Monday, August 15, 2011

Crime Cyberspace

As usual renewal of technology, the Internet in addition to benefiting also a negative impact by opening up opportunities misuse of these technologies. It happens to the data and information are done electronically.
In a computer network like the Internet, the problem of crime is becoming increasingly complex because of the broad scope. According to Edmon Makarim (2001: 12) crime on the Internet or cybercrime essentially is a criminal offense relating to cyberspace, whether that attack public facilities in private ownership in cyberspace atupun.
The types of crimes on the Internet are divided into various versions. One version says that crime is divided into two types, namely the crime with intellectual motive. Usually the first type does not cause any harm and done for personal satisfaction. The second type is a crime with political motives, economic, or criminals with potentially devastating losses even information warfare.
Other versions of cybercrime divide into three parts, namely access violations, data theft, and information dissemination
for evil purposes;
Broadly speaking, there are several types of cybercrime, such as the proposed Philip Renata in Warta Ekonomi No. BisTek supplements. 24th edition in July 2000, h.52 namely:
- Joy computing, namely the use of someone else's computer without permission. This includes theft of computer operating time.
- Hacking, namely access illegally or without permission by means of a terminal.
- The Trojan Horse, the manipulation of data or programs by changing the data or instructions in a program, erase, add, making unaffordable for the purpose of personal or private interests of others.
- Data Leakage, namely regarding data leaking out, especially concerning the data should be kept confidential.
Disclosure of computer data that can be a form of state secrets, the company, data is entrusted to a person and data in certain situations.
- Data Diddling, ie an act that changes the data valid or legitimate in a way not valid, change the input data, or output data.
- To frustate data communication or a waste of computer data.
- Software piracy is software piracy of copyright-protected intellectual property rights.
Of the seven types of cybercrime, it seems that the core is the assault on the content of cybercrime, computer systems and communication systems owned by others or the public in cyberspace (Edmon Makarim, 2001: 12).
The general pattern is used to attack computer networks are gaining access to user accounts and then use the victim's system as a platform to attack other sites. This can be completed within 45 seconds and automate will greatly reduce the time required (Purbo, and Wijahirto, 2000:9).
The phenomenon of cybercrime is to watch out because the crime is somewhat different from other crimes in general. Cybercrime can be done without knowing the territorial limits and not required for direct interaction between perpetrators with crime victims. Certainly the global nature of the Internet, all countries that perform almost certainly will be exposed to internet development breakeven this cybercrime.
Kompas Cyber ​​Media News (03/19/2002) writes that according to AC Nielsen survey of 2001 Indonesia was ranked sixth largest in the world and fourth in Asia dala crime on the internet. Although not mentioned in detail what kind of crime is happening in Indonesia as well as citizens who are involved in the crime, this is a warning to all parties to be aware of the crime has been, is, and will emerge from users of information technology (Heru Sutadi, Kompas, 12 April 2002 , 30).
cybercrime cases which are prevalent in Indonesia at least three types based on the mode, namely:

1.  Theft of Credit Number.
According Rommy Alkatiry (Deputy Head of Informatics KADIN), misuse of credit cards owned by others on the internet is the largest cybercrime case relating to the world of internet business in Indonesia.
Misuse of credit cards owned by others is not complicated and can be done physically or on-line. The names and credit cards of others acquired in various places (restaurants, hotels, or any place that do payment transactions by credit card) is inserted in the application of purchase of goods on the internet.

2.  Entering, Modifying or damaging Homepage (Hacking)
According to John. S. Tumiwa generally act hacker Indonesia has not been as severe action abroad. Indonesia hacker behavior is merely entered into a computer sites of others who were vulnerable to infiltration and notify the owner to be careful. Overseas hackers have entered the banking system and damage the bank's data base.
3.  The attack site or e-mail through a virus or spamming.
The most common mode is to send a virus via e-mail. According to RM Roy M. Suryo, overseas crimes like this have been given a pretty severe punishment. Unlike in Indonesia that are difficult to overcome because existing regulations do not reach them.
Meanwhile, Yusuf As'ad detailing cases of cybercrime that often occur in Indonesia to five,namely:
- Theft of credit card numbers.
- Takeover web sites owned by others.
- Theft of Internet access that is often experienced by ISPs.
- Crime domain name.
- Business competition by causing a nuisance to rival sites.
Cybercrime specialized in e-commerce, by Edmon Makarim defined as any action that inhibits and on behalf of others in the trade over the internet. Edmon Makarim predicted that the new modes such as buying and selling of consumer data and presenting information that is not true in the business began to frequent the site in e-commerce.
According Wigrantoro in BisTek No Mas. 10, July 24, 2000, p. 52 outline there are five topics of Cyberlaw in each country, namely:

- Information security, concerns the problem of authenticity and integrity of the sender or receiver of messages flowing through the internet. In this case the regulated issues of confidentiality and validity of electronic signatures.
- On-line transactions, including bidding, buying and selling, payment until the shipment of goods via the internet.
- Right in electronic information, the issue of copyright and the rights that arise for users and content providers.
- Regulation information content, the extent of the law regulate content that is streamed over the internet.
- Regulation on-line contact, good-karma in communicating and doing business via the internet, including taxation, export-import retriksi, crime and legal jurisdiction.

Related Posts

No comments:

Post a Comment