hacking & hacktivism
TRANSCRIPT
-
7/29/2019 Hacking & Hacktivism
1/29
HACKING & HACKTIVISM
Muhammad Rashidi Bin Razali (2010391069)
Muhamad Fadzile Bin Abd Malek (2010158019)
Muhammad Haziq Bin Mazlan (2010715319)
-
7/29/2019 Hacking & Hacktivism
2/29
TOPICS COVERED IN THIS PRESENTATION
HISTORY OF HACKING
PURPOSE OF HACKING
EFFECT OF HACKING
HACKTIVISM OR POLITICAL HACKING IN MALAYSIA
SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA
INTRODUCTION
CONCLUSION
-
7/29/2019 Hacking & Hacktivism
3/29
HISTORY OF HACKING1960s
MITs artificial lab
Ken Thompson invented UNIX
1970sDennis Ritchie invented C
1980s
Cyber Space coined
414s arrestedTwo hacker group formed
1990s
National Crackdown on hackers
Kevin Mitnick arrestedMicrosofts NT operating system
-
7/29/2019 Hacking & Hacktivism
4/29
World Most Famous Hacker
Stephen wozniak
Tsutomu Shimomura
Kevin Mitnick
At the time of his arrest, he was the
most-wanted computer criminal in the
United States.
-
7/29/2019 Hacking & Hacktivism
5/29
INTRODUCTION
Hacker is a person who access computer system and network
without authorization
There are 3 types of hacker which is white hat, black hat and
grey hat
Hacker hierarchy is divided into there which is script kiddies,
intermediate hackers and elite hackers
-
7/29/2019 Hacking & Hacktivism
6/29
PURPOSE OF HACKING
To steal
Money
Important data / information
To test their knowledge in understanding network and
computer system
To harm someones privacy
To become a cyber warrior
To espionage other people
-
7/29/2019 Hacking & Hacktivism
7/29
EFFECT OF HACKING
Data loss
Increasing maintenance cost
Negative reputation
-
7/29/2019 Hacking & Hacktivism
8/29
HACKTIVISM OR POLITICAL HACKING IN MALAYSIA
Hactivism
The act of hacking, or breaking into computer system,for a political or socially motivated purpose. The
individual who performs an act of hacktivism is said to
be a hacktivist.
They uses the same tools and techniques as a hacker,
but does so in order to disrupt services and bring
attention to a political or social cause.
-
7/29/2019 Hacking & Hacktivism
9/29
-
7/29/2019 Hacking & Hacktivism
10/29
Greetings, Malaysia, We have seen the censorship taken by the Malaysian
government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the
worlds strictest governments, even blocking out movies, and television shows. Theseacts of censorship are inexcusable. You are taking away a basic human right. The
internet is here for freedom, without fear of government interference. Do not think
that no one else notices. Your structured government has done the talking, and we
hear loud and clear. Let this be an announcement to all your people. This is a sign, a
warning, and an opportunity to listen to ideas above your own. In a way you are
being stubborn. But how will this help anyone or your country. We fear that if youmake further decisions to take away human freedom. We are obligated to act fast
and have no mercy. For rules were meant to be broken. And corruption was meant to
be washed away and forgiven. Now we will wash your corruption away so be
prepared. Take this as a favor.
We are Anonymous.
THEIR MESSAGE
-
7/29/2019 Hacking & Hacktivism
11/29
This happen when Harimau Malaya won against Garuda
Indonesia in AFF Suzuki Cup 2010.
Attacked launched by angry Indonesian Hackers because they
could not accept their team defeated.
Indonesia attacked Malaysia
-
7/29/2019 Hacking & Hacktivism
12/29
UiTM Website Hacked!
-
7/29/2019 Hacking & Hacktivism
13/29
This is a message the hacker leave at the website.
You never learnYou never learnYou never learnI email you
remember? And I notice you have changed, most of the
password after that. (And thanks to unknown Wifi owner,
borrow your line for a while ya!)
THEIR MESSAGE
-
7/29/2019 Hacking & Hacktivism
14/29
SabahTourism.com Hacked + leaked
Tour Malaysia (Not Tourism Malaysia) Hacked
Tourism Malaysia Unaffected
UiTM Penang Hacked
JBiotech Hacked
Social Welfare Department (Ezi2Care) Hacked
CIDB Hacked but back up 12:20am
Land Public Transport Commision Hacked but back up 12:15am 1Malaysia DoS / Switched off 3:45am
Malaysian Communications and Multimedia CommissionUnaffected
ASEANConnect DoS / Switched off
Malaysian Meteorological Service DoS / Switched off
List of website hacked by Indonesia hackers
-
7/29/2019 Hacking & Hacktivism
15/29
Ministry of Education DoS / Switched off
Suruhanjaya Pilihanraya Malaysia DoS / Switched off
Bomba - DoS / Switched off TMNet Unaffected
Perbendaharaan Malaysia - DoS / Switched off
Kementerian Kerja Raya Malaysia - DoS / Switched off
Parlimen Malaysia DoS / Switched off
Malaysian Treasury DoS / Switched off
University Kebangsaan Malaysia DoS / Switched off
Jobs Malaysia DoS / Switched off
Information, Communications and Culture DoS / Switched off
Human Resouce Ministry DoS / Switched off 3:59am
National Sports Council DoS / Switched off
Polis Diraja Malaysia (PDRM) DoS / Switched off
List of website hacked by Indonesia hackers (cont)
-
7/29/2019 Hacking & Hacktivism
16/29
Myanmar attacked Malaysia
-
7/29/2019 Hacking & Hacktivism
17/29
This issues was find at blog. The url is http://blog.wanzul.net/2012/isu-
myanmar-rohingya-web-malaysia-di-hack/
Why Myanmar attacked Malaysia :
17 Ogos 2012, based on sermons, the people of Myanmar now in serious
condition.
They were brutally murdered. Actually, this was already old things.
However, its not be noted from "world". We as a neighbor of the Myanmar do not give attention to them but still
focus on Palestin, Afghanistan and Arab.
Maybe their intention is to alert us to give attention to them but, the way
they do is not Halal.
Myanmar attacked Malaysia (cont)
http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/http://blog.wanzul.net/2012/isu-myanmar-rohingya-web-malaysia-di-hack/ -
7/29/2019 Hacking & Hacktivism
18/29
Political Hacking in Malaysia
-
7/29/2019 Hacking & Hacktivism
19/29
KUALA LUMPUR, Aug 18 Datuk Seri Anwar Ibrahims blog was hacked late last
night and defaced with a fake post that portrayed him as an apologist for the
Zionist regime in Israel.
It also included an apology to Prime Minister Datuk Seri Najib Razak as part of
the opposition leaders message ahead of the Aidilfitri celebration tomorrow.
We understand a screen capture of the posting had been successfully recorded
and is now being spread by Umno cybertroopers with the intention to discredit
and defame Dato Seri Anwar Ibrahim, the blog administrator said.
Malay daily Sinar Harian reported that the hackers had uploaded a message
from Anwar, claiming he felt ashamed for his partys sinful extremist position
chasing after the prime ministers office to the extent of defaming Najib and the
lattersfamily.
Political Hacking in Malaysia (cont)
-
7/29/2019 Hacking & Hacktivism
20/29
Cyber law in Malaysia
Some of the cyber law in Malaysia:
Digital Signature Act 1997
Computer Crimes Act 1997
Copyright (Amendment) Act 1997
Communication and Multimedia Act 1998
-
7/29/2019 Hacking & Hacktivism
21/29
Digital Signature Act 1997
Enforced on October 1998
Secures electronic communications especially
on the Internet
Digital Signature is an identity verificationstandard using encryption techniques to
protect against e-mail forgery. The encrypted code consists of the users
name and a hash of all the parts of themessage.
-
7/29/2019 Hacking & Hacktivism
22/29
By attaching the digital signature, one can
ensure that nobody can eavesdrop, interceptor temper with the transmitted data.
By doing so, a more secure and safe electronic
communication could be done.
-
7/29/2019 Hacking & Hacktivism
23/29
Computer Crimes Act 1997
Protection against the misuses of computers andcomputer criminal activities are ensured by the
Act. Example of crimes:
Unauthorized use of programs
Illegal transmission of data or messages over
computers Hacking or cracking of computer systems and
networks.
Computer crimes are banned by this law. Those
who disobey this law can be charged.
-
7/29/2019 Hacking & Hacktivism
24/29
By implementing the Computer Crimes Act
1997, computer users can now protect theirrights to privacy and build trust in the
computer system.
This Act also enable the government to track
the illegal activities, thus reducing the cyber
crimes cases.
-
7/29/2019 Hacking & Hacktivism
25/29
Copyright (Amendment) Act
1997
Brought into force on April 1999.
The Copyright (Amendment) Act amends theCopyright Act 1987 to extend copyright law to
the new and converged multimedia
environment. It serves to protect the expression of thought
and creative ideas from unauthorized copying
or alteration.
-
7/29/2019 Hacking & Hacktivism
26/29
Communication and
Multimedia Act 1998
Endorsed in April 1999.
The Communication and Multimedia Act 1998creates a new system of licenses and defines the
roles and responsibilities of those providing
communication and multimedia services.
The implementation of Communication and
Multimedia Act 1998 ensures that information is
secure, the network is safe, reliable and the
service is affordable all over Malaysia.
-
7/29/2019 Hacking & Hacktivism
27/29
In Malaysia, you can use this Act for any cases
regarding your internet service provider andsee whether they got accuses of part of this
law.
This Act also ensures high level of users
confidence in the information and
communication technology industry.
-
7/29/2019 Hacking & Hacktivism
28/29
CONCLUSION
Hacking is a good computing skill that can be
used for good or bad intention. There is reason to do the hack, and there are
ways to prevent it.
-
7/29/2019 Hacking & Hacktivism
29/29
Q/A
Thank you