February 14, 2017 | Author: Shawal Hj Md Nor | Category: N/A
Download Assigment OUMH1203 English for Written Communication...
FAKULTI PENDIDIKAN DAN BAHASA
SEPTEMBER 2011
OUMH1203
ENGLISH for WRITTEN COMMUNICATION
NO. MATRIKULASI
:
671230045325001
NO. KAD PENGNEALAN
:
671230045325
NO. TELEFON
:
0136478910
E-MEL
:
[email protected]
PUSAT PEMBELAJARAN
:
Melaka
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
CONTENT
1. WELCOME SPEECH
PAGE 2
2. INTRODUCTION
PAGE 3
3. WHAT IS INTERNET?
PAGE 4
4. WHY CYBER CRIME SHOULD BE CONTROLLED?
PAGE 5
5. CYBER CRIME CLASSIFIED
PAGE 6
6. COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES
PAGE 9
7. MyCert INCIDENT STATISTICS FOR THE YEAR 2011 PAGE
PAGE 11
8. HOW TO ADDRESS THE CYBER CRIME?
PAGE 14
9. CONCLUSION
PAGE 15
10. REFERENCS
PAGE 16
1
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
WELCOME SPEECH Praise God that hath given His permission and strength given then what can I translate in my heart in the quest for knowledge that is useful for self, family and children. Thanks also to the wife and children a lot of help and motivating spirit to face the vagaries of longdistance students. Existing trials pretty much waiting. Commitment to work and family at this age is challenging. Hopefully that what I wish to get I would pray for the love of God. Sense of pride when the assigned tasks can be completed even in a state of considerable will
not
press, especially from the existing workload. Time is like gold. Time elapsed be turned back. To
complete this
task, spare time is at
night with snoring
accompanied by beloved children. Wake up till morning to find out all the essence. Thanks to the progress of time available. The task becomes easier with the internet. Everything is at our fingertips. Job experiences over twenty years is a lot of help. What is inside poured back on top of each sheet of this task. Finally, I am confident that the work produced can yield a very valuable one day. To lecturers and friends that helped, thank spoken. To the beloved family, may be patient and appears. You
all helped
morally
pray for success and happiness always
and understand
Thank you.
MOHAMAD SHAWALUDDINNOR B. HJ MD NOR OPEN UNIVERSITY MALAYSIA 2011
2
the conditions
that are encountered.
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
INTRODUCTION What is cyber crime? Before we go much further on the topics discussed, it is better to discuss first the meaning of cyber crime. Crime means activities such as theft, fraud, forgery, murder, kidnapping, extortion, smuggling and so on. According to Mr. Donn B. Parker, a researcher at the cyber crime and security for SRI International in Merlo Park, California, cyber crime is a behaviours in which they have an intention and is associated with the computer through any means to cause the victim to suffer or cause suffering, loss, and continuous . Cyber crime involves all the usual criminal activities like theft, fraud, extortion
and
all
activities
that
involve
the
violation
of
existing
law.
Meanwhile, the U.S. Justice Department to reiterate this definition by stating that computer crime is any illegal activity in which knowledge of computer technology used to make it happen. However, there is some different definitions of cyber crime in certain countries. For the Muslim countries, gambling, pornography, advertising, sex is a crime
but
not
for
most
countries,
especially
in
the
western
block.
For example, in England, matters that related to pornography were taken for granted. Those
involved
with
child
pornography
are
considered
to
be
criminals.
Countries in the western block focusing on security, trade and economy of their countries. Various laws related to safety and commerce developed, such as 'trademark law', 'copyright law', the law relating to 'hackers' and the spread of the virus and so on. Due to different definitions of cyber
crime, it
is
difficult for
enforcement of
cyber
laws.
In
this
context, Malaysia is involved in internet usage agreements that are not refined to allow this crime. However, due to the crime has caused great chaos, death, and significant losses, then almost every country in the world to draft their own laws to address the problem of cyber crime and to impose capital punishment to those involved.
3
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
WHAT IS INTERNET? Internet refers to the network constructed by connecting multiple computers, thousands or millions of computers to each other via the global telephone lines and satellite. Internet is the two main types of communication services and information retrieval. In terms of consumption, it is a network that provides electronic communication services, remote access file services, dissemination of information, locating information and several other services. From the application is built various types of alternative services to facilitate various transactions such as electronic commerce, electronic banking and the Internet, and advertising. When the advent of the internet as a communication tool to date, how to disseminate information more easily, fast, simple, and saves time. The information disseminated throughout the world with no boundaries of time cause no one is able to control the passage of information in cyberspace. Millions of websites have been built with all kinds of information, ideas, ideology, propaganda and pornography are also the internet.
Therefore
this
dissemination
occurred
disseminated through
independently, then
the
feelings of fear and security administrators in some countries that has to be negative about the freedom of speech, thought and felt that their citizens. They use this cyberspace to communicate their opinions to the world. Internet has surpassed all existing means of communication.
Formerly a radio
and television
are
important media
tools
to
spread information. But not now, radio and television are one way media interactive not like the Internet. This was done to facilitate the effective control of information. Delivery of information through radio and television and print materials can be controlled. Many countries have
allocated
the law
to regulate broadcasting
and publishing
the
materials of these media. All publications in Malaysia require a valid permit or license, such as the Printing, Newspaper and Publications Act 1984, the Broadcasting Act 1988, the Sedition Act 1948, the Official Secrets Act 1972. This license permits and
limiting
information that can be printed, disseminated, or distributed to the public. Traditional media is restricted by geographic limitations. Dissemination of books, magazines, newspapers have to cost, manpower, infrastructure and transportation. All this factors limit the dissemination of information and at the same time facilitate the control or filtering information. Existing media is very different from the internet because the internet is a platform that provides information from the millions of consumers and 4
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
researchers or researchers from around the world. A person may disseminate information, communicate and interact with others who are thousands of miles away. WHY CYBER CRIME SHOULD BE CONTROLLED? Each user developed and developing countries around the world have adopted the control and supervision of all media and printed materials. Since the growing sophistication of internet use and easily accessible, it is necessary, it is also regulated and supervised, such as printed materials and other media. Is the internet will also pose a threat to certain parties? In Malaysia, the government has taken positive steps to not censor cyberspace. This is enshrined in the bill guarantees promised by the government of Malaysia with companies Multimedia Super Corridor (MSC). Section 3 (3) of the Communications and Multimedia Act 1998 also declares that none of the provisions under the Act which allows any censorship of information occurs. This principle is based on the control information will only produce negative effects on the development of communication technology through the Internet. But this case is different in some countries that stand firm and aggressive, such as Cuba and China, who practice censorship in total or partial information. They think, not all advances in technology can be fully accepted. Some Internet content could threaten their ideology to the population. They still want to stay with the pattern of government and the lives that have been adopted in which the ideology of the rule continued with little transparency. They prefer their people passive, blind and not
savvy
to
the
world's
information
and
recent
developments.
A little openness is admission is just technology-related information public facilities, transportation, household and agricultural needs. There are still many countries that moderation and censorship committed only information which may damage the public mind. The existing freedom of speech should not be abused. If opposition parties or spread false information, defamatory or ideologically opposed through the Internet, the government considers it is not a serious threat. The Government will respond in a similar manner to the user. The Government will increase public knowledge and spread the word of truth in print or on television are usually controlled by the government. In this way, people will be able to consider the truth of the information. Who are the cyber criminals? What crimes? Where a crime is committed? These answers are hard to come by because the perpetrator is anywhere in the world and they 5
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
can move freely all over the world because of the widespread use of Internet around the world. Ordinary criminals can be identified by physical and equipment can be seen. Cyber crime and only use the internet seems to be in the universe. Their
identity
always
change. According to Michael A Vatis from the Federal Bureau of Investigation (FBI), United States, a major problem to distinguish cyber threats to the physical threat is to determine
who attacked the system, why, how, and
where. Generally, cyber
criminals are the ones who are well versed in computer technology
and network
systems. They are professional criminals. It may be there next to us, doctors, friends, professors, or anyone else. They will attack their own institutions, competitor institutions, hired by certain parties, hobby or try something new and see the atmosphere of uncertainty. Business
organization may be the target
of competitors,
employees or former
employees. Banks and financial institutions being targeted professional robbers and criminals. While
the
university
will be
the
target
of
students
or
former
students. Government agencies are likely to be targets of terrorists and traitors. Military computer may be hijacked. Sometimes the laws designed to curb cyber crime can’t do anything like what happened
in
the
United States. Sophisticated technology and
pioneer of computer systems, until now failed to detect the tragedy of 11 September attack
planning.
During the September 11 attacks, the 19 aircraft hijackers entered
the United States with a valid visa. They respect as other users via telephone and internet. They planned the attack on the World Trade Centre, New York and the Pentagon building in Washington. United States received a big misfortune and shame based on its technological expertise. Cyber crime occurs in various forms, objects and situations. What kind of computer usage will always be dealing with cyber crime activities. Users will become victims or manipulated by criminals or both. Input operations, data processing, output and data communications operations will be used by criminals for the purpose of thoroughly unhealthy. Cyber crime can be classified into: CYBER CRIME CLASSIFIED 1. Fraud: - This type of cyber crime is the same as what happens in the real world, just the way behavior is through the internet. Crime is done solely to make money from the victim by means of easy and difficult to detect. The frequency of identity fraud occurs is via e-mail where the user is required to enter personal information, supposedly the bank to update the 6
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
data users. In fact, they steal user information to enter the banking website using another person's identity. E-mail is questionable and is known as “spam e-mail”. Consumers are often fooled because the e-mail sent will be linked to websites that resemble the real website. From information obtained, a personal declaration to be invaded and caused consumers to lose money in the account. In addition to
identity fraud, other frauds are often
committed in the sale of products and services activities. Users who are interested in the products with a variety of nice words and praise the user will make a payment by internet banking to transfer money or use credit cards. After payment is made. Products purchased but not received as promised website products are sometimes no longer exists. According to an article in Anjung pc.com, an estimated 90 billion e-mail spam sent every day and 20% of which is related to product sales. E-mail spam is not good often contain words such as obscenities, sex, sweepstakes, giving gifts of money and also offer unreasonable. Email
to
spam
is the most dangerous
fraud.
As a result of
the impact of e-
mail fraud is causing loss of property and dignity, and also can cause loss of life. 2. Damage or modifications to the program or computer data: - Activities or software developed to do things that are not desired on a computer system, network operating systems, applications or information stored. In other words it is dangerous software which can cause aggression
and
modifications
to
the
network
or
computer
systems and
trespassing stored information leading to damage systems or information. Events that had occurred was recently in Malaysia where the hacker has to do the cyber attacks against government websites have a big impact on the information technology systems. This site is not accessible as usual. Many online business cannot be done, stop and interrupted. It causes panic for a while to internet users. 3. Theft of information: - Creating a common cybercrime in which user information is taken and used for impersonation, extortion, fraud and others. Examples of common theft is through spyware software, cyber criminals to steal data from infected computers such as Internet search trends and confidential information without the knowledge and consent of the user. Examples of events that had happened was in Tokyo, May 3, 2011, in which the Company SONY has been hacked and the criminals have stolen data from 25 million users of their computer game system, www.soe.com (SONY Online Entertainment). 4. Unauthorized access to the system: - One of them is the 'Root Hits' in which they access the administrator or "root access" to a computer network. The main activities performed by 7
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
this software is the installation of 'backdoor' invasion of the log file, or observations on all activities undertaken by a computer it infects. Steal data, record the movement of a computer keyboard and mouse, and steal internet users to find traces of confidential information such as account names, account numbers, passwords and so on. 5. Copying software illegally: - Software that is better known by the word 'piracy'. This software is copied and modified for use by hackers to obtain information or use the software to earn money many times over without the permission of the manufacturer. Usually the software is copied illegally is not linked with automatic updating system. Software "piracy" cannot be updated or repaired online. 6. Espionage: - Cyber Crimes are frequently associated with security and military to obtain weapons and military technologies. The threat of computer hackers usually can be done by professionals, intelligence
agencies, organized
crime, the
investigation agency, part-
timemedia and political extremists. The purpose of the criminal wiretaps were used to blackmail, war crimes, buying illegal weapons or modify the stolen technology. Top antiterrorism adviser White
House, John Brennan warned
that espionage by foreign
governments, individuals or certain groups either hackers or terrorist organizations are very complex and very complicated. United States House of representatives approved a bill designed to protect Internet and computer networks by funding research and training in cyber security. 7. Cyber gambling: - Gambling is conducted in the Internet from all over the world. Betting and
payments
made
online or
using
the
middle man as
in
the cyber café
that running illegal Internet gambling. Cyber gambling is also involved with the creation of sports
betting
conducted by the
'bookie' local or international. Events like that are
often involved in these cyber-betting and gambling is football. Many consumers are in debt, especially those who borrow money from illegal loan sharks or 'along'. 8. Get rich quick scheme: - According to Wikipedia, a free encyclopedia that get rich quick scheme is a scheme in which a sum of money be deposited or invested to the organizers promise get rich quick scheme and provided that the deposit will be returned back with interest or profits higher than what is offered by licensed financial institutions. There are many types of get rich quick schemes that exist, such as pyramid schemes, Ponzi schemes and in Malaysia, the Pak Man Telo. At the start of the scheme, the organizers using the deposit money received to pay the principal of the return or the previous depositors. 8
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Organizer of this rich quick schemes are not investing deposits received into the investmentor profitable enterprises of the same or higher. As such, they cannot continue to bear the high return of payments to existing investors. If no new depositors received, the scheme is revoked. It will fail and the investors and depositors will lose their money. 9. Pornography: - A lot of cyber crimes undermine the moral and social youths in Malaysia. Significant threat to the frequent occurrence of free sex, abandoned babies, children out of wedlock, prostitution, incest, rape and violation. Showing pornography that sometimes appear automatically in
the website is accessed or viewed, and often a small link in a
certain web sites. This cyber crime have a big impact in the lives and culture of Malaysians, especially Muslims. 10. Internet hackers: - Hacker is a person to create and modify computer software and hardware, including computer programming, administration, and safety-related matters. The term is usually carried connotations reliable but can be good or bad, depending on cultural context. 11. Spread of the virus: - Viruses are malicious code that spread aggressively attack by infecting other files or programs in a specific host. The activation of this virus requires human interaction as users of the system before it can act to damage a computer system that successfully invaded. Spread of the virus from one host to another host can not happen without interaction from users of the system and also through the sharing of external data storage devices. COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES Malaysia to adopt democracy and an Islamic state to adopt civil law and sharia law for Muslim people. Awareness of cyber crime often spread to people through the mass media because of its detrimental effects that could threaten the individual, religion, society and nation. In the U.S. they are very different way of life even adopt a similar pattern of government. Their social life more independent of Malaysia. The threat of cyber crime in
the United States
individuals
and
deemed
countries,
In Malaysia, cyber crime
to but
cases
occur not
if to
the
they
threaten
social
will be handled by
and
the
safety
community
of life.
CyberSecurity Malaysia an
agency under the Ministry of Science, Technology and Innovation (MOSTI). CyberSecurity Malaysia chief executive officer, Lt. Col (R) Professor Dato 'Husin Jazri said, Cyber 9
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Forensics is commonly used to refer to Digital Forensics. It is a scientific application in the examination and analysis done on the digital storage of materials involved in criminal or civil investigations. Users who lack knowledge of computer systems at high risk of falling prey to computer crimes. CyberSecurity Malaysia's role is to provide technical assistance to local authorities in carrying out the analysis of digital evidence such as computers, mobile phones, cameras, games player, digital music devices and digital equipment related portable computers. In the Utusan Malaysia newspaper, dated July 25, 2008, an article issued in Penang by Lee Boon Hooi said, of 6.167 cases of
Internet fraud involving RM63 million
losses reported in Malaysia last year. Increased 4 times in 4 years from 2007 to only 1.139 cases recorded
losses
of RM11.4 million. According to a statement by the
Internet Crimes Unit, Criminal Investigation Division and Multimedia Cyber, Commercial Crime Investigation Department in Bukit Aman, Deputy Superintendent Abdul Majid Record
when
presenting
a
paper
during
the
seminar
on
the
theme
of
International Industrial Technology in Crime and Loss Prevention. Frequent cyber crime is in internet banking, VoIP (Voice Over Internet Protocol) and e-commerce. This cyber crime involving fraud in an attempt to obtain personal information such as usernames, account numbers, personal identification numbers, passwords and credit card details to masquerade as a trusted entities through electronic communications.
10
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
MyCERT INCIDENT STATISTICS FOR THE YEAR 2011
11
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
12
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
13
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Cyber crime cases in the United States is similar to what happened in Malaysia. Significant difference is the pattern of life there are more open with a social system that is free. Norton survey report, consumers in the United States was ranked No. 3 is 73% of cyber-crime victims from around the world. Reported cyber crime is difficult because sometimes the case involved no firm evidence. Chief Cyber Security Counsel Adam Palmer Norton stated that many consumers in the United States failed to report and covers the activities of cybercriminals. HOW TO ADDRESS THE CYBER CRIME? There
are
a number and
of proposals have censor
the
been
entry
issued to
relating
to
deal
with cyber crimes are:
a)
Control
pornographic
websites.
b)
Government should formulate originally Malaysia Communications and Multimedia Act1998, Section 3 (3) in which the information in the internet which have negative 14
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
effects filtered. c)
To formulate the Bill of Guarantees to MSC status foreign investors that Internet censorship should be done. Objectives and purposes of information only real INVESTMENT
can
be
brought
in
via
the
internet,
d)
Increase the security level information based on development of current technology.
e)
To increase awareness among consumers about the ethical use of computers.
f)
Increase the number of experts in the field of computer security by opening more
g)
education
To formulate assistance
h)
of
and
cyber
crime
computer
job
opportunities
laws
are
forensic
in
more strict experts
in
these and efficient the
areas. with
investigation.
International cooperation to combat cyber criminals, such as sharing information and expertise.
CONCLUSION Developments in ICT there will be no end if we look at how it began. Any time there is discovery and innovation in computer technology equipment or software either. Similarly, the crime is also growing cyber current trend for a specific individual requirements that are beyond control. What needs to be actually the consciousness of every individual and Internet users to always practice ethics in everyday life and always ready to deal with bad elements who want to take the easy way and make money immediately. Online safety must be increased just as we love ourselves. The effect of these cyber crimes that are generally not seen as a physical but a great effect if it is allowed to occur without strict control.
15
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
REFERENCE 1. http://ms.wikipedia.org/wiki/penjenayahsiber 2. http://www.CyberSecurity.my 3. http://utusan.com.my/search.asp?stype=kw&stv=jenayah+siber 4. http://hmetro.com.my/r?searchterm=jenayah+siber@carian=cari 5. http://www.bernama.com.my/bernama/vs/bm/searchindex.php?terms=jenayah%20sib er 6. http://www.fbi.gov 7. http://www.cia.gov
16