Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 6 :COMPUTER CRIME - Coggle Diagram
CHAPTER 6 :COMPUTER CRIME
6.1 HACKING
To gain illegal or unauthorized access to a file, computer, or network
Haktivism: Political Hacking
Disagreement about whether it is form of civil disobedience and how it should be punished
Use of hacking to promote a political issues
Example: Prodrug message appeared on US Police antidrug website
The Law : Catching and Punishing Hackers
1986 Congress passed the Computer Fraud and Abuse Act (CFAA)
A variety of methods for catching hackers
Penalties for young hackers
Security
Responsibility for Security
6.3 SCAMS AND DIGITAL FORGERY
2) Click Fraud
Repeated clicking on an ad to either increase a site's revenue or to use up a competitor's advertising budget
3) Stock Fraud
Most common method is to buy a stock low, send out e-mails urging others to buy and then sell when the price goes up, usually only for a short time
1) Actions
Auction sites use various
techniques to counter dishonest sellers
4) Digital Forgery
New technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc, with little skill and investment
6.5 ANALYTICAL TOOL IN CYBER CRIME
1) Fraud Analytical Tools
Detect fraud early
Automate time-consuming processes
2) Hacking AnalyticalTools
Sense and detect suspicious/ doubtful applications which are able to leak private information/ financial/ settlement/ company's secret
4) Hack Detection Tools
NetPatrol
sXe Injected
3) Fraud Detection Tools
Fraud.net Guardian
6.4 SEARCH AND SEIZURE OF COMPUTERS
1) Requires a warrant to search and seize a computer
2) Automated searches
6.2 IDENTIFY THEFT AND CREDIT CARD FRAUD
1) Identity theft
various crimes in which a criminal or large group uses the identity of an unknowing, innocent person.
2) Techniques used to steal personal and financial information
Phishing: E-mail fishing for personal and financial information disguised as
legitimate business e-mail.
Pharming: False Web sites for personal and financial information by planting false
URLs in Domain Name Servers
3) Techniques used to protect personal and financial information
Activation for new credit cards
Retailers do not print the full card number and expiration date on receipts
4) Responses to Identity Theft:
Authentication of e-mail and Web sites
Use of encryption to securely store data, so it is useless if stolen
6.6 EMERGENCE CYBER LAW IN MALAYSIA
1) Digital Signature Act 1997
2) Copyright (Amendment ) Act 1997
3) Telemedicine Act 1997
4) Computer Crimes Act 1997
5) Communications & Multimedia Act
(CMA) 1998
6) Information Technology Act 2000
7) The Induce Act