You are on page 1of 14

Keamanan

komputer
STATISTIK KEJAHATAN KOMPUTER
RISK MANAGEMENT
Computer security  Menjaga Aset
RISK MANAGEMENT
Cybercrime
Phishing adalah tindakan memperoleh informasi
pribadi seperti User ID, Password dan data-data
sensitif lainnya dengan menyamar sebagai orang
atau organisasi yang berwenang melalui sebuah
email.
Mengidentifikasi Kejahatan siber

Membuat Kelompok (2-3 mahasiswa)


Carilah contoh kasus kejahatan siber
TYPES OF OFFENDERS
 Abusive User
 Cyber Bully
 Cyber-Criminal
 Cyber-Fighter
 Cyber-Terrorist
 Hacktivist
 Insider (Employee)
 Online Social Hacker
 Script Kiddie
 Entities As Offenders
TYPES OF OFFENDERS
 Abusive User
These users propagate hate speech on the Internet and
glorification of violence, with the false alibi of the right to freedom of
expression.

 Cyber Bully
Cyber-bullies intend to insult, hurt, or embarrass other individuals through
sending or posting text or images through the Internet, cell phones, or other
devices

 Cyber-Criminal
Cyber-criminals are responsible for most of the incidents as their main
purpose is to obtain intelligence and profit from illegal and criminal activity in
the World Wide Web
TYPES OF OFFENDERS
 Cyber-Fighter
Cyber-fighters are politically motivated groups of citizens, similar to hacktivists,
acting on behalf of their governments and therefore contributing to the cyber
activity of their country. They possess remarkable striking power due to
national funding and launch their attacks whenever their national, moral or
religious values are offended by other groups.

 Hacktivist
This is a threat agent group with great media attention due to their political
motivation. Their main objective is hacking and unveiling critical information
from organizations, authorities, politicians and people with power in general

 Cyber-Terrorist
Cyber-terrorists seek to launch cyber-attacks against critical infrastructure

 Insider (Employee)
TYPES OF OFFENDERS
 Insider (Employee)
Insiders may by current or former employees, current or former service
providers/consultants/contractors or suppliers/partners,

 Online Social Hacker


This threat agent group uses the skills and knowledge of its members
regarding social engineering. The online social hackers have a deep
understanding of social behavior and user emotional states and they are
capable in creating fake trust relationships with their victims.

 Script Kiddie
Due to the increased cybercrime visibility, the means for utilizing attacks are
widely accessible. As a result, children and teenagers are attracted to such
activity either for demonstration of skills

 Entities As Offenders
Access Violation
1) Physical Tampering: This type of attack includes the deliberate physical
damaging or corrupting of hardware devices with the intention of destruction
or malfunction.

2) Local Computer Access: Through local computer access, an individual can


log in a computer system, navigate through the operating system and carry
out a series of possible attacks such as malware installation, information
leakage, identity theft, data breaches, etc.

3) Remote Computer Access: Most of cybercrime incidents are committed


remotely due to the perceived safety, impunity and anonymity that the World
Wide Web provides..
Access Violation
1) Physical Tampering: This type of attack includes the deliberate physical
damaging or corrupting of hardware devices with the intention of destruction
or malfunction.

2) Local Computer Access: Through local computer access, an individual can


log in a computer system, navigate through the operating system and carry
out a series of possible attacks such as malware installation, information
leakage, identity theft, data breaches, etc.

3) Remote Computer Access: Most of cybercrime incidents are committed


remotely due to the perceived safety, impunity and anonymity that the World
Wide Web provides..
Target
1. Physical Abuse: ancaman serangan fisik, pembunuhan lewat media
komunikasi, internet
2. Emotional Abuse: keyakinan, rasism, hate speech di internet.
3. Sexual Abuse or Exploitation: illegal industry is extremely profitable
4. Financial Abuse or Exploitation: In this subcategory, the offender’s
objective is the unauthorized use or management of funds, assets,
property, intellectual property and resources in general.
5. ICT Abuse or Exploitation: Offenders may conduct attacks against the
availability, security, confidentiality and integrity of data, computer
systems, and telecommunication infrastructures.
6. Infrastructure ICT Abuse or Exploitation: This target refers to ceasing or
interrupting the perpetual functionality of critical infrastructure, by
abusing ICT systems
7. Social Abuse: Cybercrime offenders also target fundamental social
principles by limiting accessibility to social services.
Malicious Code

You might also like