Kamis, 06 Juni 2013

The types of computer crime and Internet

Today, all companies can not get out of the utilization of information technology.
According to Gibson, cyberspace "was a consensual hallucination that felt and looked likea physical space but actually was a computer-generated construct representing abstract data". In further developments in line with the widespread use of computers. This term is then used to designate a space electronics (electronic space), which is a virtual community that is formed through communication that exists within a network kornputer (interconnected computer networks). 'At this time, cyberspace as stated by Cavazos and Morin are:

 

”represents a vast array of computer systems accessible from remote physical locations”.

All business sectors are in need of a role in running the business. The most standard is employee database storage digitally in the computer server.

Other functions are so diverse:
  1.      storing customer data and business partners
  2.      the sale and purchase transaction records
  3.      management information system
  4.      employee data
  5.      and use of the website.
some of the main activities that have been conducted in cyberspace as Commercial On-line Services , Bullelin Board System , Conferencing Systems , Internet Relay Chat , Usenet , EmaiI list , and entertainment . Therefore it can be concluded that the so-called " cyberspace " was none other . Internet is also often referred to as " a network of net works " . With these characteristics then there is also a mention of " cyber space " with the term "virtual community " ( virtual community ) or a "virtual world" ( virtual world ) . Therefore , the role of the administrator as a manager and " security " computer networking is crucial in a company . but believe all of this is a real fact that can not be dipungkiri.Pembahasan regarding the scope of " cyber law " is intended as an inventory of the issues or aspects of the law relating to the expected utilization of the Internet . And scope of " cyber law " relates to the issue or ' legal aspects of
  1. E-Commerce
  2. Privacy and Security on the Internet
  3. Copyright, Defamation
  4. Content Regulation
  5. Disptle Settlement, and so on.
Here is a scope or area to be covered by cyberlaw. The scope of these cyberlaw will continue to evolve with developments in the use of the Internet in the future. Consumer protection laws of each country such that Indonesia would not be enough to help, because the E-Commerce operations across borders (borderless) As the handle (while) we look at the definition of E-Commerce from ECEG-Australia (Electronic Cornmerce Expert Group) as follows:

"Electronic commerce is a broad concept that includes any commercial transactions conducted through electronic means and will include a way as facsimile, telex, EDI, Internet and phone"

The types of crimes based on the type of computer and internet activity
  1. Unauthorized Access to Computer System and Service
  2. Illegal Contents
  3. Data Forgery
  4. Cyber Espionage
  5. Cyber Sabotage and Extortion
  6. Offense against Intellectual Property
  7. Infringements of Privacy
  8. Cracking
  9. Carding
  10. Defacing
  11. Phising atau Indentity theft
  12. Spamming
  13. Malware
  14. Child pornography Pronografi
The types of computer crime and internet based motif is divided into 2
1. computer and internet crimes as acts of pure evil
2. computer and Internet crime as a crime of gray

Academically, the term "cyber law" does not seem to be entirely acceptable terminology. This was proved by wearing another terminology for the same purpose as the law of the Inlernet, Law and the Information Superhighway, Information Technology Law, The Law of Information, and so on.In this regard Aron Mefford a cyberlaw expert from Michigan State University until the conclusion that with the widespread use of the Internet actually has a kind of "paradigm shift" in determining the identity of the perpetrator of a legal act of the citizens become netizens.

Issues - issues / aspects - legal aspects related.
  1.      contract Issues
  2.      consumer protection
  3.      Tax (Taxation)
  4.      Jurisdiction (Jurisdiction)
  5.      Digital Signature (the sender is the person Whom they purport to be).
  6.      Copy Right.
  7.      dispute Settlement
  8.      domain Name
In an interview with InfoWorld, Francis de Souza (Senior Vice President of Symantec's Enterprise Security Group) expressed concern over the growing cyber criminal acts neat how it works. "90 percent of network break-ins in 2008 orchestrated by organized crime," said Francis, "while the remaining 10 percent occurred due to carelessness of the employee, for example, put a secret file on the flash or laptop which is then lent to someone else." Francis then reveal the results of investigations on the Symantec operating an organization of cybercrime. "

They are usually divided into four teams :
  1. Incursion team tasked with finding a way into the computer network of the target company . Most popular trick is to send an e - mail spam containing malware to some employees . Another trick for example by breaking through the website - try passwords or security holes that have not been patched - or through SQL injection .
  2. Discovery Team This team is responsible for mapping a network that has successfully penetrated . From the map , they should be able to understand what the data is there and everywhere storage.
  3. Team Capture They have the function to determine the data to be retrieved , after analyzing the "price" of the data and how tough protection. Of course the ideal is to select the data most " expensive " hacking effort as easy as possible .
  4. Team Attack To put it simply , if the first team to three duties related to infiltration , ultimate team is doing well eksfiltrasi . They are working to bring the data out of the network through the choice of the unknown pathway by admin .

Moreover, cyber crime increasingly rife . The target ? Obviously intrusion into the network as well as the theft of confidential data belonging to the company . The main victims are generally financial institutions , such as banks , credit cards , and insurance . Here the valuable data stored very dangerous if it fell into the hands of irresponsible parties . To guide the validity of digital signatures see UNCITR AL Model Law on Electronic Commerce Section 7.Dalam this regard , consumer protection should be carried out by an international approach through legal harmonization and cooperation of law enforcement institutions .
Cyber ​​World Development ImplicationsThe presence of public information (information society) as one of the important agenda of the world in the third millennium society become service-based economy ( from a manufacturing - based economy to a service - based economy ) . Reduced the traditional role of law materials and the increasing role
" M o n i c a g a t e "

that the Internet in a particular stage is not unlike like a double-edged sword .
The existence of the Internet as an institution in the mainstream American culture predicted a " big business future " ( the next big thing ) and can be said to be able to bring the prospective of a good side and a bad era of Internet freedom .
for example, the emergence of porn sites and attacks on privacy given the characteristics of the Internet that a person does not know the limits of territorial and fully operate a virtual ( virtual ) also spawned Internet activity ( the existing law)

Tidak ada komentar:

Posting Komentar