyber World Development ImplicationsThe presence of public information (information society) as one of the important agenda of the world in the third millennium society become service-based economy ( from a manufacturing - based economy to a service - based economy ) . Reduced the traditional role of law materials and the increasing role
" M o n i c a g a t e "
that the Internet in a particular stage is not unlike like a double-edged sword .
The existence of the Internet as an institution in the mainstream American culture predicted a " big business future " ( the next big thing ) and can be said to be able to bring the prospective of a good side and a bad era of Internet freedom .
for example, the emergence of porn sites and attacks on privacy given the characteristics of the Internet that a person does not know the limits of territorial and fully operate a virtual ( virtual ) also spawned Internet activity ( the existing law)
Tidak ada komentar:
Posting Komentar