Chapter 6 - Computer Crime
Chapter 6 - Computer Crime
Chapter 6 - Computer Crime
Anonymous Malaysia posted an eight-minute video on its Facebook page on Aug 4, calling for the
resignation of Prime Minister Najib Razak
Eg. Hacktivism: Malaysia Website
Hundreds of Sites Hacked in Conflict Between Malaysia and Philippines
Hacktivists
Anonymous Malaysia launched distributed denial-of-service (DDOS) attacks
against several Philippines government websites, Filipino hackers went on
the offensive, defacing a large number of commercial websites.
The incident was followed by DDOS attacks being launched against at least
11 Malaysian government websites.
The Pinoy Tech News reports that a total of around 157 websites from the
Philippines and around 170 from Malaysia were impacted during this cyber
battle.
Eg. Hacktivism: Malaysia Government Website
Biometrics
Identity
Theft and
Techniques Credit Card
Fraud
Preventing
methods
Responses
DEFINITION
Identity theft - various crime in which criminal use the identity
of an unknowing, innocent person
Use credit/debit card numbers, personal information, and
social security numbers
18-29 year-olds are the most common victims because they
use the Web most and are unaware of risks
E-commerce has made it easier to steal and use card numbers
without having the physical card
TECHNIQUES
There are several techniques used to steal personal and financial
information.
Requests for personal and financial information disguised as legitimate
business communication
Phishing – E-mail
Smishing – Text messaging
Vishing – Voice Phishing
Pharming – false Web sites that fish for personal and financial information
by planting false URLs in Domain Name Servers
Online resumé and job hunting sites may reveal SSNs, work history, birth
dates and other information that can be used in identity theft
G
HIN
HIS
P
SMISHING
VISHING
PHARMING
Responses To Identity Theft …
Trojan horse
Does not copy itself
It is an Act to make provision for, and to regulate the use of digital signatures
and to provide for matters connected with it.
It describes the followings:
1. the format of one’s process of getting a certification,
2. the requirements to acquire such certificate,
3. the duties of certification authorities and subscribers,
4. the effect of digital signature
5. the prohibition of the act and penalty for offending corporate bodies.
6.6 EMERGENCE OF CYBER LAW IN MALAYSIA
While, it is not explicitly an ‘cyber’ related act. It still limits the communication of the public,
including written online communication.
The public need to be aware of a penalty of RM500,000 if persecuted.
It limits on regard of the public ‘sedition tendency’, which includes any speeches that are :
“to bring into hatred or contempt or to excite disaffection against any Ruler or against any
Government.”
“to promote feeling of ill will and hostility between different races or classes of the
population of Malaysia.”
“to bring into hatred or contempt or excite disaffection against the administration of justice
in Malaysia or in any State.”
THANK YOU
Prepared By:
Zuhri Arafah Binti Zulkifli
UiTM Kampus Jasin