You are on page 1of 47

Computer & Internet

Crime
KT44103
Ethics and Law in ICT
Sem 1: 2021/2020
14 November 2022
Contents

• IT Security Incidents: A Major Concern


• Why Computer Incidents Are So Prevalent
• Types of Exploits
• Types of Perpetrators
• Implementing Trustworthy Computing
• Plan & Prevention
• Computer Forensics
IT Security Incidents: Major
Concerns
• Security IT is of utmost importance
• Safeguard:
 Confidential business data
 Private customer and employee data
• Protect against malicious acts theft or disruption
• Balance against other business needs and issues
• Number of IT-related security incidents is
increasing around world
Why Computer Incidents Are So
Prevalent
• Increasing complexity increases vulnerability
• Computing environment is enormously complex
 Continues to increase in complexity
 No. of entry points expands continuously
 Cloud computing
• Higher computer user expectations
• Computer users share login IDs and passwords
Why Computer Incidents Are So
Prevalent
• Expanding/changing systems equal new risks
• Network era (Sharing information)
• Information technology (Ubiquitous, need of technology
tool, increase of technology)
• Increased reliance on commercial software with
known vulnerabilities
Type of Exploits

• Virus
• Worm
• Trojan horse
• Distributed denial of service
• Rootkit
• Spam
• Phishing & pharming
Viruses

• Pieces of programming code


• Usually disguised as something else
• Cause unexpected and undesirable behavior
• Often attached to files
• Spread by actions of the “infected” computer user
 Infected email document attachements
 Downloads of infected programs
 Visits to infected Web sites
Worms

• Harmful programs
 Reside in active memory of a computer
 Duplicate themselves
• Can propagate without human intervention
• Negative impact of worm attack
 Lost data and programs
 Lost productivity
 Additional effort for IT workers
Trojan Horses

• Malicious code hidden inside seemingly harmless


programs
• Users are tricked into installing them
• Delivered via email attachment, downloaded from
a Web site, or contracted via a removable media
device
• Logic bomb
 Executes when triggered by certain event
Distributed Denial of Service (DDoS)
Attacks

• Malicious hacker takes over computers on the Internet


and causes them to flood a target site with demands for
data and other small tasks.
 The computers that are taken over are called zombies
 Botnet is a very large group of such computers
• Does not involve a break in at the target computer.
 Target machine is busy responding to a stream of automated
requests
 Legitimate users cannot access target machine
Rootkits

• Set of programs that enables its user to gain


administrator level access to a computer without
the end user’s consent or knowledge
• Attacker can gain full control of the system and
even obscure the presence of the rootkit
• Fundamental problem in detecting a rootkit is that
the operating system currently running cannot be
trusted to provide valid test results
Spam

• Abuse of email systems to send unsolicited email


to large numbers of people
 Low cost commercial advertising for questionable
products
 Method of marketing also used by many legitimate
organizations
Phishing & Pharming

• Phishing
• Act of using email fraudulently to try to get the recipient to reveal
personal data
• Legitimate looking emails lead users to counterfeit Web sites
 Spear-phishing (Fraudulent emails to an organization’s employees)
 Smishing (via text messages)
 Vishing (via voice mail messages)
• Pharming – attack intended to redirect a website’s traffic to
another, fake site by installing a malicious program on
computer
Types of Perpetrators

• Perpetrators include:
 Thrill seekers wanting a challenge
 Common criminals looking for financial gain
 Industrial spies trying to gain an advantage
 Terrorists seeking to cause destruction
• Different objectives and access to varying resources
• Willing to take different levels of risk to accomplish
an objective
Types of Perpetrators
Hackers & Crackers

• Hackers
• Test limitations of systems out of intellectual curiosity
 Some smart and talented
 Others inept; termed “lamers” or “script kiddies”
• Crackers
• Cracking is a form of hacking
• Clearly criminal activity
Malicious Insiders
• Major security concern for companies.
• Fraud within an organization is usually due to weaknesses in internal
control procedures
• Collusion
 Cooperation between an employee and an outsider
• Insiders are not necessarily employees
 Can also be consultants and contractors
• Extremely difficult to detect or stop
 Authorized to access the very systems they abuse
• Negligent insiders have potential to cause damage
Industrial Spies

• Use illegal means to obtain trade secrets from


competitors
• Competitive intelligence
 Uses legal techniques
 Gathers information available to the public
• Industrial espionage
 Uses illegal means
 Obtains information not available to the public
Cybercriminals
• Hack into corporate computers to steal
• Engage in all forms of computer fraud
• Chargebacks are disputed transactions
• Loss of customer trust has more impact than fraud
• To reduce potential for online credit card fraud:
 Use encryption technology
 Verify the address submitted online against the
 issuing bank
 Use transaction risk scoring software
Hacktivists and Cybertrrorists

• Hacktivism
 Hacking to achieve a political or social goal
• Cyberterrorist
 Attacks computers or networks in an attempt to
intimidate or coerce a government in order to advance
certain political or social objectives
 Seeks to cause harm rather than gather information
 Uses techniques that destroy or disrupt services
Implementing Trustworthy
Computing
• Trustworthy computing
 Delivers secure, private, and reliable computing
 Based on sound business practices
Plan and Prevention
• Risk Assessment
 Process of assessing security-related risks
 Identify investments that best protect from most likely and serious threats
 Focus security efforts on areas of highest payoff
• Establishing a Security Policy – defines organization’s security
requirements, and controls & sanctions needed to meet
requirements
 Delineates responsible & expected behavior
 Outlines what needs to be done
 Written policies
Plan and Prevention

• Educating Employees, Contractors, and Part Time Workers


• Educate and motivate users to understand and follow policy
• Discuss recent security incidents
• Help protect information systems by:
 Guarding passwords
 Not allowing sharing of passwords
 Applying strict access controls to protect data
 Reporting all unusual activity
 Protecting portable computing and data storage
 devices
Plan and Prevention

• Prevention
• Implement a layered security solution
 Make computer break ins harder
• Installing a corporate firewall
 Limits network access
• Intrusion prevention systems
 Block viruses, malformed packets, and other threats
• Installing antivirus software
 Scans for sequence of bytes or virus signature
Plan and Prevention
• Safeguards against attacks by malicious insiders
• Departing employees and contractors
 Promptly delete computer accounts, login IDs, and passwords
• Carefully define employee roles and separate key responsibilities
• Create roles and user accounts to limit authority
• Defending against cyberterrorism
• Conduct periodic IT security audits
 Evaluate policies
 Review access and levels authority
 Test system safeguards
Plan and Prevention

• Detection
• Detection systems
 Catch intruders in the act
• Instruction detection system
 Monitors system/networks resource and activities
 Notifies the proper authority when identifies:
Possible instructions
Misues from within organization
• Knowledge and behavior –based approach
Plan and Prevention
• Response
• Response plan (in advance –approved by legal and management)
• Primary goal : Regain control and limit damage
• Incident notification (who to notify and not to notify)
• Document all details of a security incident
• Act quality to contain attack
• Eradication effort (collect, verify necessary backups and create new backups)
• Follow-up
• Review
• Weight carefully the amount of effort required to capture the perpetrator
• Consider the potential for negative publicity
• Legal precedent
Computer Crime Act
KT44103
Ethics and Law in ICT
Sem 1: 2021/2020
14 November 2022
Contents

• Introduction
• Content of Act
• Part I
• Part II
• Part III
Computer Crime Act 1997 -
Introduction
• An Act to provide for offences relating to the misuse of
computers. Act 563

• The Computer Crimes Act 1997, effective as of the 1st of


June 2000, created several offences relating to the misuse of
computers. Among others, it deals with 1) unauthorized
access to computer material, 2) unauthorized access with
intent to commit other offences and 3) unauthorized
modification of computer contents. It also makes provisions
to facilitate investigations for the enforcement of the Act.
The contents

• Part 1: Preliminary
• Part 2: Offences
• Part 3: Ancillary and General Provisions
Part I : Preliminary
S1 Short title and commencement
• Cited as the Computer Crimes Act 1997.
• This Act shall come into force on such date as the
Prime Minister may, by notification in the Gazette,
appoint.
Part I: Preliminary
S2: Interpretation
• Computer – An electronic, magnetic, optical, electrochemical or other data
processing device : “programmable”
 Performing logical
 Arithmetic
 Storage (storage /communication facility)
 Display function
• Computer Network – Interconnection of communication lines and circuits with a
computer or a complex consisting of two or more interconnected computers
• Computer Output/output – Statement/representation whether in written, printed,
pictorial, film, graphical, acoustic or other form –
 Produced by a computer
 Displayed on the screen of a computer; or
 Accurately translated from a statement or representation so produce:
Part1: Interpretation
 Data
• representations of information or of concepts that are being prepared or have
been prepared in a form suitable for use in a computer
 Function
• includes logic, control, arithmetic, deletion, storage and retrieval and
communication or telecommunication to, from or within a computer
 Premises
• includes land, buildings, movable structures and conveyance by land, water
and air
 Program
• data representing instructions or statements that, when executed in a computer,
causes the computer to perform a function.
Part1: Interpretation
• Associate action (secures access):
 Alters/erases the program/data
 Copies/moves it to any storage medium
 Uses it (executing the program and functioning the program)
 Causes it to be output from the computer in which it is held whether by having
it displayed or in any other manner.
• Computer is unauthorized if:
 Not entitled to control access of the kind in question to the program or data:
and
 Does not have the consent or exceeds any right or consent to access by him of
the kind in question to the program or data from any person who is so entitled
Part1: Interpretation

• Content modification:
 any program or data held in the computer concerned is altered or
erased
 any program or data is introduced or added to its contents; or
 any event occurs which impairs the normal operation of any computer
• Unauthorized modification:
 the person whose act causes it is not himself entitled to determine
whether the modification should be made; and
 does not have consent to the modification from any person who is so
entitled.
Part II: Offences
S3: Unauthorized access to computer material

• Guilty of an offences if –
 causes a computer to perform any function with intent to
secure access to any program/data in any computer
 the access he intends to secure is unauthorized; and
 knows at the time when he causes the computer to perform
the function that is the case.
• Penalty:
a fine not exceeding fifty thousand ringgit or to imprisonment
for a term not exceeding five years or to both
Part II: Offences
S4: Unauthorized access with intent to
commit/facilitate commission of further offence

• Guilty referred to S3 with intent-


 involving fraud or dishonesty or which causes injury as defined in
the Penal Code [Act 574]; or
 facilitate the commission of such an offence whether by himself or
by any other person
• Same time when the unauthorized access is secured or on
any future occasion.
• Penalty:
a fine not exceeding one hundred and fifty thousand ringgit or to
imprisonment for a term not exceeding ten years or to both.
Part II: Offences
S5: Unauthorized modification of the contents of any computer

• Directed at:
 any particular program or data
 a program or data of any kind; or
 a program or data held in any particular computer
• Immaterial whether an unauthorized modification is, or is intended to be,
permanent or merely temporary
• Penalty:
 Fine not exceeding one hundred thousand ringgit or to imprisonment for a term not
exceeding seven years or both.
 Fine not exceeding one hundred and fifty thousand ringgit or to imprisonment for a
term not exceeding ten years or to both, if the act is done with the intention of causing
injury as defined in the Penal Code.
Part II: Offences
S6: Wrongful communication
• Guilty – communicates directly or indirectly a number, code,
password or other means of access to a computer to any
person other than a person to whom he is duly authorized to
communicate
• Penalty:
Fine not exceeding 25thousand ringgit or to
imprisonment for a term not exceeding three years
or to both.
Part II: Offences
S7: Abetments and attempts punishable as
offences

• Guilty:
 A person who abets the commission of or who attempts to
commit any offence.
 A person who does any act preparatory to or in furtherance of
the commission of any offence
• Penalty
Imprisonment imposed shall not exceed one-half of
the maximum term provided for the offence
Part II: Offences
S8: Presumption
A person who has in his custody or control any
program, data or other information which is held in
any computer or retrieved from any computer which
he is not authorized to have in his custody or control
shall be deemed to have obtained unauthorized access
to such program, data or information unless the
contrary is
proved.
Part III
S9: Territorial Scope of offences
• The provision – any person regardless the citizenship,
effect outside as well as within Malaysia and
committed at any place within Malaysia.
• The computer, program or data was in Malaysia or
capable of being connected to or sent to or used by or
with a computer in Malaysia at the material time
• Further proceedings against him under any written law
relating to the extradition of persons, in respect of the
same offence outside Malaysia.
Part III
S10: Power of search, seizure and arrest

• Entitled to:
 have access to any program or data held in any computer / have access
to, inspect or check the operation of, any computer and any associated
apparatus or material which he has reasonable cause to suspect is or
has been in use in connection with any offence under this Act;
 Require:
 the person by whom or on whose behalf the police officer has reasonable
cause to suspect the computer is or has been so used: or
 any person having charge of or otherwise concerned with the operation of,
the computer, apparatus or material

• Warrant or without a warrant (relating to criminal procedure)


Part III
S11: Obstruction of search
• Guilty:
 assaults, obstructs, hinders or delays any police officer in effecting
entrance to any premises under this Act or in the execution of any duty
imposed or power conferred by this Act; or
 Fails to comply with any lawful demands of a police officer acting in the
execution of his duty under this Act
• Penalty:
Fine not exceeding twenty five thousand ringgit or to
imprisonment for a term not exceeding three years
or to both.
Part III
S12 Prosecution
A prosecution under this Act shall not be instituted
except by or with the consent of the Public Prosecutor
in writing.
– 끝–

– 수고했어요 ! –
감사합니다 .

You might also like