You are on page 1of 8

Group Assignment

“Web Safety”

Group Name :

Serviana Nuru 17101694


Ni Wayan Rika Andini 17101933
Ni Made Novia Dwi Pertiwi 17101718
Wahyu Ulian Arian 17101699
Muhammad Isromi Janwar 1610

STMIK-STIKOM INDONESIA
2019
A. Description of Internet Crime

Internet crime is any crime or illegal online activity committed on the Internet, through the
Internet or using the Internet. The widespread Internet crime phenomenon encompasses multiple
global levels of legislation and oversight. In the demanding and continuously changing IT field,
security experts are committed to combating Internet crime through preventative technologies,
such as intrusion detection networks and packet sniffers. Internet crime is a strong branch of
cybercrime. Identity theft, Internet scams and cyberstalking are the primary types of Internet
crime. Because Internet crimes usually engage people from various geographic areas, finding and
penalizing guilty participants is complicated.

Techopedia explains Cybercrime


Common types of cybercrime include online bank information theft, identity theft, online
predatory crimes and unauthorized computer access. More serious crimes like cyberterrorism
are also of significant concern.Cybercrime encompasses a wide range of activities, but these
can generally be broken into two categories:

 Crimes that target computer networks or devices. These types of crimes include viruses
and denial-of-service (DoS) attacks.

 Crimes that use computer networks to advance other criminal activities. These types of
crimes include cyberstalking, phishing and fraud or identity theft.

The FBI identifies cybercrime fugitives who have allegedly committed bank fraud and
trafficked counterfeit devices that access personal electronic information. The FBI also
provides information on how to report cybercrimes, as well as useful intelligence information
about the latest cybercriminals.

B. Identity theft and invasion of privacy

Cybercrime affects both a virtual and a real body, but the effects upon each are different. This
phenomenon is clearest in the case of identity theft. In the United States, for example, individuals
do not have an official identity card but a Social Security number that has long served as a de
facto identification number. Taxes are collected on the basis of each citizen’s Social Security
number, and many private institutions use the number to keep track of their employees, students,
and patients. Access to an individual’s Social Security number affords the opportunity to gather
all the documents related to that person’s citizenship—i.e., to steal his identity. Even stolen credit
card information can be used to reconstruct an individual’s identity. When criminals steal a firm’s
credit card records, they produce two distinct effects. First, they make off with digital
information about individuals that is useful in many ways. For example, they might use the credit
card information to run up huge bills, forcing the credit card firms to suffer large losses, or they
might sell the information to others who can use it in a similar fashion. Second, they might use
individual credit card names and numbers to create new identities for other criminals. For
example, a criminal might contact the issuing bank of a stolen credit card and change the mailing
address on the account. Next, the criminal may get a passport or driver’s license with his own
picture but with the victim’s name. With a driver’s license, the criminal can easily acquire a new
Social Security card; it is then possible to open bank accounts and receive loans—all with the
victim’s credit record and background. The original cardholder might remain unaware of this
until the debt is so great that the bank contacts the account holder. Only then does the identity
theft become visible. Although identity theft takes places in many countries, researchers and law-
enforcement officials are plagued by a lack of information and statistics about the crime
worldwide. Cybercrime is clearly, however, an international problem.

C. A Case Relate To Internet Crime And Security Risk

In 2002 the newly formed U.S. Internet Crime Complaint Center (IC3) reported that more
than $54 million dollars had been lost through a variety of fraud schemes; this represented a
threefold increase over estimated losses of $17 million in 2001. The annual losses grew in
subsequent years, reaching $125 million in 2003, about $200 million in 2006, close to $250
million in 2008, and over $1 billion in 2015. In the United States the largest source of fraud is
what IC3 calls “non-payment/non-delivery,” in which goods and services either are delivered but
not paid for or are paid for but not delivered. Unlike identity theft, where the theft occurs without
the victim’s knowledge, these more traditional forms of fraud occur in plain sight. The victim
willingly provides private information that enables the crime; hence, these are transactional
crimes. Few people would believe someone who walked up to them on the street and promised
them easy riches; however, receiving an unsolicited e-mail or visiting a random Web page is
sufficiently different that many people easily open their wallets. Despite a vast amount of
consumer education, Internet fraud remains a growth industry for criminals and prosecutors.
Europe and the United States are far from the only sites of cybercrime. South Korea is among the
most wired countries in the world, and its cybercrime fraud statistics are growing at an alarming
rate. Japan has also experienced a rapid growth in similar crimes.
D. The Solution About How To Protect Private Data When The Internet Crime Happen.

Anyone using the internet should exercise some basic precautions. Here are 11 tips you can use
to help protect yourself against the range of cybercrimes out there.

1. Use a full-service internet security suite

For instance, Norton Security provides real-time protection against existing and emerging
malware including ransomware and viruses, and helps protect your private and financial
information when you go online.

2. Use strong passwords

Don’t repeat your passwords on different sites, and change your passwords regularly. Make them
complex. That means using a combination of at least 10 letters, numbers, and symbols. A
password management application can help you to keep your passwords locked down.

3. Keep your software updated

This is especially important with your operating systems and internet security software.
Cybercriminals frequently use known exploits, or flaws, in your software to gain access to your
system. Patching those exploits and flaws can make it less likely that you’ll become a cybercrime
target.

4. Manage your social media settings

Keep your personal and private information locked down. Social engineering cybercriminals can
often get your personal information with just a few data points, so the less you share publicly, the
better. For instance, if you post your pet’s name or reveal your mother’s maiden name, you might
expose the answers to two common security questions.

5. Strengthen your home network

It’s a good idea to start with a strong encryption password as well as a virtual private network. A
VPN will encrypt all traffic leaving your devices until it arrives at its destination. If
cybercriminals do manage to hack your communication line, they won’t intercept anything but
encrypted data. It’s a good idea to use a VPN whenever you a public Wi-Fi network, whether it’s
in a library, café, hotel, or airport.

6. Talk to your children about the internet

You can teach your kids about acceptable use of the internet without shutting down
communication channels. Make sure they know that they can come to you if they’re
experiencing any kind of online harassment, stalking, or bullying.

7. Keep up to date on major security breaches

If you do business with a merchant or have an account on a website that’s been impacted by a
security breach, find out what information the hackers accessed and change your password
immediately.

8. Take measures to help protect yourself against identity theft

Identity theft occurs when someone wrongfully obtains your personal data in a way that involves
fraud or deception, typically for economic gain. How? You might be tricked into giving personal
information over the internet, for instance, or a thief might steal your mail to access account
information. That’s why it’s important to guard your personal data. A VPN — short for virtual
private network — can also help to protect the data you send and receive online, especially when
accessing the internet on public Wi-Fi.

9. Know that identity theft can happen anywhere

It’s smart to know how to protect your identity even when traveling. There are a lot of things you
can do to help keep criminals from getting your private information on the road. These include
keeping your travel plans off social media and being using a VPN when accessing the internet
over your hotel’s Wi-Fi network.

10. Keep an eye on the kids


Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect them
against identity theft. Identity thieves often target children because their Social Security number
and credit histories frequently represent a clean slate. You can help guard against identity theft by
being careful when sharing your child’s personal information. It’s also smart to know what to
look for that might suggest your child’s identity has been compromised.

11. Know what to do if you become a victim

If you believe that you’ve become a victim of a cybercrime, you need to alert the local police
and, in some cases, the FBI and the Federal Trade Commission. This is important even if the
crime seems minor. Your report may assist authorities in their investigations or may help to
thwart criminals from taking advantage of other people in the future. If you think cybercriminals
have stolen your identity. These are among the steps you should consider.

 Contact the companies and banks where you know fraud occurred.

 Place fraud alerts and get your credit reports.

 Report identity theft to the FTC.

E. Software That Can Be Used for Web Safety

NetSparker

NetSparker offers excellent web security features and is cross-compatible on several


operating system platforms. This website security software offers a nice user interface which
makes web security easy to setup and use without having any technical knowledge.

In addition, NetSparker scans your website and gives detailed vulnerability reports periodically
which allows for easy detection and removal of threats. The software enables full configuration
of its scanning tool whereby you can select which part of your website needs more attention.
The penetration test feature enables the software to protect your website from DDoS
attacks and bugs as it detects and blocks these threats. In addition, NetSparker enables your
website to be PCI compliant; hence, it improves your website performance and boost credibility
with your site visitors.

However, this website security software is pricey and comes at a whopping $1950 a year.
But, they offer good customer support which is available 24/7 daily, and their software is
available on Windows and other OS.

References :

1. https://www.techopedia.com/definition/26587/internet-crime
2. https://www.britannica.com/topic/cybercrime/Identity-theft-and-invasion-of-
privacy

3. https://www.justice.gov/opa/pr/russian-cyber-criminal-pleads-guilty-role-
organized-cybercrime-ring-responsible-50-million

4. https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-
yourself-from-cybercrime.html

You might also like