FAKULTI PENDIDIKAN DAN BAHASA
ENGLISH for WRITTEN COMMUNICATION
NO. MATRIKULASI NO. KAD PENGNEALAN NO. TELEFON E-MEL
: : : :
671230045325001 671230045325 0136478910 email@example.com
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
1. COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES 7. WELCOME SPEECH 2. CONCLUSION 10. WHAT IS INTERNET? 4. REFERENCS
PAGE 2 PAGE 3 PAGE 4 PAGE 5 PAGE 6
PAGE 11 PAGE 14 PAGE 15 PAGE 16
. MyCert INCIDENT STATISTICS FOR THE YEAR 2011 PAGE 8. WHY CYBER CRIME SHOULD BE CONTROLLED? 5. CYBER CRIME CLASSIFIED 6. HOW TO ADDRESS THE CYBER CRIME? 9. INTRODUCTION 3.
I am confident that the work produced can yield a very valuable one day. To complete this task. Job experiences over twenty years is a lot of help. Finally. Existing trials pretty much waiting. Time is like gold.
Thank you. Time elapsed be turned back. The task becomes easier with the internet. To lecturers and friends that helped. Thanks also to the wife and children a lot of help and motivating spirit to face the vagaries of longdistance students. To the beloved family. Hopefully that what I wish to get I would pray for the love of God. thank spoken. Commitment to work and family at this age is challenging.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
WELCOME SPEECH Praise God that hath given His permission and strength given then what can I translate in my heart in the quest for knowledge that is useful for self. Sense of pride when the assigned tasks can be completed even in a state of considerable will not press.
MOHAMAD SHAWALUDDINNOR B. What is inside poured back on top of each sheet of this task. may be patient and appears. Wake up till morning to find out all the essence. You all helped morally pray for success and happiness always the conditions that are encountered. Everything is at our fingertips. family and children. HJ MD NOR OPEN UNIVERSITY MALAYSIA 2011
. Thanks to the progress of time available. especially from the existing workload. spare time is at night with snoring
accompanied by beloved children.
extortion and all activities that involve the violation of existing law. loss.
Countries in the western block focusing on security. smuggling and so on.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
INTRODUCTION What is cyber crime? Before we go much further on the topics discussed. there is some different definitions of cyber crime in certain countries. gambling. then almost every country in the world to draft their own laws to address the problem of cyber crime and to impose capital punishment to those involved. Malaysia is involved in internet usage agreements that are not refined to allow this crime. it is better to discuss first the meaning of cyber crime. murder. California. especially in the western block. Parker. 'copyright law'. Justice Department to reiterate this definition by stating that computer crime is any illegal activity in which knowledge of computer technology used to make it happen. due to the crime has caused great chaos. Due to different definitions of cyber crime. In this
Meanwhile. However. Donn B. However. For the Muslim countries. and significant losses. it is difficult for enforcement of cyber laws. Various laws related to safety and commerce developed. fraud.
For example. a researcher at the cyber crime and security for SRI International in Merlo Park. kidnapping. advertising. death. forgery. the law relating to 'hackers' and the spread of the virus and so on. pornography. sex is a crime but not for most countries. trade and economy of their countries. extortion.S. Those involved with child pornography are considered to be criminals. According to Mr. fraud. Cyber crime involves all the usual criminal activities like theft. and continuous . the U. in England. such as 'trademark law'.
. cyber crime is a behaviours in which they have an intention and is associated with the computer through any means to cause the victim to suffer or cause suffering. Crime means activities such as theft. matters that related to pornography were taken for granted.
newspapers have to cost. disseminated. Traditional media is restricted by geographic limitations. the Official Secrets Act 1972. This was done to facilitate the effective control of information.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
WHAT IS INTERNET? Internet refers to the network constructed by connecting multiple computers. such as the Printing. Existing media is very different from the internet because the internet is a platform that provides information from the millions of consumers and
. When the advent of the internet as a communication tool to date. Internet is the two main types of communication services and information retrieval. then
feelings of fear and security administrators in some countries that has to be negative about the freedom of speech. the Sedition Act 1948. thought and felt that their citizens. locating information and several other services. ideology. manpower. dissemination of information. remote access file services. the Broadcasting Act 1988. Internet has surpassed all existing means of communication. Formerly a radio and television are important media tools to
spread information. electronic banking and the Internet. This license permits and information that can be printed. fast. radio and television are one way media interactive not like the Internet. Delivery of information through radio and television and print materials can be controlled. Millions of websites have been built with all kinds of information. Therefore this dissemination occurred disseminated through the
independently. how to disseminate information more easily. thousands or millions of computers to each other via the global telephone lines and satellite. and saves time. Newspaper and Publications Act 1984. From the application is built various types of alternative services to facilitate various transactions such as electronic commerce. propaganda and pornography are also the internet. Dissemination of books. The information disseminated throughout the world with no boundaries of time cause no one is able to control the passage of information in cyberspace. They use this cyberspace to communicate their opinions to the world. magazines. infrastructure and transportation. All publications in Malaysia require a valid permit or license. Many countries have allocated the law to regulate broadcasting and publishing the
materials of these media. it is a network that provides electronic communication services. and advertising. But not now. All this factors limit the dissemination of information and at the same time facilitate the control or filtering information. ideas. simple. In terms of consumption. or distributed to the public.
Some Internet content could threaten their ideology to the population. The existing freedom of speech should not be abused. it is necessary. it is also regulated and supervised. In this way. A person may disseminate information. Who are the cyber criminals? What crimes? Where a crime is committed? These answers are hard to come by because the perpetrator is anywhere in the world and they
. the government considers it is not a serious threat. WHY CYBER CRIME SHOULD BE CONTROLLED? Each user developed and developing countries around the world have adopted the control and supervision of all media and printed materials. household and agricultural needs. communicate and interact with others who are thousands of miles away. There are still many countries that moderation and censorship committed only information which may damage the public mind. the government has taken positive steps to not censor cyberspace. such as Cuba and China. Section 3 (3) of the Communications and Multimedia Act 1998 also declares that none of the provisions under the Act which allows any censorship of information occurs. defamatory or ideologically opposed through the Internet. They prefer their people passive. Is the internet will also pose a threat to certain parties? In Malaysia. such as printed materials and other media. This principle is based on the control information will only produce negative effects on the development of communication technology through the Internet.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
researchers or researchers from around the world. The Government will respond in a similar manner to the user. If opposition parties or spread false information. who practice censorship in total or partial information. not all advances in technology can be fully accepted. They still want to stay with the pattern of government and the lives that have been adopted in which the ideology of the rule continued with little transparency. blind and not savvy to the world's information and recent developments.
A little openness is admission is just technology-related information public facilities. This is enshrined in the bill guarantees promised by the government of Malaysia with companies Multimedia Super Corridor (MSC). people will be able to consider the truth of the information. But this case is different in some countries that stand firm and aggressive. The Government will increase public knowledge and spread the word of truth in print or on television are usually controlled by the government. Since the growing sophistication of internet use and easily accessible. They think. transportation.
The frequency of identity fraud occurs is via e-mail where the user is required to enter personal information. What kind of computer usage will always be dealing with cyber crime activities. hobby or try something new and see the atmosphere of uncertainty. Cyber crime can be classified into: CYBER CRIME CLASSIFIED 1. Input operations. employees or former
employees. a major problem to distinguish cyber threats to the physical threat is to determine who attacked the system. Cyber crime and only use the internet seems to be in the universe. and where. According to Michael A Vatis from the Federal Bureau of Investigation (FBI). Ordinary criminals can be identified by physical and equipment can be seen. Fraud: . Banks and financial institutions being targeted professional robbers and criminals. Military computer may be hijacked. During the September 11 attacks. the 19 aircraft hijackers entered
the United States with a valid visa.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
can move freely all over the world because of the widespread use of Internet around the world. just the way behavior is through the internet. They will attack their own institutions. doctors. data processing. New York and the Pentagon building in Washington. why. output and data communications operations will be used by criminals for the purpose of thoroughly unhealthy. how. They planned the attack on the World Trade Centre. supposedly the bank to update the
. It may be there next to us. cyber and network
criminals are the ones who are well versed in computer technology
systems. friends. objects and situations. competitor institutions.This type of cyber crime is the same as what happens in the real world. Their identity always
change. United States received a big misfortune and shame based on its technological expertise. hired by certain parties. Business organization may be the target of competitors. Sophisticated technology and
pioneer of computer systems. professors. Cyber crime occurs in various forms. United States. Sometimes the laws designed to curb cyber crime can’t do anything like what happened in the United States. While the university will be the target of students or former
students. They respect as other users via telephone and internet. Government agencies are likely to be targets of terrorists and traitors. Generally. Crime is done solely to make money from the victim by means of easy and difficult to detect. or anyone else. until now failed to detect the tragedy of 11 September attack planning. They are professional criminals. Users will become victims or manipulated by criminals or both.
Email to spam is the most dangerous fraud. Examples of common theft is through spyware software. The main activities performed by
. 4. May 3. It causes panic for a while to internet users. According to an article in Anjung pc. Unauthorized access to the system: . Events that had occurred was recently in Malaysia where the hacker has to do the cyber attacks against government websites have a big impact on the information technology systems. Damage or modifications to the program or computer data: . network operating systems. In other words it is dangerous software which can cause aggression and modifications to the network or computer systems and
trespassing stored information leading to damage systems or information.com. From information obtained. giving gifts of money and also offer unreasonable. E-mail is questionable and is known as “spam e-mail”. Consumers are often fooled because the e-mail sent will be linked to websites that resemble the real website. As a result of the impact of e-
mail fraud is causing loss of property and dignity. Theft of information: . Users who are interested in the products with a variety of nice words and praise the user will make a payment by internet banking to transfer money or use credit cards. Many online business cannot be done.Creating a common cybercrime in which user information is taken and used for impersonation. sex. In fact. extortion. in which the Company SONY has been hacked and the criminals have stolen data from 25 million users of their computer game system. cyber criminals to steal data from infected computers such as Internet search trends and confidential information without the knowledge and consent of the user. other frauds are often
committed in the sale of products and services activities. Examples of events that had happened was in Tokyo. www. they steal user information to enter the banking website using another person's identity. This site is not accessible as usual. 2011. 2.soe.com (SONY Online Entertainment). In addition to identity fraud. a personal declaration to be invaded and caused consumers to lose money in the account. E-mail spam is not good often contain words such as obscenities. fraud and others. applications or information stored. After payment is made. Products purchased but not received as promised website products are sometimes no longer exists. an estimated 90 billion e-mail spam sent every day and 20% of which is related to product sales. sweepstakes.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
data users. stop and interrupted. and also can cause loss of life.One of them is the 'Root Hits' in which they access the administrator or "root access" to a computer network.Activities or software developed to do things that are not desired on a computer system. 3.
especially those who borrow money from illegal loan sharks or 'along'. the organizers using the deposit money received to pay the principal of the return or the previous depositors. Steal data. The threat of computer hackers usually can be done by professionals.According to Wikipedia. individuals or certain groups either hackers or terrorist organizations are very complex and very complicated. account numbers. Ponzi schemes and in Malaysia. Software "piracy" cannot be updated or repaired online. The purpose of the criminal wiretaps were used to blackmail. Events like that are
often involved in these cyber-betting and gambling is football. At the start of the scheme. part-
timemedia and political extremists. war crimes. a free encyclopedia that get rich quick scheme is a scheme in which a sum of money be deposited or invested to the organizers promise get rich quick scheme and provided that the deposit will be returned back with interest or profits higher than what is offered by licensed financial institutions. Many consumers are in debt. Betting and payments made online or using the middle man as in the cyber café
that running illegal Internet gambling. There are many types of get rich quick schemes that exist. Usually the software is copied illegally is not linked with automatic updating system. United States House of representatives approved a bill designed to protect Internet and computer networks by funding research and training in cyber security. or observations on all activities undertaken by a computer it infects. intelligence agencies. and steal internet users to find traces of confidential information such as account names.Gambling is conducted in the Internet from all over the world. 6. Get rich quick scheme: . buying illegal weapons or modify the stolen technology.Cyber Crimes are frequently associated with security and military to obtain weapons and military technologies.
. Espionage: . John Brennan warned that espionage by foreign
governments. organized crime. Cyber gambling: . 8. record the movement of a computer keyboard and mouse. such as pyramid schemes. 7.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
this software is the installation of 'backdoor' invasion of the log file. the investigation agency. the Pak Man Telo.Software that is better known by the word 'piracy'. Cyber gambling is also involved with the creation of sports betting conducted by the 'bookie' local or international. passwords and so on. Copying software illegally: . 5. This software is copied and modified for use by hackers to obtain information or use the software to earn money many times over without the permission of the manufacturer. Top antiterrorism adviser White House.
. they cannot continue to bear the high return of payments to existing investors. religion.S. abandoned babies. The threat of cyber crime in the United States and deemed to but occur not to if the they threaten and the safety of life. If no new depositors received. Spread of the virus: . It will fail and the investors and depositors will lose their money. 11. including computer programming. Showing pornography that sometimes appear automatically in the website is accessed or viewed. Pornography: . they are very different way of life even adopt a similar pattern of government. As such.Viruses are malicious code that spread aggressively attack by infecting other files or programs in a specific host.
In Malaysia. prostitution.Hacker is a person to create and modify computer software and hardware. Their social life more independent of Malaysia.A lot of cyber crimes undermine the moral and social youths in Malaysia. The term is usually carried connotations reliable but can be good or bad. Col (R) Professor Dato 'Husin Jazri said. The activation of this virus requires human interaction as users of the system before it can act to damage a computer system that successfully invaded.
countries. rape and violation. This cyber crime have a big impact in the lives and culture of Malaysians. administration. Technology and Innovation (MOSTI). COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES Malaysia to adopt democracy and an Islamic state to adopt civil law and sharia law for Muslim people. CyberSecurity Malaysia chief executive officer. Awareness of cyber crime often spread to people through the mass media because of its detrimental effects that could threaten the individual.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Organizer of this rich quick schemes are not investing deposits received into the investmentor profitable enterprises of the same or higher. and safety-related matters. In the U. and often a small link in a
certain web sites. incest. depending on cultural context. Internet hackers: . the scheme is revoked. 9. 10. society and nation. Lt. cyber crime
will be handled by
CyberSecurity Malaysia an
agency under the Ministry of Science. children out of wedlock. especially Muslims. Significant threat to the frequent occurrence of free sex. Spread of the virus from one host to another host can not happen without interaction from users of the system and also through the sharing of external data storage devices.
Increased 4 times in 4 years from 2007 to only 1. passwords and credit card details to masquerade as a trusted entities through electronic communications. VoIP (Voice Over Internet Protocol) and e-commerce. dated July 25. cameras. 2008. In the Utusan Malaysia newspaper. of 6.167 cases of Internet fraud involving RM63 million
losses reported in Malaysia last year. This cyber crime involving fraud in an attempt to obtain personal information such as usernames. CyberSecurity Malaysia's role is to provide technical assistance to local authorities in carrying out the analysis of digital evidence such as computers. Users who lack knowledge of computer systems at high risk of falling prey to computer crimes. an article issued in Penang by Lee Boon Hooi said. mobile phones. According to a statement by the
Internet Crimes Unit. Deputy Superintendent Abdul Majid Record when presenting a paper during the seminar on the theme of
International Industrial Technology in Crime and Loss Prevention. Commercial Crime Investigation Department in Bukit Aman. Frequent cyber crime is in internet banking. games player. It is a scientific application in the examination and analysis done on the digital storage of materials involved in criminal or civil investigations. account numbers. digital music devices and digital equipment related portable computers. Criminal Investigation Division and Multimedia Cyber. personal identification numbers.
.139 cases recorded losses of RM11.4 million.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Forensics is commonly used to refer to Digital Forensics.
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
MyCERT INCIDENT STATISTICS FOR THE YEAR 2011
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
3 is 73% of cyber-crime victims from around the world. Section 3 (3) in which the information in the internet which have negative
. HOW TO ADDRESS THE CYBER CRIME? There a) b) are a number and of proposals have censor the entry been issued to to deal with cyber crimes are: websites.
Government should formulate originally Malaysia Communications and Multimedia Act1998. consumers in the United States was ranked No. Chief Cyber Security Counsel Adam Palmer Norton stated that many consumers in the United States failed to report and covers the activities of cybercriminals.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Cyber crime cases in the United States is similar to what happened in Malaysia. Norton survey report. Significant difference is the pattern of life there are more open with a social system that is free. Reported cyber crime is difficult because sometimes the case involved no firm evidence.
CONCLUSION Developments in ICT there will be no end if we look at how it began. To increase awareness among consumers about the ethical use of computers. Increase the number of experts in the field of computer security by opening more education cyber and crime job laws forensic opportunities are more strict experts in in these and efficient the areas. What needs to be actually the consciousness of every individual and Internet users to always practice ethics in everyday life and always ready to deal with bad elements who want to take the easy way and make money immediately. with
To formulate assistance of
Increase the security level information based on development of current technology. Objectives and purposes of information only real INVESTMENT d) e) f) can be brought in via the internet.OUMH1203 ENGLISH for WRITTEN COMMUNICATION
effects filtered. The effect of these cyber crimes that are generally not seen as a physical but a great effect if it is allowed to occur without strict control. Online safety must be increased just as we love ourselves.
International cooperation to combat cyber criminals.
. Any time there is discovery and innovation in computer technology equipment or software either. c) To formulate the Bill of Guarantees to MSC status foreign investors that Internet censorship should be done. such as sharing information and expertise. the crime is also growing cyber current trend for a specific individual requirements that are beyond control. Similarly.
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
. http://www.cia. http://ms.org/wiki/penjenayahsiber 2.my/r?searchterm=jenayah+siber@carian=cari 5. http://hmetro. http://www.fbi.com.asp?stype=kw&stv=jenayah+siber 4.com.com.php?terms=jenayah%20sib er 6.CyberSecurity. http://www.wikipedia. http://utusan. http://www.my 3.my/bernama/vs/bm/searchindex.my/search.gov 7.bernama.