BTricks

Get Gifs at CodemySpace.com

Minggu, 07 November 2010

Task 3. Internet Crimes Via E-mail

Task 3. Internet Crimes Via E-mail

 

  

   1. What is the Cyber Criminal? The solution: Prevention? Eradication?
   2. Please list and explain about the Cyber Criminal? The solution: Pencegahnnya? Eradication?
   3. Explain why it appears Cyber Criminal?
   4. Are there any international law that regulates the Law on Cyber Criminal? Show and explain if there is!
   5. Does the Government of Indonesia issued the Law on Cyber Criminal? Show and explain if there is!
   6. What is meant by E-mail Hacker? What is its role?
   7. What is meant by E-mail Cracker? The solution: Prevention? Eradication?
   8. What is meant by E-mail Preacker? What is its role?
   9. What is meant by E-mail Intruder? The solution: Prevention? Eradication?
  10. Mention types of Intruder in the Internet via e-mail!
  11. What is Carding? Why am I seeing? The solution: Prevention? Eradication?
  12. What is a Defacing? Why am I seeing? The solution: Prevention? Eradication?
  13. What is the Malicious E-mail? Why am I seeing? The solution: Prevention? Eradication?
  14. What is a Junk E-mail? Why am I seeing? The solution: Prevention? Eradication?
  15. What is Malware? Why am I seeing? The solution: Prevention? Eradication?
  16. What is a Mailware? Explain their functions?
  17. Explain the difference between Malware with Mailware!
  18. What is Phishing? Why am I seeing? The solution: Prevention? Eradication?
  19. What is a Scam (Scamming)? Why am I seeing? The solution: Prevention? Eradication?
  20. What is a Spam (Spamming)? The solution: Prevention? Eradication?
  21. Explain, which is more dangerous: Phisingkah? Scamkah? Spamkah?
  22. Tell us about the process of infectious Computer Virus E-mail! The solution: Prevention? Eradication?

Answer .....

1.In this literature, cybercrime is often identified as a computer crime. The U.S. Department of Justice Computer Crime provides understanding as: "... any illegal act requiring knowledge of computer technology for its perpetration, investigation, or Prosecution". Another notion is given by the Organization of European Community Development, namely: "any illegal, unethical or unauthorized behavior relating to the automatic processing and / or the transmission of data." Andi Hamzah in his book "Aspects of Computer Crime in the Field" (1989) defines cybercrime as a crime in the computer field in general can be defined as the illegal use of computers. Meanwhile, according to Eoghan Casey "Cybercrime is Used Throughout this text to refer to any crime That involves computers and networks, Including crimes That Do not Rely Heavily on computer".


prevention: In Sweden, Internet security company, NetClean Technology in cooperation with the Swedish National Criminal Police Department and the NGO ECPAT, developed a software program to facilitate the reporting of child pornography. Each person can download and install it into the computer. When a person doubts whether the existing material on the internet is legal or not, that person can use the software directly and will soon receive an answer from ECPAT Sweden.


2. In the UK, British Telecom developed a program called Cleanfeed to block child pornography sites since June 2004. For there to block it, British Telecom uses a blacklist of Interent Watch Foundation (IWF). British Telecom is currently approximately 35 000 block illegal access to the site. In deciding whether there would be blocked or not, the IWF in cooperation with the British Police. Sign it was disseminated to every ISP, Internet content providers, filtering companies / software and mobile phone operator.


3. Norway followed Britain steps in cooperation between Telenor and the Norwegian National Police, Kripos. Kripos provides a list of sites to block child pornography, and Telenor there any person accessing it. Telenor every day blocks of about 10,000 to 12,000 people who tried to visit it there.


4. Swedish National Police and Norway cooperate in updating the list of child pornography sites with the help of an ISP in Sweden. These sites can be accessed if they received approval from the police.


5. Following the steps of Norway and Sweden, the Danish ISPs to block child pornography sites since October 2005. ISP there in cooperation with the National Police Department provides a list of sites to be blocked. ISP is also working with the NGO Save the Children Denmark. During the first month, the ISP has blocked 1200 access of every day.


Actually, Internet Service Provider (ISP) in Indonesia have also done the same thing, but the number of blocked sites is not much that The access is still free to enter into such sites, particularly sites originating from overseas. For that ISPs need to cooperate with relevant agencies to update the list of child pornography sites that need to be blocked.


Another determining factor in the prevention and combating cybercrime by means of non-penal is the question of ethics. In interacting with other people using the internet, covered by a specific rule called Nettiquette or ethics on the Internet. Although no standardized assessment of how to interact on the internet ethics, ethics in interacting in the real world (real life) can be used as a reference.

2.1. Cyber crime in a narrow sense (in the narrow sense) are called computer crime: any illegal behavior directed by means of electronic That operation targeted the security of computer systems and the data processed by Them.


2. Cyber crime in a broader sense (in the broad sense) is called the computer related crime: any illegal behavior committed by means on relation to, a computer system or systems or network offering, Including Such crime as illegal possession in, offering or distributing information by means of computer system or network.

prevention: Internet security company, NetClean Technology in cooperation with the Swedish National Criminal Police Department and the NGO ECPAT, developed a software program to facilitate the reporting of child pornography. Each person can download and install it into the computer. When a person doubts whether the existing material on the internet is legal or not, that person can use the software directly and will soon receive an answer from ECPAT Sweden.


3.Kejahatan which is done by entering / breaking into a computer network system illegally, without permission or without the consent of the owner of a computer network system into. Usually the perpetrators (hackers) do so with the intention of sabotage or theft of important and confidential information. However, there also do just because they feel challenged to try their skills through a system that has a high degree of protection. Crime is more widespread with the development of technology, internet / intranet.

We certainly do not forget when the East Timor issue is a warm-warm discussed at the international level, several websites owned by the government of Indonesia destroyed by hackers (Kompas, 11/8/1999). Some time ago, hackers have also successfully penetrated into the database containing the user's data service America Online (AOL), a United States company engaged in e-commerce, which has a high level of confidentiality (Indonesian Observer, 06/26/2000) . Site of the Federal Bureau of Investigation (FBI) was not immune from attack by hackers, causing the malfunction of this site in some time

4. 1.Pasal 282 and 311 of the Criminal Code may apply to the case of the spread of personal photographs or film a vulgar person on the Internet, such as cases of pornographic videos of the students.


2. Article 378 and 262 of the Criminal Code may apply to a case of carding, because the perpetrators of fraud seems to want to buy an item and pay with a credit card credit card number is stolen.


3. Article 406 of the Criminal Code may apply to a case of hacking deface or make other people's systems, like websites or programs to be not functioning or can be used as appropriate.


5. 1. Article 362 of the Criminal Code which apply to cases where the perpetrator stole carding credit card number belonged to someone else even though not physically because only the card numbers are taken using the software card generator on the Internet to conduct transactions on e-commerce. After the transaction and the goods delivered, then the seller who wanted to withdraw their money in the bank card was rejected because the owners are not the ones who do the transaction.


2. Article 378 of the Criminal Code may be subject to fraud with as if the offer and sell a product or products by advertising on one website so people are interested to buy it and then send money to the advertiser. But, in fact, the goods are not there. It is known after the money is sent and the ordered goods had not come so that buyers become deceived.


3. Article 335 of the Criminal Code may apply to the case pengancaman and extortion carried out by e-mail sent by perpetrators to compel the victim to do things according to what is desired by the perpetrators and if not followed would bring harmful effects. This is usually done because the players usually know the secret of the victim.


4. Article 311 of the Criminal Code may be subject to defamation cases using the Internet media. Modus were the perpetrators spreading the email to her friends about a story that is untrue or send an email to a mailing list so that more people know the story.


5. Article 303 of the Criminal Code may be subject to ensnare the game that made online gambling on the Internet by the organizers of Indonesia.


6. Article 282 of the Criminal Code may apply to the spread of pornography or pornographic websites are more outstanding and easily accessible on the Internet. Although the Indonesian language, it is very difficult to take action against the perpetrators because they doing the domain registration outside the country where pornography featuring adults is not illegal.


6. hackers are people who study, analyze, and then if desired, can create, modify, or even exploit the system contained in an email.

role: Actually, from where the hackers get their knowledge and what the role of a hacker? seems lessons were not much discussed in class, both at the level of D3 and S1, even at the level of master's and Hecker doctoral.Tetapi why can break down the system that was built at a cost miliyaran dollars? first bank BCA, when introducing a system of internet bankingnya announced that its system is guaranteed safe because it is protected with layered system and cangih. But in fact, only two days, a Hecker at Bandung successfully create a similar system so that customers BCA.sang outwit hackers managed to collect about two hundred data user id and password that hackers could dipakai.Untungnya tsb white wing and report their work to the bank lanksung BCA.kini BCA increasingly maningkat again bankingnya internet system that has been very difficult uprooted.


Another example is Daniel Firman, students from Yogyakarta who worked in Jakarta, alone is able to break down and the KPU website ruffled party names on a whim sana.konon Dani wanted to prove waffle Election Commission officials before the 2004 election, that the site that they build very safe because it costs billions rupiah.Untung Doni had no intention of messing pemilu.Kalau he changed the names of the parties without a funny name, certainly not like the composition of election winners today


Two examples above show that enough of one, had to break down the defense system is extremely valuable mahal.bahkan arguably their work with bare hands without their only defense canggih.modal computer and connection internet.bisa imagine if they use sophisticated equipment and programs , maybe more if the system around us.


7. Cracker is a term for those who go into someone else's system and crackers more destructive, usually on a computer network, bypassing passwords or licenses computer programs, computer security against deliberate, to deface the (changing the web home page) belonged to someone else even to men-delete the data of others, to steal data

role:

8. Phreaker is actually almost the same nature with the cracker where both like GRATISAN. Phreaker difference is more focus into the bug network / telecommunications. Example easily people can call for free when they should be paid, or other examples of someone using a bug that is in a telecommunications company (though not known to the leaking of this information the results itself or be notified in person) it is one of phreaking and people who do call phreaker .

11. On the Internet, this term is quite widely used for an activity associated with credit card. For example, e-commerce transactions, which are collected by using a credit card, criminal use of credit cards of others illegally to a transaction and so forth. People who use the credit card called Carder.


In a crime that occurred in the use of illegal credit card through the Internet world, the term is more lead to the use of illegal credit card. This term is defined as the activities of e-commerce transactions with a number of fake or stolen credit card. Where to conduct the process, the actors - who called the carder - no need to physically stealing the card. but enough to know the card number plus expiration date only. Do not compare carding by the action of hackers or crackers. Why? There are two reasons, first, they later became a big head if disejajarin by hackers, is the reason two is because the activities do not require brain carding.

reasons: In principle, the card itself (plastic) is very rarely obtained.

This is because people think, if the credit card stored in the closet

and issued only when you want to use, it will be very difficult

for tsb card misuse. This is a pretty big mistake.

In essence, if you want to do evil misuse of card

credit, which is needed is a * number * of the card, along with the name

owners (many businesses also asked the date of expiry, but at

Internet, usually you can get away using the number and name only,

provided that the expiry date fields (authored by now) at least six

months before).

How do I obtain credit card numbers this? In

countries where credit cards are used extensively, for

get a credit card number, usually does not require skill

special. You can fad-ngaduk ngaduk grocery store or the trash can

try working at the gas station, and get a bill credit card customers. In

Indonesia, it is increasingly possible to do, especially in markets

large supermarkets such as Sogo, triangle Senen, M Plaza, etc.. Usually bill

acceptance of colored paper that lists the name, card number

credit, how much the total price, and so on. If you're a woman,

it even better. Find a job as a cashier and a time to themselves to

copy the numbers. Women also rarely suspected ;-).

Stir-ngaduk bins can also be useful, because in addition to

obtain a copy of the bill, if you ngaduk-ngaduk bins near

building an ISP, you can also get a password / login, etc. (see

article 'trashing and Social Engineering').

Sophisticated method is now widely used in developed countries

is by using the devices 'surveillance' to get

credit card numbers to potential victims. Of course if you succeed

gain access to the database of the ISP or Web commercial, you can

harvest hundreds or even thousands of credit card numbers from there.

12. Defacing is a part of the web hacking activity or application program, which focuses particularly targeted at changing the look and / or physical configuration of a web or application program without going through the source code program. While deface itself is the end result of the cracking activity and the like - the technique is to mbaca source code (this is specific to the context of web hacking), then ngganti image (for example), editing the html tags and colleagues, and others.

reason: For this case all the craziness that has been done by the offender has several separate reasons, namely:


1. Want to be a hacker

2. Gaining popularity

3. Want to get praise


The reasons above are enough to digest the logic. But what about the unique reasons like Nothing to do, Like-like, What loe affairs, or "I want my impression SO tu site, so" and so forth. In my opinion, without any reason whatever a person can only do web hacking.

13. Malware is short for malicious software, terinstalasinya a software without your knowledge that aims to destroy or spy any activity performed on the computer. causing the computer system performance is lowered can not even react at all due to infection from malware is causing losses. In general malware was created intentionally by the programmer virus to infect a target computer system, with the background only to find fame in the cyber world or any other purpose. So many local spread of malware such as viruses infect the computer system turns every day with different variants, for example: virus eagle, My love, love bug, etc.. Even as for the manufacture of malware briefly just one click, sepertihalnya tools generator virus spread freely in the world of the Internet for free.

reasons:

14. For Mailing Lists -> Messages that have nothing to do with the mailing list.

• For User -> incoming messages that we do not want, for example a friend sent a chain of business deals


we do not want.

15. is a computer program that created with the intent and purpose of its creator and is a program that searches the weakness of software.Umumnya Malware was created to break or damage any software or operating system

16. program is a program created deliberately to damage the computer without being noticed by the owner.

17.

18. Phishing is a play on words from English which means fishing. In the world of the all connected electronics today, the term phishing many interpreted as a way to lure someone to a specific page.


phishing is rarely used by criminals on the Internet to lure someone to go to the web address via e-mail, one goal is to break down a very private information from the recipient, such as passwords, credit cards, etc..


Among them, by sending information from the recipient as if the e-mail get a message from a site, then invited him to visit a bogus website. Fake site created in such a way that looks similar to the original site. then when the victim fill in the password then that is when these criminals know the password the victim. Use of this fake site also called pharming.

19. Scam is a scam, this scam is usually like this: I follow the program PTC A well now is the time I pay out or withdraw, but when I login again my account was not registered, or perhaps by other reasons. PTC like these that can be called alias fraud scam.

20. 1. Creating crash a program using a buffer that uses the input data is too large.

2. Sending a message to a newsgroup cause the forum is filled with messages that are not relevant.

3. Posting articles to many newsgroups or mailing lists. This is also called ECP (excessive cross-posts).

4. Bombed a newsgroup / mailing list with copies of the same article. This is termed EMP (excessive Multi-Post).

5. Sending many similar emails that are not expected by readers, especially those associated with the advertisement of a product.

6. Output of large and annoying. For example occurred in an IRC user who moved briefly from the monitor, then when you return often feel irritated to see a sentence that may consist of several hundred lines. It is also categorized as spam.


Spam is very annoying, especially for users of small-bandwidth Internet connection, do not have the time to access the Internet, or restricted their email quota.

21. Phishing is a play on words from English which means fishing. In the world of the all connected electronics today, the term phishing many interpreted as a way to lure someone to a specific page.

0 komentar:

Posting Komentar

pendukung

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Grants For Single Moms