You are on page 1of 17

FAKULTI PENDIDIKAN DAN BAHASA

SEPTEMBER 2011

OUMH1203

ENGLISH for WRITTEN COMMUNICATION

NO. MATRIKULASI NO. KAD PENGNEALAN NO. TELEFON E-MEL

: : : :

671230045325001 671230045325 0136478910 qurratulainie05@yahoo.com

PUSAT PEMBELAJARAN

Melaka

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

CONTENT

1. WELCOME SPEECH 2. INTRODUCTION 3. WHAT IS INTERNET? 4. WHY CYBER CRIME SHOULD BE CONTROLLED? 5. CYBER CRIME CLASSIFIED 6. COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES 7. MyCert INCIDENT STATISTICS FOR THE YEAR 2011 PAGE 8. HOW TO ADDRESS THE CYBER CRIME? 9. CONCLUSION 10. REFERENCS

PAGE 2 PAGE 3 PAGE 4 PAGE 5 PAGE 6

PAGE 9

PAGE 11 PAGE 14 PAGE 15 PAGE 16

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

WELCOME SPEECH Praise God that hath given His permission and strength given then what can I translate in my heart in the quest for knowledge that is useful for self, family and children. Thanks also to the wife and children a lot of help and motivating spirit to face the vagaries of longdistance students. Existing trials pretty much waiting. Commitment to work and family at this age is challenging. Hopefully that what I wish to get I would pray for the love of God. Sense of pride when the assigned tasks can be completed even in a state of considerable will not press, especially from the existing workload. Time is like gold. Time elapsed be turned back. To complete this task, spare time is at night with snoring

accompanied by beloved children. Wake up till morning to find out all the essence. Thanks to the progress of time available. The task becomes easier with the internet. Everything is at our fingertips. Job experiences over twenty years is a lot of help. What is inside poured back on top of each sheet of this task. Finally, I am confident that the work produced can yield a very valuable one day. To lecturers and friends that helped, thank spoken. To the beloved family, may be patient and appears. You all helped morally pray for success and happiness always the conditions that are encountered.

and understand

Thank you.

MOHAMAD SHAWALUDDINNOR B. HJ MD NOR OPEN UNIVERSITY MALAYSIA 2011

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

INTRODUCTION What is cyber crime? Before we go much further on the topics discussed, it is better to discuss first the meaning of cyber crime. Crime means activities such as theft, fraud, forgery, murder, kidnapping, extortion, smuggling and so on. According to Mr. Donn B. Parker, a researcher at the cyber crime and security for SRI International in Merlo Park, California, cyber crime is a behaviours in which they have an intention and is associated with the computer through any means to cause the victim to suffer or cause suffering, loss, and continuous . Cyber crime involves all the usual criminal activities like theft, fraud, extortion and all activities that involve the violation of existing law.

Meanwhile, the U.S. Justice Department to reiterate this definition by stating that computer crime is any illegal activity in which knowledge of computer technology used to make it happen. However, there is some different definitions of cyber crime in certain countries. For the Muslim countries, gambling, pornography, advertising, sex is a crime but not for most countries, especially in the western block.

For example, in England, matters that related to pornography were taken for granted. Those involved with child pornography are considered to be criminals.

Countries in the western block focusing on security, trade and economy of their countries. Various laws related to safety and commerce developed, such as 'trademark law', 'copyright law', the law relating to 'hackers' and the spread of the virus and so on. Due to different definitions of cyber crime, it is difficult for enforcement of cyber laws. In this

context, Malaysia is involved in internet usage agreements that are not refined to allow this crime. However, due to the crime has caused great chaos, death, and significant losses, then almost every country in the world to draft their own laws to address the problem of cyber crime and to impose capital punishment to those involved.

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

WHAT IS INTERNET? Internet refers to the network constructed by connecting multiple computers, thousands or millions of computers to each other via the global telephone lines and satellite. Internet is the two main types of communication services and information retrieval. In terms of consumption, it is a network that provides electronic communication services, remote access file services, dissemination of information, locating information and several other services. From the application is built various types of alternative services to facilitate various transactions such as electronic commerce, electronic banking and the Internet, and advertising. When the advent of the internet as a communication tool to date, how to disseminate information more easily, fast, simple, and saves time. The information disseminated throughout the world with no boundaries of time cause no one is able to control the passage of information in cyberspace. Millions of websites have been built with all kinds of information, ideas, ideology, propaganda and pornography are also the internet. Therefore this dissemination occurred disseminated through the

independently, then

feelings of fear and security administrators in some countries that has to be negative about the freedom of speech, thought and felt that their citizens. They use this cyberspace to communicate their opinions to the world. Internet has surpassed all existing means of communication. Formerly a radio and television are important media tools to

spread information. But not now, radio and television are one way media interactive not like the Internet. This was done to facilitate the effective control of information. Delivery of information through radio and television and print materials can be controlled. Many countries have allocated the law to regulate broadcasting and publishing the

materials of these media. All publications in Malaysia require a valid permit or license, such as the Printing, Newspaper and Publications Act 1984, the Broadcasting Act 1988, the Sedition Act 1948, the Official Secrets Act 1972. This license permits and information that can be printed, disseminated, or distributed to the public. Traditional media is restricted by geographic limitations. Dissemination of books, magazines, newspapers have to cost, manpower, infrastructure and transportation. All this factors limit the dissemination of information and at the same time facilitate the control or filtering information. Existing media is very different from the internet because the internet is a platform that provides information from the millions of consumers and
4

limiting

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

researchers or researchers from around the world. A person may disseminate information, communicate and interact with others who are thousands of miles away. WHY CYBER CRIME SHOULD BE CONTROLLED? Each user developed and developing countries around the world have adopted the control and supervision of all media and printed materials. Since the growing sophistication of internet use and easily accessible, it is necessary, it is also regulated and supervised, such as printed materials and other media. Is the internet will also pose a threat to certain parties? In Malaysia, the government has taken positive steps to not censor cyberspace. This is enshrined in the bill guarantees promised by the government of Malaysia with companies Multimedia Super Corridor (MSC). Section 3 (3) of the Communications and Multimedia Act 1998 also declares that none of the provisions under the Act which allows any censorship of information occurs. This principle is based on the control information will only produce negative effects on the development of communication technology through the Internet. But this case is different in some countries that stand firm and aggressive, such as Cuba and China, who practice censorship in total or partial information. They think, not all advances in technology can be fully accepted. Some Internet content could threaten their ideology to the population. They still want to stay with the pattern of government and the lives that have been adopted in which the ideology of the rule continued with little transparency. They prefer their people passive, blind and not savvy to the world's information and recent developments.

A little openness is admission is just technology-related information public facilities, transportation, household and agricultural needs. There are still many countries that moderation and censorship committed only information which may damage the public mind. The existing freedom of speech should not be abused. If opposition parties or spread false information, defamatory or ideologically opposed through the Internet, the government considers it is not a serious threat. The Government will respond in a similar manner to the user. The Government will increase public knowledge and spread the word of truth in print or on television are usually controlled by the government. In this way, people will be able to consider the truth of the information. Who are the cyber criminals? What crimes? Where a crime is committed? These answers are hard to come by because the perpetrator is anywhere in the world and they
5

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

can move freely all over the world because of the widespread use of Internet around the world. Ordinary criminals can be identified by physical and equipment can be seen. Cyber crime and only use the internet seems to be in the universe. Their identity always

change. According to Michael A Vatis from the Federal Bureau of Investigation (FBI), United States, a major problem to distinguish cyber threats to the physical threat is to determine who attacked the system, why, how, and where. Generally, cyber and network

criminals are the ones who are well versed in computer technology

systems. They are professional criminals. It may be there next to us, doctors, friends, professors, or anyone else. They will attack their own institutions, competitor institutions, hired by certain parties, hobby or try something new and see the atmosphere of uncertainty. Business organization may be the target of competitors, employees or former

employees. Banks and financial institutions being targeted professional robbers and criminals. While the university will be the target of students or former

students. Government agencies are likely to be targets of terrorists and traitors. Military computer may be hijacked. Sometimes the laws designed to curb cyber crime cant do anything like what happened in the United States. Sophisticated technology and

pioneer of computer systems, until now failed to detect the tragedy of 11 September attack planning. During the September 11 attacks, the 19 aircraft hijackers entered

the United States with a valid visa. They respect as other users via telephone and internet. They planned the attack on the World Trade Centre, New York and the Pentagon building in Washington. United States received a big misfortune and shame based on its technological expertise. Cyber crime occurs in various forms, objects and situations. What kind of computer usage will always be dealing with cyber crime activities. Users will become victims or manipulated by criminals or both. Input operations, data processing, output and data communications operations will be used by criminals for the purpose of thoroughly unhealthy. Cyber crime can be classified into: CYBER CRIME CLASSIFIED 1. Fraud: - This type of cyber crime is the same as what happens in the real world, just the way behavior is through the internet. Crime is done solely to make money from the victim by means of easy and difficult to detect. The frequency of identity fraud occurs is via e-mail where the user is required to enter personal information, supposedly the bank to update the
6

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

data users. In fact, they steal user information to enter the banking website using another person's identity. E-mail is questionable and is known as spam e-mail. Consumers are often fooled because the e-mail sent will be linked to websites that resemble the real website. From information obtained, a personal declaration to be invaded and caused consumers to lose money in the account. In addition to identity fraud, other frauds are often

committed in the sale of products and services activities. Users who are interested in the products with a variety of nice words and praise the user will make a payment by internet banking to transfer money or use credit cards. After payment is made. Products purchased but not received as promised website products are sometimes no longer exists. According to an article in Anjung pc.com, an estimated 90 billion e-mail spam sent every day and 20% of which is related to product sales. E-mail spam is not good often contain words such as obscenities, sex, sweepstakes, giving gifts of money and also offer unreasonable. Email to spam is the most dangerous fraud. As a result of the impact of e-

mail fraud is causing loss of property and dignity, and also can cause loss of life. 2. Damage or modifications to the program or computer data: - Activities or software developed to do things that are not desired on a computer system, network operating systems, applications or information stored. In other words it is dangerous software which can cause aggression and modifications to the network or computer systems and

trespassing stored information leading to damage systems or information. Events that had occurred was recently in Malaysia where the hacker has to do the cyber attacks against government websites have a big impact on the information technology systems. This site is not accessible as usual. Many online business cannot be done, stop and interrupted. It causes panic for a while to internet users. 3. Theft of information: - Creating a common cybercrime in which user information is taken and used for impersonation, extortion, fraud and others. Examples of common theft is through spyware software, cyber criminals to steal data from infected computers such as Internet search trends and confidential information without the knowledge and consent of the user. Examples of events that had happened was in Tokyo, May 3, 2011, in which the Company SONY has been hacked and the criminals have stolen data from 25 million users of their computer game system, www.soe.com (SONY Online Entertainment). 4. Unauthorized access to the system: - One of them is the 'Root Hits' in which they access the administrator or "root access" to a computer network. The main activities performed by
7

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

this software is the installation of 'backdoor' invasion of the log file, or observations on all activities undertaken by a computer it infects. Steal data, record the movement of a computer keyboard and mouse, and steal internet users to find traces of confidential information such as account names, account numbers, passwords and so on. 5. Copying software illegally: - Software that is better known by the word 'piracy'. This software is copied and modified for use by hackers to obtain information or use the software to earn money many times over without the permission of the manufacturer. Usually the software is copied illegally is not linked with automatic updating system. Software "piracy" cannot be updated or repaired online. 6. Espionage: - Cyber Crimes are frequently associated with security and military to obtain weapons and military technologies. The threat of computer hackers usually can be done by professionals, intelligence agencies, organized crime, the investigation agency, part-

timemedia and political extremists. The purpose of the criminal wiretaps were used to blackmail, war crimes, buying illegal weapons or modify the stolen technology. Top antiterrorism adviser White House, John Brennan warned that espionage by foreign

governments, individuals or certain groups either hackers or terrorist organizations are very complex and very complicated. United States House of representatives approved a bill designed to protect Internet and computer networks by funding research and training in cyber security. 7. Cyber gambling: - Gambling is conducted in the Internet from all over the world. Betting and payments made online or using the middle man as in the cyber caf

that running illegal Internet gambling. Cyber gambling is also involved with the creation of sports betting conducted by the 'bookie' local or international. Events like that are

often involved in these cyber-betting and gambling is football. Many consumers are in debt, especially those who borrow money from illegal loan sharks or 'along'. 8. Get rich quick scheme: - According to Wikipedia, a free encyclopedia that get rich quick scheme is a scheme in which a sum of money be deposited or invested to the organizers promise get rich quick scheme and provided that the deposit will be returned back with interest or profits higher than what is offered by licensed financial institutions. There are many types of get rich quick schemes that exist, such as pyramid schemes, Ponzi schemes and in Malaysia, the Pak Man Telo. At the start of the scheme, the organizers using the deposit money received to pay the principal of the return or the previous depositors.
8

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Organizer of this rich quick schemes are not investing deposits received into the investmentor profitable enterprises of the same or higher. As such, they cannot continue to bear the high return of payments to existing investors. If no new depositors received, the scheme is revoked. It will fail and the investors and depositors will lose their money. 9. Pornography: - A lot of cyber crimes undermine the moral and social youths in Malaysia. Significant threat to the frequent occurrence of free sex, abandoned babies, children out of wedlock, prostitution, incest, rape and violation. Showing pornography that sometimes appear automatically in the website is accessed or viewed, and often a small link in a

certain web sites. This cyber crime have a big impact in the lives and culture of Malaysians, especially Muslims. 10. Internet hackers: - Hacker is a person to create and modify computer software and hardware, including computer programming, administration, and safety-related matters. The term is usually carried connotations reliable but can be good or bad, depending on cultural context. 11. Spread of the virus: - Viruses are malicious code that spread aggressively attack by infecting other files or programs in a specific host. The activation of this virus requires human interaction as users of the system before it can act to damage a computer system that successfully invaded. Spread of the virus from one host to another host can not happen without interaction from users of the system and also through the sharing of external data storage devices. COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES Malaysia to adopt democracy and an Islamic state to adopt civil law and sharia law for Muslim people. Awareness of cyber crime often spread to people through the mass media because of its detrimental effects that could threaten the individual, religion, society and nation. In the U.S. they are very different way of life even adopt a similar pattern of government. Their social life more independent of Malaysia. The threat of cyber crime in the United States and deemed to but occur not to if the they threaten and the safety of life.

individuals

countries,

social

community

In Malaysia, cyber crime

cases

will be handled by

CyberSecurity Malaysia an

agency under the Ministry of Science, Technology and Innovation (MOSTI). CyberSecurity Malaysia chief executive officer, Lt. Col (R) Professor Dato 'Husin Jazri said, Cyber
9

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Forensics is commonly used to refer to Digital Forensics. It is a scientific application in the examination and analysis done on the digital storage of materials involved in criminal or civil investigations. Users who lack knowledge of computer systems at high risk of falling prey to computer crimes. CyberSecurity Malaysia's role is to provide technical assistance to local authorities in carrying out the analysis of digital evidence such as computers, mobile phones, cameras, games player, digital music devices and digital equipment related portable computers. In the Utusan Malaysia newspaper, dated July 25, 2008, an article issued in Penang by Lee Boon Hooi said, of 6.167 cases of Internet fraud involving RM63 million

losses reported in Malaysia last year. Increased 4 times in 4 years from 2007 to only 1.139 cases recorded losses of RM11.4 million. According to a statement by the

Internet Crimes Unit, Criminal Investigation Division and Multimedia Cyber, Commercial Crime Investigation Department in Bukit Aman, Deputy Superintendent Abdul Majid Record when presenting a paper during the seminar on the theme of

International Industrial Technology in Crime and Loss Prevention. Frequent cyber crime is in internet banking, VoIP (Voice Over Internet Protocol) and e-commerce. This cyber crime involving fraud in an attempt to obtain personal information such as usernames, account numbers, personal identification numbers, passwords and credit card details to masquerade as a trusted entities through electronic communications.

10

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

MyCERT INCIDENT STATISTICS FOR THE YEAR 2011

11

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

12

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

13

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Cyber crime cases in the United States is similar to what happened in Malaysia. Significant difference is the pattern of life there are more open with a social system that is free. Norton survey report, consumers in the United States was ranked No. 3 is 73% of cyber-crime victims from around the world. Reported cyber crime is difficult because sometimes the case involved no firm evidence. Chief Cyber Security Counsel Adam Palmer Norton stated that many consumers in the United States failed to report and covers the activities of cybercriminals. HOW TO ADDRESS THE CYBER CRIME? There a) b) are a number and of proposals have censor the entry been issued to to deal with cyber crimes are: websites.

Control

relating

pornographic

Government should formulate originally Malaysia Communications and Multimedia Act1998, Section 3 (3) in which the information in the internet which have negative
14

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

effects filtered. c) To formulate the Bill of Guarantees to MSC status foreign investors that Internet censorship should be done. Objectives and purposes of information only real INVESTMENT d) e) f) can be brought in via the internet,

Increase the security level information based on development of current technology. To increase awareness among consumers about the ethical use of computers. Increase the number of experts in the field of computer security by opening more education cyber and crime job laws forensic opportunities are more strict experts in in these and efficient the areas. with

g)

To formulate assistance of

computer

investigation.

h)

International cooperation to combat cyber criminals, such as sharing information and expertise.

CONCLUSION Developments in ICT there will be no end if we look at how it began. Any time there is discovery and innovation in computer technology equipment or software either. Similarly, the crime is also growing cyber current trend for a specific individual requirements that are beyond control. What needs to be actually the consciousness of every individual and Internet users to always practice ethics in everyday life and always ready to deal with bad elements who want to take the easy way and make money immediately. Online safety must be increased just as we love ourselves. The effect of these cyber crimes that are generally not seen as a physical but a great effect if it is allowed to occur without strict control.

15

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

REFERENCE 1. http://ms.wikipedia.org/wiki/penjenayahsiber 2. http://www.CyberSecurity.my 3. http://utusan.com.my/search.asp?stype=kw&stv=jenayah+siber 4. http://hmetro.com.my/r?searchterm=jenayah+siber@carian=cari 5. http://www.bernama.com.my/bernama/vs/bm/searchindex.php?terms=jenayah%20sib er 6. http://www.fbi.gov 7. http://www.cia.gov

16

You might also like