You are on page 1of 1

TUTORIAL 2

1. Name five (5) possible criminal activities commonly known as “emerging computer
crimes” in the cyberspace.

(2016/2017 Final Examination Question)

2. Mike was employed as the personal computer administrator for Asia.net, an Internet
Service Provider. His duties included installing software and hardware on the company’s
computers and giving technical support to the company’s employees. As part of his work
he knew detailed information about the company’s internal computer system, including
passwords of e-mail accounts of other employees. After resigning from his job he was
allowed to keep his e-mail account with Asia.net as a paying customer.

Upon leaving Asia.net he used his e-mail account to switch to another employee’s
account to enable him to make unauthorized use of benefits and advantages given to
company employees. This included adjusting some information relating to discounts
entitled for existing employees in case they wish to purchase computer software. When
this was discovered, the company had realised that they suffered RM5,000.00 loss of
profit from the discounts thus immediately terminated his e-mail account. However, he
again was able to access the Asia.net system, causing considerable chaos by deleting the
company’s entire billing system and its registry. After spending many hours of effort and
funds the company was able to repair the damage.

The Director of Asia.net seeks your advise as he wishes to bring an action against Mike.

(Total: 25 marks)

You might also like