CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS »

What is Cybercrime??...

The Oxford Reference Online explains cyber crime as crime committed in the Internet and using the computer.

The Encyclopedia Britannica defines cyber crime as any crime that is succeeded by means of special specialties or expert use of computer technology. So what exactly Cyber Crime is all about? Cyber crime could reasonably mean a different kind of crimes and internet abuse.

The Internet or Cyber Space as it sometimes known, is a borderless environment unlike a brick and mortar world and it also call globalisation. Even though it is indispensable as information and knowledge bank, it is a favourite tool for someone with a crimeful mind, who can utilize this environment for their maximum satisfaction.

It is not a surprise that Cyber Crimes like cyberterrorism, fraud, virus disseemenation, and other crimes are on the rise. Cyber Terrorist and cyber mafia are emerging with great force, whose activities are going to threaten the world and the internet.

Cyber crimes have been explained in further details in the next explaination.

Sunday, February 8, 2009

WELCOME TO ALL...

THANK YOU for visiting our blog entitled " ICT and Ethical Issues". the purpose of this blog is for our assignment for the kict course, ICTM-1803. We all as a team members of this group has choose this topic and agreed to discuss and work on it.

We welcome all people to come and look around our beautiful blog and take benefit and information contain in it.

This blog was created by 5 group members. We are glad introduce ourselves to all our visitors of this blog.



LEADER
Muhammad Redza Bin Bakhtiar
0822997
redza_divodder@yahoo.com


TEAM MEMBERS

Mohamad Muaz Bin ramli
0820813
thezekr_90@yahoo.com


Mohd Azreen Bin Saien
0825309
azreensaien@yahoo.com


Muhammad Izzudin Bin Zainuddin
0821133
izz_deanz@yahoo.com


Muhammad Asyraf Bin Rosli
0820391
ayaf_90@yahoo.com



p/s: sorry to all. Our pictures are having technical problems.We want to apologize for our weaknesses and mistakes. But you all can still explore this blog and take benefits from it.

VIRUS DISSEMINATION

What is a computer Virus?

A computer virus is a program that can ‘infect’ other unprotected programs by evolving themselves into a copy that paticukar programs or themselves. Viruses can transfer themselves, without the person knowing about them, and infecting and destroying large numbers of programs on many types of machines. A computer virus passes from computer to computer like a biological virus passes from person to person like a spread of viruses and diseases.

Viruses can also contain instructions that cause damage and destruction, the combination of possibly damaging code with the ability to spread and infect is what makes viruses a considerable concern.

How do viruses spread?


Viruses can spread and infect without any readily visible symptoms or signs. A virus can start on event-driven effects at specific time, time-driven effects on a specific date or can occur at random.

Typical action of a virus
  1. show messages to prompt an action which may set of the virus
  2. Delete files
  3. Scramble data and information on a hard disk
  4. make an erratic screen behavior
  5. Halt the computer or the machine
  6. Just replicate and appear itself!

This is how a virus spreads and infect through the Internet


This is how a virus spreads and infects in standalone system


Spreading Virus – Local Networks Connection


The first ever computer virus to be see was called BRAIN and it well-known in 1986.

Others well known and famous viruses:-


-Jerusalem (1987)
-Dark Avenger (1989)
-Michelangelo (1991)
-Concept (1995)
-Melissa, CIH (1999)
-The Love Letter (2000)
-Codered, Nimda (2001)
-SirCam-Nimda








Wednesday, February 4, 2009

Internet Piracy


Internet piracy can be defined as downloading or distribution of unauthorized copies of intellectual property such as movies, television, music, games and software programs via the Internet. Illegal downloads may happen in many ways including file sharing networks, pirate servers, websites and hacked computers.

Each file posted on the Internet can result in millions of downloads. Piracy is theft, and pirates are thieves. Downloading a movie off of the Internet is the same as taking a DVD off a store shelf without purchasing it. In 2005, MPAA studios lost $2.3 billion to Internet piracy alone.

Uploading movies on a Peer-to-Peer (P2P) service or an illegal website is akin to giving illegal copies to millions of people. Illegally recorded movies are sold to individuals who distribute them around the world through computer servers known as “Topsites.” The extraordinary speed and power of a Topsite triggers the avalanche that is global Internet piracy.


Cyberterrorism


Cyberterrorism can be defined as an act of terrorism done through the use of cyberspace or computer resources. For instance, a simple propaganda in the Internet, that there will be bomb attacks at a particular place can be considered cyberterrorism.
A cyberterrorist is someone who intimidates or persuade a government or organization to advance his or her political or social agendas by launching computer-based attack against computers, network, and the information stored on them. At worst, they may use the Internet or computer resources to carry out an real attack.

There are also hacking activities done towards individuals, families, organised by groups within networks, tending to create fear among people, demonstrate power, collecting data and information, relevant for ruining peoples' lives, robberies and blackmailing.

Obsence and Offensive Content


The content of websites and other electronic communications may be indecent, obscene or offensive for a variety of reasons. Sometimes, these communications may be illegal.

Many jurisdictions restricts on certain speech and ban racist, blasphemous, politically subversive, libelous or slanderous, seditious, or inflammatory material that leads to incite hate crimes.

The extent to which these communications are illegal varies greatly between countries, and even nations. It is a sensitive area in which the courts can involved in arbitrating between groups with entrenched beliefs.








Blogger Raja Petra Kamaruddin

has been arrested for the offensive contents

in his blog that creates polemic in this country.

Fraud


Computer fraud is any dishonest misrepresentation of fact intended to induce another to do or to avoid from doing something which causes loss. In this frame, the fraud will result in obtaining a benefit by:





  • altering computer input in an unauthorized way. This requires technical expertise and it is an common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes


  • destoying, altering, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect


  • deleting or altering stored data


  • altering or misusing system tools or software packages, or altering or writing code for inappropriate purposes. This requires real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, salami shaving, and theft of classified information


Computer Hacking

Computer hacking is the practice of altering computer software and hardware to complete a goal outside of the original purpose. People who involved in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is indecent and fails to give appropriate recognition to their skills.

Computer hacking is popular among teenagers and young adults, although there are many oldies as well. Many hackers are true technology maniac who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have extraordinary skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills and also a chance to demonstrate their capacities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually hire computer hackers as part of their technical staff. These individuals use their abilities to find weaknesses in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other computer crimes.
In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble objectives. Hackers who are out to change a corporation’s financial data, break security codes to gain unauthorized network access, steal personal informations or conduct other destroying activities are sometimes called “crackers.”