750620126206_17644_final

Upload: rohana-jukarna

Post on 04-Apr-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 750620126206_17644_final

    1/17

    1

    PENYERAHAN DAN PENILAIAN TUGASAN

    ASSIGNMENT SUBMISSION AND ASSESSMENT

    FACULTY OF EDUCATION AND LANGUAGES

    SEPT / 2011

    OUMH1203

    ENGLISH FOR WRITTEN COMMUNICATION

    MATRICULATION NO : 750620126206001

    IDENTITY CARD NO. : 750620-12-6206

    TELEPHONE NO. : 0135571200

    E-MAIL : [email protected]

    LEARNING CENTRE : SANDAKAN BRANCH

    NAME : ROHANA BT HJ JUKARNA

  • 7/29/2019 750620126206_17644_final

    2/17

    2

    1.0 INTRODUCTION 3

    2.0 CONTENT 42.1CLASSIFICATION OF CYBER CRIMES 4

    i. Cyber crime against individual 6ii. Cyber crime against property 6

    iii. Cyber crime against organization 6iv. Cyber crime against society 7

    2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA 8

    i. Cyber crime act and law 8ii. Cyber crime agency 10

    iii. Cyber crimes cases and report 11

    2.3SUGGESTIONS 14

    3.0CONCLUSION 15

    4.0REFERENCES 16

  • 7/29/2019 750620126206_17644_final

    3/17

    3

    1.0 INTRODUCTIONCyber crimesharmful acts committed from or against a computer or networkdiffer from most

    terrestrial crimes in four ways. They are easy to learn how to commit; they require few resources

    relative to the potential damage caused; they can be committed in a jurisdiction without being

    physically present in it; and they are often not clearly illegal. This growing danger from crimes

    committed against computers, or against information on computers, is beginning to claim attention in

    national capitals. In most countries around the world, however, existing laws are likely to be

    unenforceable against such crimes.

    To begin answering these questions, it would be helpful to briefly look at the components of

    crime in general. Traditionally, crime has been defined as an intentional violation of the legal code

    that is punishable by the state. Central to this definition is the premise that crime occurs within the

    boundaries of some physical reference point, that is, a location that constitutes a specific jurisdiction.

    Some definitions of cyber-crime are relatively narrow in focus. In some cases, only hacking behavior

    would fall under the definition of what constituted cyber-criminality (Thomas et.al., 2010). For

    example, the Council of Europes Cybercrime Treaty refers to only those offenses that involve

    damage to data or to copyright and content infringements. However, most experts would agree that

    this definition is much too narrow and needs to take into account more traditional crimes, such as

    fraud and stalking that make use of computers (Gordon and Ford, 2006). Below are suggested best

    definitions in describing cyber crimes.

    i. Cybercrime is criminal activity done using computers and the Internet. This includes anythingfrom downloading illegal music files to stealing millions of dollars from online bank accounts.

    Two of the most common ways this is done is through phishing and harming

    (http://www.techterms.com/definition/cybercrime).

    ii. Cybercrime is defined as crimes committed on the internet using the computer as either a toolor a targeted victim. All cybercrimes involve both the computer and the person behind it as

    victims (http://www.crime-research.org/articles/joseph06).

    iii. Cyber crime encompasses any criminal act dealing with computers and networks (calledhacking). Additionally, cyber crime also includes traditional crimes conducted through the

    Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit

    card account thefts are considered to be cyber crimes when the illegal activities are committed

    through the use of a computer and the Internet

    (http://www.webopedia.com/TERM/C/cyber_crime.html).

    http://www.techterms.com/definition/cybercrimehttp://www.techterms.com/definition/cybercrimehttp://www.techterms.com/definition/cybercrimehttp://www.crime-research.org/articles/joseph06http://www.crime-research.org/articles/joseph06http://www.crime-research.org/articles/joseph06http://www.webopedia.com/TERM/C/cyber_crime.htmlhttp://www.webopedia.com/TERM/C/cyber_crime.htmlhttp://www.webopedia.com/TERM/C/cyber_crime.htmlhttp://www.webopedia.com/TERM/C/cyber_crime.htmlhttp://www.crime-research.org/articles/joseph06http://www.techterms.com/definition/cybercrime
  • 7/29/2019 750620126206_17644_final

    4/17

    4

    iv. Cyber crime as any activity in which computers or networks are a tool, a target or a place ofcriminal activity. More precisely cyber crime as computer-mediated activities which are

    either illegal or considered illicit by certain parties and which can be conducted through global

    electronic networks (Hale, 2002).

    v. The term cybercrime is used to describe a range of offences including traditional computercrimes, as well as network crimes. As these crimes differ in many ways, there is no single

    criterion that could include all acts mentioned in the Stanford Draft Convention and the

    Convention on Cybercrime, whilst excluding traditional crimes that are just committed using

    hardware (Brenner, 2004).

    vi. Cyber crimes is the use of any computer network for crime or any criminal offence committedagainst or with the help of a computer network (Council of Europe, 2001).

    Among above definitions, the best description in my perspective is from Council of Europe (2001)

    in their Convention Cybercrime in United Kingdom. The definition given is simple and easy too

    understand yet completely describe computer and network as a tool in the crime and anyone can be

    the victim such as individual, society or even organization.

    2.0 CONTENT2.1 CLASSIFICATION OF CYBER CRIMES

    The classification of cybercrime which is an important step to fighting it, has been grossly limited to

    whether these crimes are computer-assisted or computer-focused or simply by directly naming

    these crimes (Audit Commission, 1998). Furnell (2001) attempted a classification based on a different

    view motivation. However, his categorizations of hackers only addressed a small subset of

    cybercrimes. He does a good job in reviewing past classifications as far back as twenty years into the

    categorizations put forth by the United Kingdom (UK) Audit Commission on computer crimes.

    Below are the categorizations and organization responsible for them as reviewed by Furnell.

    i. UK Audit Commission (1998) Classification Fraud

    Theft

    Use of unlicensed software

    Private work

    Misuse of personal data

    Hacking

    Sabotage.

    Introducing pornographic material.

    Virus

    ii. FBIs National Crime Squad (Fraser, 1996)

  • 7/29/2019 750620126206_17644_final

    5/17

    5

    Intrusions of the Public Switched Network (the telephone company)

    Major computer network intrusions

    Network Integrity violations

    Industrial espionage

    Pirated computer software

    Other crimes where the computer is a major factor in committing the criminal offense

    iii. Computer Security Institute (CSI) (CSI, 2001) Theft and proprietary information

    Sabotage of data or networks

    Telecom eavesdropping

    System penetration by outsider

    Insider abuse of net access

    Financial fraud

    Denial of Service

    Spoofing

    Virus Unauthorized insider access

    Telecom fraud

    Active wiretapping

    Laptop theft

    Gordon and Ford (2006) also classified cybercrimes into two major group called Type I and

    Type II cybercrimes. Type I cybercrime has the following characteristics:

    i. It is generally a singular, or discrete, event from the perspective of the victim.ii. It often is facilitated by the introduction of crime-ware programs such as keystroke loggers,

    viruses, root kits or Trojan horses into the users computer system

    iii. The introductions can, but may not necessarily be, facilitated by vulnerabilities

    The characteristics of Type II cyber crime are:

    i. It is generally facilitated by a program that does not fit under the classification crime ware. Forexample, conversations may take place using IM (Instant Messaging) clients or files may be

    transferred using the FTP protocol

    ii. There are generally repeated contacts or events from the perspective of the user.

    According to many classification on cyber crimes, there are four major types of cyber crimes

    based on Lawyers Club India (2009) and my research also shows that this classification is completely

    needed in our modern network nowadays and to guarantee human basic right. The 4 major categories

    are cyber crime against individual, cyber crime against property, cyber crime against organization and

    cyber crime against society. This classification also used by Report Cyber Crime Centre,

    (http://www.reportcybercrime.com/classification.php) an online assistance under IT act in India.

    http://www.reportcybercrime.com/classification.phphttp://www.reportcybercrime.com/classification.phphttp://www.reportcybercrime.com/classification.phphttp://www.reportcybercrime.com/classification.php
  • 7/29/2019 750620126206_17644_final

    6/17

    6

    i. Cyber crime against individualCybercrimes committed against persons include various crimes like transmission of child-

    pornography, harassment of any one with the use of a computer such as e-mail. The trafficking,

    distribution, posting, and dissemination of obscene material including pornography and indecent

    exposure, constitutes one of the most important Cybercrimes known today. The potential harm of

    such a crime to humanity can hardly be amplified. Examples of cyber crime against individual are:

    Email spoofing Spamming Cyber Defamation Harassment & Cyber stalking

    For example in cyber chat case, a minor girl in Ahmedabad was lured to a private place

    through cyber chat by a man, who, along with his friends, attempted to gang rape her. As some

    passersby heard her cry, she was rescued. This case is one of example under harassment and cyber

    stalking. Another example wherein the damage was not done to a person but to the masses is the case

    of the Melissa virus. The Melissa virus first appeared on the internet in March of 1999. It spread

    rapidly throughout computer systems in the United States and Europe. It is estimated that the virus

    caused 80 million dollars in damages to computers worldwide.

    ii. Cyber crime against propertyThese crimes include computer vandalism (destruction of others' property), transmission of harmful

    programmes. Two best examples under this type of cyber crime is credit card fraud and intellectual

    property crimes intellectual property crimes include software piracy, illegal copying of programs and

    distribution of copies of software.

    iii. Cyber crime against organizationCyberterrorism is one distinct kind of crime in this category. The growth of internet has shown that

    the medium of cyber space is being used by individuals and groups to threaten the international

    governments as also to terrorize the citizens of a country. This crime manifests itself into terrorism

    when an individual cracks into a government or military maintained website. A few example of this

    type are:

    Unauthorized accessing of computer - a) Changing/deleting data, b) Computer voyeur: Computer contamination / Virus attack - a computer virus is a computer program that can

    infect other computer programs by modifying them

  • 7/29/2019 750620126206_17644_final

    7/17

    7

    Email bombing - Sending large numbers of mails to the individual or company or mailservers thereby ultimately resulting into crashing.

    Salami attack - when negligible amounts are removed and accumulated in to something larger.These attacks are used for the commission of financial crimes.

    Logic bomb - its an event dependent programme, as soon as the designated event occurs, itcrashes the computer, release a virus or any other harmful possibilities

    Trojan horse - an unauthorized program which functions from inside what seems to be anauthorized program, thereby concealing what it is actually doing.

    Data diddling - This kind of an attack involves altering raw data just before it is processed bya computer and then changing it back after the processing is completed.

    In recent cases in Malaysia, about 51 governmentss website have been hacked on 15 June 2011

    (Utusan Malaysia, 16 June 2011). The hackers group named themselves, as Anonymous are

    targeting website that have .gov.my suffix. Among website that involved waswww.malaysia.gov.my,

    www.politeknik.gov.my,www.upm.edu.myand more. Cracking is amongst the gravest cyber-crimes

    known till date. It is a dreadful feeling to know that a stranger has broken into your computer systems

    without your knowledge and consent and has tampered with precious confidential data and

    information. The recent denial of service attacks seen over the popular commercial sites like E-bay,

    Yahoo, Amazon and others are a new category of Cyber-crimes which are slowly emerging as being

    extremely dangerous.

    iv. Cyber crime against societyThese crimes not only affect individual or any organisation but the society at large. They include

    pornography (especially child pornography), polluting the youth through indecent exposure and

    trafficking. Some examples are:

    Forgery - currency notes, revenue stamps, mark sheets etc can be forged using computers andhigh quality scanners and printers

    Cyber terrorism - use of computer resources to intimidate or coerce others Web jacking - hackers gain access and control over the website of another, even they change

    the content of website for fulfilling political objective or for money.

    Besides these classifications, Malaysia Lawyers (http://malaysia-lawyers.com) has found that

    cyber crime can be divided into three major categories:

    http://www.malaysia.gov.my/http://www.malaysia.gov.my/http://www.malaysia.gov.my/http://www.politeknik.gov.my/http://www.politeknik.gov.my/http://www.upm.edu.my/http://www.upm.edu.my/http://www.upm.edu.my/http://malaysia-lawyers.com/http://malaysia-lawyers.com/http://malaysia-lawyers.com/http://malaysia-lawyers.com/http://www.upm.edu.my/http://www.politeknik.gov.my/http://www.malaysia.gov.my/
  • 7/29/2019 750620126206_17644_final

    8/17

    8

    i. against individualsii. against property

    iii. against government

    2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA

    Generally speaking, computers play four roles in crimes: They serve as objects, subjects, tools, and

    symbols. In this topic, I will make a comparison of cyber crimes in Malaysia and USA based on this

    point of view:

    i. Cyber crime act and lawsFor Malaysia to be a world leading country in ICT development and be a global centre and hub for

    communication and multimedia information and content services, a law needs to be formed to

    promote a high level of consumer confidence and to protect the information security and network

    reliability and integrity. Therefore, the first important step that is taken by the government of

    Malaysia to combat this new type of crime is by introducing a new legal framework to facilitate the

    development of ICT systems by countering the threats and abuses related to such systems called

    Cyber Laws of Malaysia.

    MalaysiaThe Malaysian cyber laws consist of Computer Crime Act 1997, Digital Signature Act 1997,

    Telemedicine Act 1997, Communication and Multimedia Act 1998 Copyright (Amendment) Act

    1997, Malaysian Communication and Multimedia Commission Act 1998 and Optical Disk Act 2000.

    There are other existing laws that will be used in conjunctions with these acts. They are the Official

    Secret Act Act 1976, Patent Act 1983, Prison Act 1995, Akta Arkib Negara 44/146 and other relevant

    legislations. This set of Acts has made Malaysia as one of the first countries to enact a comprehensive

    set of cyber laws. The above Acts were formed for safeguarding consumer and service providers

    besides on-line businesses and owners of intellectual property.

    USAThe first federal computer crime statute was the Computer Fraud and Abuse Act of 1984 (CFAA).

    The fact that only one indictment was ever made under the original CFAA before it was amended in

    1986 shows how difficult it is to write effective computer crime legislation. CFAA is the most

    important computer crime statute in the U.S. because almost every other statute that deal with

    computer crime modifies the CFAA.

  • 7/29/2019 750620126206_17644_final

    9/17

    9

    Cyber Security Enhancement Act (CSEA) was passed together with the Homeland Security

    Act in 2002, it granted sweeping powers to the law enforcement organizations and increased penalties

    that were set out in the Computer Fraud and Abuse Act. The Digital Millennium Copyright Act

    (DMCA) was enacted in 1998. The basic purpose of the DMCA is to amend Title 17 of the United

    States Code and to implement the World Intellectual Property Organization (WIPO) Copyright Treaty

    and Performances and Phonograms Treaty, which were designed to update world copyright laws to

    deal with the new technology. The DMCA prohibits circum venting a technological measure

    designed to protect a copyright. DMCA also prohibits the manufacture or sale of devices or programs

    whose primary purpose is to circumvent access control technology. Table 1 shows all countries with

    cyber law (McConnell, 2000).

    Table 1: Countries with cyber law (McConnell, 2000).

  • 7/29/2019 750620126206_17644_final

    10/17

    10

    ii. Cyber crime agencySecurity measures such as two factor authentication, that many online banking services rely on, are no

    longer as secure as was first thought. The challenge is enormous because cybercriminals are

    unfettered by national boundaries, while law enforcement agencies' efforts are limited to local

    jurisdictions. In the face of an onslaught from highly organised criminal organisations, are under-

    resourced law enforcement agencies fighting a losing battle? Most agree that law enforcement alone

    does not have the financial, technical or manpower resources that it would take to make any real

    impact on cybercrime. With the law enforcement and act, an agencies to handle the cyber crimes

    report should well organized in every countries. Strong working relationships between authorities in

    countries around the world can help to solve cyber crimes cases quickly. For example, The Malaysian

    Parliament website that was hacked on December 2000 was traced to IP addresses in Brazil and

    France. The relevant authorities in those countries were contacted for assistance in the investigation.

    MalaysiaCyber Security Malaysia is not an enforcement agency but it is an agency under Ministry of Science

    Technology and Innovation (MOSTI). Cyber Security Malaysia only provided support to enforcement

    agencies such as police and victims, in ensuring that justice will prevail regardless of the "space"

    where a particular crime is conducted. This agency also assist in cyber forensics and analysis -such as

    analysing evidence and providing expert witnesses for relevant cases. Most of the cases handled by

    Cyber Security Malaysia.

    USAThe primary federal law enforcement agencies that investigate domestic crime on the Internet include:

    theFederal Bureau of Investigation (FBI), theUnited States Secret Service, theUnited States

    Immigration and Customs Enforcement (ICE) , theUnited States Postal Inspection Service, and

    theBureau of Alcohol, Tobacco and Firearms (ATF). Each of these agencies has offices conveniently

    located in every state to which crimes may be reported. Contact information regarding these local

    offices may be found in local telephone directories. In general, federal crime may be reported to the

    local office of an appropriate law enforcement agency by a telephone call and by requesting the "Duty

    Complaint Agent." Each law enforcement agency also has a headquarters (HQ) in Washington, D.C.,

    which has agents who specialize in particular areas. For example, the FBI and the U.S. Secret Service

    both have headquarters-based specialists in computer intrusion (i.e., computer hacker) cases.

    http://www.fbi.gov/http://www.fbi.gov/http://www.fbi.gov/http://www.ustreas.gov/usss/index.shtmlhttp://www.ustreas.gov/usss/index.shtmlhttp://www.ustreas.gov/usss/index.shtmlhttp://www.ice.gov/http://www.ice.gov/http://www.ice.gov/http://www.ice.gov/http://www.usps.com/postalinspectors/http://www.usps.com/postalinspectors/http://www.usps.com/postalinspectors/http://www.atf.gov/http://www.atf.gov/http://www.atf.gov/http://www.atf.gov/http://www.usps.com/postalinspectors/http://www.ice.gov/http://www.ice.gov/http://www.ustreas.gov/usss/index.shtmlhttp://www.fbi.gov/
  • 7/29/2019 750620126206_17644_final

    11/17

    11

    A number of international organisations work constantly to analyse the latest developments in

    cybercrime and have set up working groups to develop strategies to fight these crimes.

    The G8772In 1997, the Group of Eight (G8) established a Subcommittee773 on High-tech Crimes dealing with

    the fight against cybercrime.774 During their meeting in Washington D.C., United States, the G8

    Justice and Interior Ministers adopted Ten Principles and a Ten-Point Action Plan to fight high-tech

    crimes.

    United Nations788At the 8th Congress on the Prevention of Crime and the Treatment of Offenders (held in Havana,

    Cuba, 27 August7 September 1990), the UN General Assembly adopted a resolution dealing with

    computer crime legislation.789 Based on its Resolution 45/121 (1990), the UN published a manual in

    1994 on the prevention and control of computer-related crime.

    International Telecommunication Union802The International Telecommunication Union (ITU), as a specialized agency within the United

    Nations, plays a leading role in the standardization and development of telecommunications as well as

    cybersecurity issues. Among other activities, the ITU was the lead agency of the World Summit on

    the Information Society (WSIS) that took place in two phases in Geneva, Switzerland (2003) and in

    Tunis, Tunisia (2005). Governments, policymakers and experts from around the world shared ideas

    and experiences about how best to address the emerging issues associated with of the development of

    a global information society, including the developmentcompatible standards and laws.

    iii. Cyber crimes cases and reportAccording to the Computer Emergency Response Team Coordination Center (CERT/CC), the number

    of reported incidences of security breaches in the first three quarters of 2000 has risen by 54 percent

    over the total number of reported incidences in 1999.1 Moreover, countless instances of illegal access

    and damage around the world remain unreported, as victims fear the exposure of vulnerabilities, the

    potential for copycat crimes, and the loss of public confidence. The proportion of identity theft/fraud

    facilitated online is expected to increase throughout 2007 as a result of the increasing technical

    sophistication and organization of fraudsters and the increasing amount of identity information that

    may be gathered from online sources.

  • 7/29/2019 750620126206_17644_final

    12/17

    12

    MalaysiaIn 2008, Cyber Security Malaysia handled a total of 2,123 incidents more than 100 per cent increase

    compared with 2007. But that rate was an increase in incidents and it may not correlate with cyber

    crime rates. Malaysia saw the number of reported cyber crimes rise to 5,181 year 2010 from 2,642 in

    2009 (New Straits Times Press, 27 October 2010). In the first quarter of 2011, 3,563 incidents were

    reported to the Cyber 999 Security Incident Help Centre and of those, 400 phishing sites targeting

    Malaysian banks were reported. Figure 1 and 2 shows reported based on cyber crime in Malaysia in

    2010 (modified fromwww.mycert.com.my).

    Figure 1: Reported based on cyber crime incidents in year 2010.

    Figure 2: Reported by total number based on Figure 1.

    http://www.mycert.com.my/http://www.mycert.com.my/http://www.mycert.com.my/http://www.mycert.com.my/
  • 7/29/2019 750620126206_17644_final

    13/17

    13

    Table 2 shows percentage derived from the statistic according to types of cyber crime in

    Malaysia. Fraud percentage is 27.34 % and spam percentage is 15.67 % in Malaysia record.

    CASESPERCENTAGES

    (%)

    Content related 0.48 %

    Denial of service- 0.82 %

    Cyber harrassment- 5.18 %

    Fraud 27.34 %

    Intrusion 26.70 %

    Intrusion attempt 8.47 %

    Malicious codes 14.82 %

    Spam 15.67 %

    Vulnerabilities report 0.52 %

    USAThe Federal Bureau of Investigation (FBI) in collaboration with the Internet Crime Complaint Center

    (www.ic3.gov)have again published its annual report that shows cybercrime continue to be on the

    increase.Complaints received by IC3 cover many different fraud and non-fraud categories, including

    auction fraud, non-delivery of merchandise, credit card fraud, computer intrusions, spam/unsolicited

    email, and child pornography. All of these complaints are accessible to local, state, and federal law

    enforcement to support active investigations, trend analysis, and public outreach and awareness

    efforts.

    Figure 3 shows the top 10 most common report in USA (2009). Based on the figure, fraud

    percentage is 32.7 % and spam percentage is 6.9 %. Fraud in the USA are in various types such as

    overpayment fraud, credit card fraud, auction fraud, advance fee fraud and miscellaneous fraud.

    Comparison between fraud and spam percentage between in Malaysia and USA.

    Malaysia: Fraud - 27.34 % and spam - 15.67 % USA: Fraud - 32.7 % and spam - 6.9 %

    http://www.ic3.gov/http://www.ic3.gov/http://www.ic3.gov/http://www.ic3.gov/
  • 7/29/2019 750620126206_17644_final

    14/17

    14

    Fraud percentage in USA is higher than in Malaysia. While spam percentage is higher in Malaysia

    than in USA. This means, fraud cases or complaints in developed country is higher than non

    developed country. However, spam cases is a beginning to fraud cases.

    2.3 SUGGESTIONS

    As accessibility to the internet grows, many people are becoming victims to cybercrime (Fafinski &

    Minassian, 2008). Technology and crime in recent history have known an unhealthy cohabitation. In a

    global environment plagued by an ever-growing community of ill-intentioned cyber criminals whose

    deleterious effects are obvious on affected people and organizations, every contribution to a fuller and

    more comprehensive understanding of the determinants and components, and how these components

    relate is critical.

    In our country, extending the rule of law into cyberspace is a critical step to create a

    trustworthy environment for people and businesses. Because that extension remains a work in

    progress, organizations today must first and foremost defend their own systems and information from

    attack, be it from outsiders or from within. They may rely only secondarily on the deterrence that

    Fi ure 3:Fi ure 3:Fi ure 3:

    Fi ure 3:

  • 7/29/2019 750620126206_17644_final

    15/17

    15

    effective law enforcement can provide. To provide this self-protection, organizations should focus on

    implementing cyber security plans addressing people, process, and technology issues. Organizations

    need to commit the resources to educate employees on security practices, develop thorough plans for

    the handling of sensitive data, records and transactions, and incorporate robust security technology

    such as firewalls, anti-virus software, intrusion detection tools, and authentication servicesthroughout

    the organizations' computer systems.

    These system protection tools--the software and hardware for defending information systems

    are complex and expensive to operate. To avoid hassles and expense, system manufacturers and

    system operators routinely leave security features turned off, needlessly increasing the vulnerability

    of the information on the systems. Bugs and security holes with known fixes are routinely left

    uncorrected. Further, no agreed-upon standards exist to benchmark the quality of the tools, and no

    accepted methodology exists for organizations to determine how much investment in security is

    enough. The inability to quantify the costs and benefits of information security investments leave

    security managers at a disadvantage when competing for organizational resources. Much work

    remains to improve management and technical solutions for information protection. To conclude,

    there is need for the emergence of well defined framework of Malaysian cyber laws which should

    include:

    i. Create and implement a minimum set of guiding rules of conduct that would facilitate efficientcommunications and reliable commerce through the use of electronic medium

    ii. Formulation of new laws and amendment of existing laws by nations within their presentterritorial boundaries thereby attempting to regulate all actions on the internet that have any

    impact on their own population

    iii. Nations may enter into multi-lateral international agreementiv. Define punishment and prevent wrongful action that attack the electronic medium or harm the

    other

    v. To meet the challenge posed by new kinds of crime made possible by computer technologyincluding telecommunication, various cyber laws should be reviewed

  • 7/29/2019 750620126206_17644_final

    16/17

    16

    3.0 CONCLUSIONIt is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them.

    History is the witness that no legislation has succeeded in totally eliminating crime from the globe.

    The only possible step is to make people aware of their rights and duties (to report crime as a

    collective duty towards the society) and further making the application of the laws more stringent to

    check crime. Undoubtedly the act is a historical step in the cyber world. Further I all together do not

    deny that there is a need to bring changes in the Information Technology Act to make it more

    effective to combat cyber crime in the world. As one nation, it is not impossible for us to fight the bad

    hackers and all the cyber crimes record as long as we have the awareness and the platform such as

    Cyber Security Malaysia and other government ministry to support us handling the scenario.

    4.0 REFERENCESAghatise E. Joseph, 2006. Cybercrime definition. Computer Crime Research Center

    Brenner, 2004. Cybercrime Metrics: Old Wine, New Bottles?, Virginia Journal of Law and

    Technology, Vol. 9

    Council of Europe Convention Cybercrime (ETS No. 185), 2001. UK Cybercrime report.

    Fafinski, S. and Minassian, N., 2008. UK Cybercrime Report 2008. New York: Garlik

    Hale, 2002. Cybercrime: Facts & Figures Concerning this Global Dilemma, CJI 2002, Vol. 18.

    McConnell, 2000. Cyber Crime and Punishment? Archaic Laws Threaten Global Information.

    www.mcconnellinternational.com

    Thomas A. Petee, Jay Corzine, Lin Huff-Corzine, Janice Clifford and Greg Weaver, 2006.Defining

    Cyber Crime: Issues in Determining the Nature and Scope of Computer-Related

    Offenses.

    http://www.techterms.com/definition/cybercrime).

    http://www.crime-research.org/articles/joseph06).

    http://www.mcconnellinternational.com/http://www.mcconnellinternational.com/http://www.techterms.com/definition/cybercrimehttp://www.techterms.com/definition/cybercrimehttp://www.crime-research.org/articles/joseph06http://www.crime-research.org/articles/joseph06http://www.crime-research.org/articles/joseph06http://www.techterms.com/definition/cybercrimehttp://www.mcconnellinternational.com/
  • 7/29/2019 750620126206_17644_final

    17/17

    17