assigment oumh1203 english for written communication
TRANSCRIPT
FAKULTI PENDIDIKAN DAN BAHASA
SEPTEMBER 2011
OUMH1203
ENGLISH for WRITTEN COMMUNICATION
NO. MATRIKULASI : 671230045325001
NO. KAD PENGNEALAN : 671230045325
NO. TELEFON : 0136478910
E-MEL : [email protected]
PUSAT PEMBELAJARAN : Melaka
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
CONTENT
1. WELCOME SPEECH PAGE 2
2. INTRODUCTION PAGE 3
3. WHAT IS INTERNET? PAGE 4
4. WHY CYBER CRIME SHOULD BE CONTROLLED? PAGE 5
5. CYBER CRIME CLASSIFIED PAGE 6
6. COMPARISON OF CYBER CRIME IN MALAYSIA
AND THE UNITED STATES PAGE 9
7. MyCert INCIDENT STATISTICS
FOR THE YEAR 2011 PAGE PAGE 11
8. HOW TO ADDRESS THE CYBER CRIME? PAGE 14
9. CONCLUSION PAGE 15
10. REFERENCS PAGE 16
1
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
WELCOME SPEECH
Praise God that hath given His permission and strength given then what can I translate
in my heart in the quest for knowledge that is useful for self, family and children. Thanks
also to the wife and children a lot of help and motivating spirit to face the vagaries of long-
distance students. Existing trials pretty much waiting. Commitment to work and family
at this age is challenging. Hopefully that what I wish to get I would pray for the love
of God. Sense of pride when the assigned tasks can be completed even in a state of
considerable press, especially from the existing workload. Time is like gold. Time elapsed
will not be turned back. To complete this task, spare time is at night with snoring
accompanied by beloved children. Wake up till morning to find out all the essence. Thanks to
the progress of time available. The task becomes easier with the internet. Everything is at our
fingertips. Job experiences over twenty years is a lot of help. What is inside poured
back on top of each sheet of this task. Finally, I am confident that the work produced can
yield a very valuable one day. To lecturers and friends that helped, thank spoken. To
the beloved family, may be patient and pray for success and happiness always
appears. You all helped morally and understand the conditions that are encountered.
Thank you.
MOHAMAD SHAWALUDDINNOR B. HJ MD NOR
OPEN UNIVERSITY MALAYSIA
2011
2
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
INTRODUCTION
What is cyber crime? Before we go much further on the topics discussed, it is better to
discuss first the meaning of cyber crime. Crime means activities such as theft, fraud, forgery,
murder, kidnapping, extortion, smuggling and so on. According to Mr. Donn B. Parker, a
researcher at the cyber crime and security for SRI International in Merlo Park, California,
cyber crime is a behaviours in which they have an intention and is associated with the
computer through any means to cause the victim to suffer or cause suffering, loss, and
continuous . Cyber crime involves all the usual criminal activities like theft, fraud,
extortion and all activities that involve the violation of existing law.
Meanwhile, the U.S. Justice Department to reiterate this definition by stating that
computer crime is any illegal activity in which knowledge of computer technology used to
make it happen. However, there is some different definitions of cyber crime in certain
countries. For the Muslim countries, gambling, pornography, advertising, sex is a
crime but not for most countries, especially in the western block.
For example, in England, matters that related to pornography were taken for granted.
Those involved with child pornography are considered to be criminals.
Countries in the western block focusing on security, trade and economy of their countries.
Various laws related to safety and commerce developed, such as 'trademark law', 'copyright
law', the law relating to 'hackers' and the spread of the virus and so on. Due to different
definitions of cyber crime, it is difficult for enforcement of cyber laws. In this
context, Malaysia is involved in internet usage agreements that are not refined to allow this
crime. However, due to the crime has caused great chaos, death, and significant losses,
then almost every country in the world to draft their own laws to address the problem
of cyber crime and to impose capital punishment to those involved.
3
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
WHAT IS INTERNET?
Internet refers to the network constructed by connecting multiple computers,
thousands or millions of computers to each other via the global telephone lines and satellite.
Internet is the two main types of communication services and information retrieval. In terms
of consumption, it is a network that provides electronic communication services, remote
access file services, dissemination of information, locating information and several other
services. From the application is built various types of alternative services to facilitate various
transactions such as electronic commerce, electronic banking and the Internet, and
advertising.
When the advent of the internet as a communication tool to date, how to disseminate
information more easily, fast, simple, and saves time. The information disseminated
throughout the world with no boundaries of time cause no one is able to control the passage
of information in cyberspace. Millions of websites have been built with all kinds of
information, ideas, ideology, propaganda and pornography are also disseminated through
the internet. Therefore this dissemination occurred independently, then the
feelings of fear and security administrators in some countries that has to be negative about
the freedom of speech, thought and felt that their citizens. They use this cyberspace to
communicate their opinions to the world. Internet has surpassed all existing means of
communication. Formerly a radio and television are important media tools to
spread information. But not now, radio and television are one way media interactive not
like the Internet. This was done to facilitate the effective control of information. Delivery of
information through radio and television and print materials can be controlled. Many
countries have allocated the law to regulate broadcasting and publishing the
materials of these media. All publications in Malaysia require a valid permit or license, such
as the Printing, Newspaper and Publications Act 1984, the Broadcasting Act 1988, the
Sedition Act 1948, the Official Secrets Act 1972. This license permits and limiting
information that can be printed, disseminated, or distributed to the public.
Traditional media is restricted by geographic limitations. Dissemination of books,
magazines, newspapers have to cost, manpower, infrastructure and transportation. All this
factors limit the dissemination of information and at the same time facilitate the control or
filtering information. Existing media is very different from the internet because the
internet is a platform that provides information from the millions of consumers and
4
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
researchers or researchers from around the world. A person may disseminate information,
communicate and interact with others who are thousands of miles away.
WHY CYBER CRIME SHOULD BE CONTROLLED?
Each user developed and developing countries around the world have adopted
the control and supervision of all media and printed materials. Since the growing
sophistication of internet use and easily accessible, it is necessary, it is also regulated
and supervised, such as printed materials and other media. Is the internet will also pose a
threat to certain parties? In Malaysia, the government has taken positive steps to not censor
cyberspace. This is enshrined in the bill guarantees promised by the government of Malaysia
with companies Multimedia Super Corridor (MSC). Section 3 (3) of the Communications and
Multimedia Act 1998 also declares that none of the provisions under the Act which allows
any censorship of information occurs. This principle is based on the control information will
only produce negative effects on the development of communication technology through the
Internet.
But this case is different in some countries that stand firm and aggressive, such
as Cuba and China, who practice censorship in total or partial information. They
think, not all advances in technology can be fully accepted. Some Internet content
could threaten their ideology to the population. They still want to stay with the
pattern of government and the lives that have been adopted in which the ideology of
the rule continued with little transparency. They prefer their people passive, blind and
not savvy to the world's information and recent developments.
A little openness is admission is just technology-related information public facilities,
transportation, household and agricultural needs. There are still many countries that
moderation and censorship committed only information which may damage the public
mind. The existing freedom of speech should not be abused. If opposition parties or spread
false information, defamatory or ideologically opposed through the Internet, the government
considers it is not a serious threat. The Government will respond in a similar manner to the
user. The Government will increase public knowledge and spread the word of truth in print or
on television are usually controlled by the government. In this way, people will be able to
consider the truth of the information.
Who are the cyber criminals? What crimes? Where a crime is committed? These
answers are hard to come by because the perpetrator is anywhere in the world and they
5
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
can move freely all over the world because of the widespread use of Internet around the
world. Ordinary criminals can be identified by physical and equipment can be seen. Cyber
crime and only use the internet seems to be in the universe. Their identity always
change. According to Michael A Vatis from the Federal Bureau of Investigation (FBI),
United States, a major problem to distinguish cyber threats to the physical threat is to
determine who attacked the system, why, how, and where. Generally, cyber
criminals are the ones who are well versed in computer technology and network
systems. They are professional criminals. It may be there next to us, doctors, friends,
professors, or anyone else. They will attack their own institutions, competitor institutions,
hired by certain parties, hobby or try something new and see the atmosphere of uncertainty.
Business organization may be the target of competitors, employees or former
employees. Banks and financial institutions being targeted professional robbers and
criminals. While the university will be the target of students or former
students. Government agencies are likely to be targets of terrorists and traitors. Military
computer may be hijacked. Sometimes the laws designed to curb cyber crime can’t do
anything like what happened in the United States. Sophisticated technology and
pioneer of computer systems, until now failed to detect the tragedy of 11 September
attack planning. During the September 11 attacks, the 19 aircraft hijackers entered
the United States with a valid visa. They respect as other users via telephone and
internet. They planned the attack on the World Trade Centre, New York and the Pentagon
building in Washington. United States received a big misfortune and shame based on its
technological expertise.
Cyber crime occurs in various forms, objects and situations. What kind of computer
usage will always be dealing with cyber crime activities. Users will become victims or
manipulated by criminals or both. Input operations, data processing, output and data
communications operations will be used by criminals for the purpose of thoroughly
unhealthy. Cyber crime can be classified into: -
CYBER CRIME CLASSIFIED
1. Fraud: - This type of cyber crime is the same as what happens in the real world, just the
way behavior is through the internet. Crime is done solely to make money from the victim by
means of easy and difficult to detect. The frequency of identity fraud occurs is via e-mail
where the user is required to enter personal information, supposedly the bank to update the
6
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
data users. In fact, they steal user information to enter the banking website using another
person's identity. E-mail is questionable and is known as “spam e-mail”. Consumers are
often fooled because the e-mail sent will be linked to websites that resemble the real website.
From information obtained, a personal declaration to be invaded and caused consumers to
lose money in the account. In addition to identity fraud, other frauds are often
committed in the sale of products and services activities. Users who are interested in the
products with a variety of nice words and praise the user will make a payment by internet
banking to transfer money or use credit cards. After payment is made. Products
purchased but not received as promised website products are sometimes no longer exists.
According to an article in Anjung pc.com, an estimated 90 billion e-mail spam sent every day
and 20% of which is related to product sales. E-mail spam is not good often contain words
such as obscenities, sex, sweepstakes, giving gifts of money and also offer unreasonable. E-
mail to spam is the most dangerous fraud. As a result of the impact of e-
mail fraud is causing loss of property and dignity, and also can cause loss of life.
2. Damage or modifications to the program or computer data: - Activities or software
developed to do things that are not desired on a computer system, network operating systems,
applications or information stored. In other words it is dangerous software which can cause
aggression and modifications to the network or computer systems and
trespassing stored information leading to damage systems or information. Events that had
occurred was recently in Malaysia where the hacker has to do the cyber attacks against
government websites have a big impact on the information technology systems. This site is
not accessible as usual. Many online business cannot be done, stop and interrupted. It causes
panic for a while to internet users.
3. Theft of information: - Creating a common cybercrime in which user information is taken
and used for impersonation, extortion, fraud and others. Examples of common theft is
through spyware software, cyber criminals to steal data from infected computers such as
Internet search trends and confidential information without the knowledge and consent of the
user. Examples of events that had happened was in Tokyo, May 3, 2011, in which the
Company SONY has been hacked and the criminals have stolen data from 25 million users of
their computer game system, www.soe.com (SONY Online Entertainment).
4. Unauthorized access to the system: - One of them is the 'Root Hits' in which they access
the administrator or "root access" to a computer network. The main activities performed by
7
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
this software is the installation of 'backdoor' invasion of the log file, or observations on all
activities undertaken by a computer it infects. Steal data, record the movement of a computer
keyboard and mouse, and steal internet users to find traces of confidential information such
as account names, account numbers, passwords and so on.
5. Copying software illegally: - Software that is better known by the word 'piracy'. This
software is copied and modified for use by hackers to obtain information or use the
software to earn money many times over without the permission of the manufacturer.
Usually the software is copied illegally is not linked with automatic updating system.
Software "piracy" cannot be updated or repaired online.
6. Espionage: - Cyber Crimes are frequently associated with security and military to obtain
weapons and military technologies. The threat of computer hackers usually can be done by
professionals, intelligence agencies, organized crime, the investigation agency, part-
timemedia and political extremists. The purpose of the criminal wiretaps were used to
blackmail, war crimes, buying illegal weapons or modify the stolen technology. Top anti-
terrorism adviser White House, John Brennan warned that espionage by foreign
governments, individuals or certain groups either hackers or terrorist organizations are very
complex and very complicated. United States House of representatives approved a bill
designed to protect Internet and computer networks by funding research and training in cyber
security.
7. Cyber gambling: - Gambling is conducted in the Internet from all over the world. Betting
and payments made online or using the middle man as in the cyber café
that running illegal Internet gambling. Cyber gambling is also involved with the creation of
sports betting conducted by the 'bookie' local or international. Events like that are
often involved in these cyber-betting and gambling is football. Many consumers are in debt,
especially those who borrow money from illegal loan sharks or 'along'.
8. Get rich quick scheme: - According to Wikipedia, a free encyclopedia that get rich quick
scheme is a scheme in which a sum of money be deposited or invested to the organizers
promise get rich quick scheme and provided that the deposit will be returned back with
interest or profits higher than what is offered by licensed financial institutions. There are
many types of get rich quick schemes that exist, such as pyramid schemes, Ponzi schemes
and in Malaysia, the Pak Man Telo. At the start of the scheme, the organizers using the
deposit money received to pay the principal of the return or the previous depositors.
8
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Organizer of this rich quick schemes are not investing deposits received into the investmentor
profitable enterprises of the same or higher. As such, they cannot continue to bear the
high return of payments to existing investors. If no new depositors received, the scheme is
revoked. It will fail and the investors and depositors will lose their money.
9. Pornography: - A lot of cyber crimes undermine the moral and social youths in Malaysia.
Significant threat to the frequent occurrence of free sex, abandoned babies, children out of
wedlock, prostitution, incest, rape and violation. Showing pornography that sometimes
appear automatically in the website is accessed or viewed, and often a small link in a
certain web sites. This cyber crime have a big impact in the lives and culture of Malaysians,
especially Muslims.
10. Internet hackers: - Hacker is a person to create and modify computer software and
hardware, including computer programming, administration, and safety-related matters. The
term is usually carried connotations reliable but can be good or bad, depending on cultural
context.
11. Spread of the virus: - Viruses are malicious code that spread aggressively attack by
infecting other files or programs in a specific host. The activation of this virus requires
human interaction as users of the system before it can act to damage a computer system
that successfully invaded. Spread of the virus from one host to another host can not happen
without interaction from users of the system and also through the sharing of external data
storage devices.
COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES
Malaysia to adopt democracy and an Islamic state to adopt civil law and sharia law for
Muslim people. Awareness of cyber crime often spread to people through the mass media
because of its detrimental effects that could threaten the individual, religion, society and
nation. In the U.S. they are very different way of life even adopt a similar pattern of
government. Their social life more independent of Malaysia. The threat of cyber crime
in the United States deemed to occur if they threaten the safety of
individuals and countries, but not to the social and community life.
In Malaysia, cyber crime cases will be handled by CyberSecurity Malaysia an
agency under the Ministry of Science, Technology and Innovation (MOSTI). CyberSecurity
Malaysia chief executive officer, Lt. Col (R) Professor Dato 'Husin Jazri said, Cyber
9
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Forensics is commonly used to refer to Digital Forensics. It is a scientific application
in the examination and analysis done on the digital storage of materials involved in
criminal or civil investigations. Users who lack knowledge of computer systems at high
risk of falling prey to computer crimes. CyberSecurity Malaysia's role is to provide
technical assistance to local authorities in carrying out the analysis of digital evidence such
as computers, mobile phones, cameras, games player, digital music devices and digital
equipment related portable computers.
In the Utusan Malaysia newspaper, dated July 25, 2008, an article issued in Penang
by Lee Boon Hooi said, of 6.167 cases of Internet fraud involving RM63 million
losses reported in Malaysia last year. Increased 4 times in 4 years from 2007 to only
1.139 cases recorded losses of RM11.4 million. According to a statement by the
Internet Crimes Unit, Criminal Investigation Division and Multimedia Cyber, Commercial
Crime Investigation Department in Bukit Aman, Deputy Superintendent Abdul Majid
Record when presenting a paper during the seminar on the theme of
International Industrial Technology in Crime and Loss Prevention. Frequent cyber crime is
in internet banking, VoIP (Voice Over Internet Protocol) and e-commerce. This cyber
crime involving fraud in an attempt to obtain personal information such as usernames,
account numbers, personal identification numbers, passwords and credit card details to
masquerade as a trusted entities through electronic communications.
10
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
MyCERT INCIDENT STATISTICS FOR THE YEAR 2011
11
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
12
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
13
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Cyber crime cases in the United States is similar to what happened in Malaysia. Significant
difference is the pattern of life there are more open with a social system that is free. Norton
survey report, consumers in the United States was ranked No. 3 is 73% of cyber-crime
victims from around the world. Reported cyber crime is difficult because sometimes the
case involved no firm evidence. Chief Cyber Security Counsel Adam Palmer Norton
stated that many consumers in the United States failed to report and covers the activities of
cybercriminals.
HOW TO ADDRESS THE CYBER CRIME?
There are a number of proposals have been issued to deal with cyber crimes are:
a) Control and censor the entry relating to pornographic websites.
b) Government should formulate originally Malaysia Communications and Multimedia
14
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
Act1998, Section 3 (3) in which the information in the internet which have negative
effects filtered.
c) To formulate the Bill of Guarantees to MSC status foreign investors that Internet
censorship should be done. Objectives and purposes of information only real
INVESTMENT can be brought in via the internet,
d) Increase the security level information based on development of current technology.
e) To increase awareness among consumers about the ethical use of computers.
f) Increase the number of experts in the field of computer security by opening
more education and job opportunities in these areas.
g) To formulate cyber crime laws are more strict and efficient with
assistance of computer forensic experts in the investigation.
h) International cooperation to combat cyber criminals, such as sharing information and
expertise.
CONCLUSION
Developments in ICT there will be no end if we look at how it began. Any time there is
discovery and innovation in computer technology equipment or software either. Similarly,
the crime is also growing cyber current trend for a specific individual requirements that are
beyond control. What needs to be actually the consciousness of every individual and
Internet users to always practice ethics in everyday life and always ready to deal with bad
elements who want to take the easy way and make money immediately. Online safety must
be increased just as we love ourselves. The effect of these cyber crimes that are generally not
seen as a physical but a great effect if it is allowed to occur without strict control.
15
OUMH1203 ENGLISH for WRITTEN COMMUNICATION
REFERENCE
1. http://ms.wikipedia.org/wiki/penjenayahsiber
2. http://www.CyberSecurity.my
3. http://utusan.com.my/search.asp?stype=kw&stv=jenayah+siber
4. http://hmetro.com.my/r?searchterm=jenayah+siber@carian=cari
5. http://www.bernama.com.my/bernama/vs/bm/searchindex.php?terms=jenayah
%20siber
6. http://www.fbi.gov
7. http://www.cia.gov
16