Presentation is loading. Please wait.

Presentation is loading. Please wait.

e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083.

Similar presentations


Presentation on theme: "e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083."— Presentation transcript:

1

2 e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083

3 cyber crimes Big increase in cyber crimes (The Star 27 Apr 2011) KUALA LUMPUR: There has been an increase in cyber crimes in Malaysia over the last two years, more than 3,500 of them reported in the first three months of this year. CyberSecurity Malaysia chief operating officer Zahri Yunos said some 8,000 cases were reported last year and attributed this to the growth in Internet usage and broadband penetration that now stood at 55%.

4 What is cyber crime? Also known as computer crime,digital crime, e-crime and electronic crime

5 Examples of cyber crimes intrusion Internet banking fraud harrasment Intellectual property infringement

6 More example cyber crime Identify Theft Some criminals use the Internet to break intovictims' online financial accounts, taking passwords, money and sensitive information Computer Viruses Computer hackers are digital age criminals that can bring down large infrastructures with a single keystroke emitting a computer virus

7 Reasons for cyber crime For financial means Purely out of mischief To signal some form of protest Purely to pursue criminal activities Revenge on someone they hate To forge documents Identity theaf

8 Property infringements and legal right Software piracy That action against the law when the employees install the same programme on multiple using software for which one license agreement was paid. -freeware and shareware Freeware allow you copy or download without payment Share ware is a software that canused by everyone for free for a limited time period only -treacherous Cyber​​-vandals like to change the public site and display the information and how it canbe done by hackers as disloyal are interpreted to severe penalties. -stolen If the contractor can access via the Internet to other users' information such as personal data, lists, records, personal e-mails, even with good intentions can be defined as theft

9 Tentang masalah jenayah siber

10 Jenayah Siber di Malaysia Naik 100% 13 Januari 2009 (Harian Metro) PULAU PINANG 25 Julai – Sebanyak 6,167 kes penipuan dalam Internet melibatkan nilai kerugian RM63 juta dilaporkan di negara ini sepanjang tahun lalu.Ia meningkat empat kali ganda dalam tempoh empat tahun berbanding pada 2007 yang hanya mencatatkan 1,139 kes dengan nilai RM11.4 juta. (Sumber:http://www.utusan.com.my/utusan/info.asp?y= 2011&dt=0726&pub=Utusan_Malaysia&sec=Jenayah& pg=je_01.htm)http://www.utusan.com.my/utusan/info.asp?y= 2011&dt=0726&pub=Utusan_Malaysia&sec=Jenayah& pg=je_01.htm

11 Kesan jenayah siber Kerugian wang ringgit. Ini kes biasa yang berlaku di internet. Contohnya ditipu melalui chatting room Yahoo Messenger. Maruah diri tercemar. Contoh mudah apabila video dan gambar kurang elok tersebar meluas oleh orang yang tidak bertanggungjawab. Kestabilan politik tergugat. Contoh paling mudah apabila seorang remaja menghina lagu NegaraKu, maka tersebar ke segenap pelusuk dunia

12


Download ppt "e-Rule By Syazwani binti safee Pb11077 Nurul ashikin binti rani PB11083."

Similar presentations


Ads by Google