1. Background problem.
The need and use of information technology will be applied to the Internet in all areas such as e - banking , e - commerce , e-government , e-education and many more have become commonplace . Even if the people especially those living in big cities is not untouchability with information technology issues can be considered retarded or " clueless " . The Internet has created a new world called cyberspace is a computer -based communications world which offers a new form of virtual reality ( not directly and not real ) .The development of the Internet is constantly increasing both the technology and its use , bringing a lot of both positive and negative impacts . Surely that is a positive for us all to be grateful for the many benefits and services derived from this technology , for example, we can perform banking transactions anytime by e - banking , e - commerce also makes us easy to make a purchase or sale of an item without knowing where . Looking for references or information about science is not a difficult thing with the e-library and more convenience gained by the development of the Internet . Surely , it can not be denied that the negative impact of Internet technology that does not lose much with the existing benefits . Internet makes conventional crimes such as threats initially , theft and fraud can now be done using a computer online media with very little risk of being caught by individuals or groups with losses greater good for society and the State in addition to causing new crimes . The number of negative impacts, and growing , making a paradigm that no computer is safe except buried in the ground as deep as 100 meters and did not have any relationship
In the virtual world ( Internet ) , security issues is one thing that is very necessary . Often a network of Internet-based systems have weaknesses or often called a security hole ( hole ) . Well, if the hole is not closed , a thief can enter from the hole . Theft of data and systems from the internet is now often the case . The case was entered in the case of computer crime . The term in the English language : Cybercrime .
2. Objectives.
To straighten out the misunderstanding about the true definition of a hacker and a cracker do not become dangerous and useless . In the general public , the term hacker is using a lot of the mark or confused with the term cracker . Where often the technology lover who feels aggrieved immediately assume that this is the culprit hacker .3. Principal - the principal problem.
Cybercrime is a crime where the criminal action can only be performed with the use of cyber technology and occurring in the cyber world . Many diantaramya is an employee of a company that is loyal and trusted by his company , and he does not need to commit computer crime . They are the ones who tempted the holes contained in the computer system . So the opportunity is a major cause of these people become ' cyber criminals ' . Cybercrime categories are :Cyberpiracy
The use of computer technology for :
• reprint software or information
• distribute information or software through a computer network
Cybertrespass
The use of computer technology to improve access to :
• The computer system of an organization or individual
• Web sites that are protected with a password
Cybervandalism
The use of computer technology to create a program that :
• Interrupting the transmission of electronic information
• Destroy the data in the computer
DISCUSSION.
In the general public , the term hacker is using a lot of the mark or confused with the term cracker. Especially when the discussion leads to evil . Where the term for the criminals they really mean is Cracker . Hackers regarded as the person most responsible for the computer crime . Yet if we look at what exactly the term and what is being done by the hackers then the assumption is not always true . There are several types of computer technology enthusiast as follows:1 . hackers
A bunch of people / team whose job building and maintaining a system that can be useful for the life of the world of information technology , as well as users . broad scope of hackers here can work offline and online in the field , such as software builder (manufacturer / designer of applications ) , database administrators , and administrators . However, the level is above average and do not claim to own , but claimed by the group , then from the famous hacker humility and generosity will provide all the knowledge .2 . Cracker
A / group of people who have the ability to destroy a system that does not run like a normal function , or even the opposite , as they wish , and they are recognized as having the ability indigo and absolutely brilliant brains . This cracker is usually not considered a crime virtual world , because they are more often change applications , such as creating a keygen , crack , patch ( to be a full version ) .3 . Defacer
A / A group of people trying to turn the page of a website or profile on a social network ( myspace , facebook , myspace ) , but the higher level , can steal all the information from a person's profile , how to deface relatively easy because of the internet tutorial , you need just try and try , and a bit of experience on information technology .4 . carder
A / Lamers bunch who tried all means to get one's credit card number to fraudulently generate a set of credit card for themselves. But to a certain extent carder can steal all the valid information from an online shopping. It is a thief Maya world.5 . Frauder
A / group of people who try to commit fraud in the world of online auctions , there is no clear description about this person , they are often categorized as a carder .6 . spammers
A / bunch of people trying to send false information through online media such as the internet , usually in the form of email , these people try every means so that those who believe the information sent to them so that the next step to get the spammer 's willingness to run properly . They had not else classified as an impostor .and a series of terms that exist , but I tried to explain a little, because the names that often appear on the surface .
But you do not always minded that lives above the original ones are always the things that are bad and evil , in fact I am or maybe you , have a friend , friends , relatives are included in the above categories . The robes may be worn when they are communicating only with the world of technology . Motiv of the internet crimes include
• Trying and curiosity
• Economic factors
• an opportunity to showcase
• heartache
Hacker is a term for those who use his expertise in computers to see , find and correct flaws in the security system of a computer system or in a software . The results of their work are usually widely publicized in the hope that a system or software found to have weaknesses in terms of security can be enhanced in the future . While cracker exploit weaknesses - weaknesses in a system or software to commit a crime .
Hackers appeared in the early 1960s among members of student organizations Tech Model Railroad Club at the Artificial Intelligence Laboratory of the Massachusetts Institute of Technology ( MIT ) . The student group is one of the pioneering development of computer technology and they operate with a number of mainframe computers . The word hacker first appeared with a positive sense to refer to a member who has expertise in the field of computers and computer programs that are able to make better than that has been designed together . Then in 1983 , growing hacker analogy to refer to someone who has an obsession to understand and master the computer system . Because, in that year for the first time the FBI caught 414s computer criminal groups based in the U.S. Milwaukee . 414 is a local area code them . The group that came to be called hackers are convicted of burglary 60 computers , from computers owned by Cancer Center Memorial Sloan - Kettering's computer to Los Alamos National Laboratory . One of the perpetrators enjoy immunity because TESTIMONIALS , while five other players get probation .
In the hacker community , known hierarchy or level . Hackers placed second in the levels and crackers are on the third level . In addition there are several other levels as lamer ( wanna be ) . Unlike the hackers and crackers who seek and find their own weaknesses of a system , a lamer use the findings to commit a crime . A lamer usually only have a little knowledge of computers , especially regarding security systems and programming . In the hacker community , lamer is a term that could be considered embarrassing . Underground world of hackers giving levels or tiers for its members . Rank is given based on the expertise of someone in hacking . Levels are:
1 . elite
The characteristics : understand the operating system , able to configure and connect a global network , perform daily programming , efficient and skilled , using knowledge to the right , does not destroy the data , and always follow the rules. Elite level is often referred to as the 'temperature'2 . semi Elite
The characteristics : younger than elite , have the ability and extensive knowledge of computers , understand the operating system ( including holes ) , the ability of the program is enough to change the program exploits .3 . developed Kiddie
The characteristics : young age ( ABG ) and still in school , they read about the methods of hacking and how on various occasions , tried various systems to ultimately succeed and proclaimed victory to another , generally still use Graphic User Interface ( GUI ) and just learn the basic of UNIX without being able to find a hole new weakness in the operating system .4 . script Kiddie
Characteristics: as well as developed kiddie and Lamers , they only have the technical knowledge of networking is very minimal , can not be separated from the GUI , hacking is done using horses to frighten and distress living most Internet users .5 . Lamer
The characteristics : does not have the experience and knowledge but would like to be a hacker so lamer often referred to as a ' wanna-be ' hackers , they primarily use computers to play games , IRC, exchange prirate software , steal credit cards , using software hacking trojan , nuke & DoS , likes to brag via IRC channels , and so on . Because many shortcomings to achieve elite , in their development will only be up to the level of developed or script kiddie kiddie alone .Stages through which they are to be a hacker actually difficult to tell the level of final or final of hackers has been achieved , because there's always something new to be learned or discovered ( gather information and study carefully the fundamentals are the same for a hacker ) and it also depends on the feeling ( feeling) .
A hacker has a purpose and that is to enhance the system while a cracker more destructive. Generally cracker cracking to use resources in a system for its own sake .
How do I destroy a cracker?
A cracker can penetrate into the system and carry out destruction . There are many ways that is typically used to perform penetration include: IP spoofing ( IP address forgery ) , FTP Attack etc .In order cracker protected during the attack , the technique cloacking ( impersonation ) is done by jumping from the previous machine has been compromised ( overrun ) via telnet or rsh program . At intermediate engine that uses Windows attack can be done by jumping from program Wingate . In addition, the jump can be done through a proxy device configuration is less good .
In general , these methods aim to create a server in a system becomes very busy and working on his limits so that the system will become weak and easily cracked.
Real hackers call these people ' crackers ' and do not like to hang out with them . Real hackers crackers as people are lazy , irresponsible , and not very smart . Real hackers do not agree to say that the through the security has become a hacker .
RESPONSE
A few important steps that must be done every country in the prevention of cybercrime are :Modernize criminal law and its national procedural law , which is harmonized with international conventions related to the crime Increasing national computer network security system according to international standards Improving the understanding and expertise of law enforcement officials regarding the prevention, investigation and prosecution of matters related to cybercrime Increasing awareness of citizens on issues of cybercrime and the importance of preventing such crimes occur Increasing cooperation between countries , both bilateral, regional and multilateral , in handling cybercrime , including through extradition and mutual assistance treaties treaties .
Examples of mitigation include:
IDCERT ( Indonesia Computer Emergency Response Team )
One way to simplify the handling of security issues is to create a unit to report the safety case . The security issues abroad was recognized with the advent of " sendmail worm " (circa 1988) that stop the Internet email system at that time . Then set up a Computer Emergency Response Team ( CERT ) Since it started in other countries also formed CERT to be a point of contact for people to report the security problems . IDCERT an Indonesian CERT .
Certification of security devices . The device is used to overcome the security should have quality ratings . The devices used for personal purposes is different than the devices used for military purposes . However, until now there is no institution that handles the evaluation of safety devices in Indonesia . In Korea it is handled by the Korea Information Security Agency .
Law Review
Currently in Indonesia does not have a specific law / Cyber Law governing cybercrime , even though the law has been around since 2000 but has not been approved by the Government in responding to the cases happened in particular in connection with cyber crime , the investigator ( especially the Police ) do analogies and similarities to the existing provisions in the Criminal Code article that can be worn in the Code on Cybercrime , among others :1 . Criminal Code ( the Code of Penal )
Article 362 of the Criminal Code On theft ( Case carding )
Article 378 of the Criminal Code of Fraud ( Fraud via the website as if selling goods )
Article 311 of the Criminal Code defamation ( via internet by sending an email to the victim or the victim's friends )
Article 303 of the Criminal Code gambling ( online gambling )
Article 282 of the Criminal Code Pornography ( The spread of pornography via the Internet ) .
Article 282 and 311 of the Criminal Code ( concerning the case Spreading one's personal photos or movies on the Internet vulgar ) .
Article 378 and 362 ( On Carding case because the perpetrator of fraud as if to pay , with the stolen credit card )
2 . Act 19 Year 2002 on Copyright , particular computer program or software on
3 . Act 36 Year 1999 on Telecommunication , ( Internet misuse that interfere with public order or personal ) .
Act 25 Year 2003 on the Amendment Act 15 of 2002 on Money Laundering .
5 . 15 yrs Act 2003 on Combating Criminal Acts of Terrorism .
CONCLUSION
The virtual world is not much different from the real world . Hopefully the audience of technology can change the mindset that it is not always malicious hackers . Being a hacker is a kindness but be a cracker is a crime . Everything depends on each individual .The hackers used his expertise in computers to see , find and fix flaws in the security system of a computer system or in a software . Therefore , thanks to the Internet there are hackers and the one we can enjoy as it is today , even continue to refine the system to become better. Then the hacker can be called as a hero was a cracker network can be termed as criminals for committing infiltrating networks with a view to his advantage in personallity with the intent of harming others . Hackers often called hackers white ( which is the real hackers are built ) and black hackers ( crackers that are dismantle and destroy )
Motiv of the internet crimes include
• Trying and curiosity
• Economic factors
• an opportunity to showcase
• heartache
Thank you for reading this article. Written and posted by Bambang Sunarno .
sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
name: Bambang Sunarno.
http://primadonablog.blogspot.com/2013/12/about-cyber-crime-internet-crime.html
DatePublished: December 10, 2013 at 14:47
Tag : About CYBER CRIME ( Internet Crime ).
No comments:
Post a Comment