assigment oumh1203 english for written communication

24
FAKULTI PENDIDIKAN DAN BAHASA SEPTEMBER 2011 OUMH1203 ENGLISH for WRITTEN COMMUNICATION NO. MATRIKULASI : 671230045325001 NO. KAD PENGNEALAN : 671230045325 NO. TELEFON : 0136478910 E-MEL : [email protected]

Upload: shawal-hj-md-nor

Post on 20-Feb-2015

330 views

Category:

Documents


10 download

TRANSCRIPT

Page 1: Assigment OUMH1203 English for Written Communication

FAKULTI PENDIDIKAN DAN BAHASA

SEPTEMBER 2011

OUMH1203

ENGLISH for WRITTEN COMMUNICATION

NO. MATRIKULASI : 671230045325001

NO. KAD PENGNEALAN : 671230045325

NO. TELEFON : 0136478910

E-MEL : [email protected]

PUSAT PEMBELAJARAN : Melaka

Page 2: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

CONTENT

1. WELCOME SPEECH PAGE 2

2. INTRODUCTION PAGE 3

3. WHAT IS INTERNET? PAGE 4

4. WHY CYBER CRIME SHOULD BE CONTROLLED? PAGE 5

5. CYBER CRIME CLASSIFIED PAGE 6

6. COMPARISON OF CYBER CRIME IN MALAYSIA

AND THE UNITED STATES PAGE 9

7. MyCert INCIDENT STATISTICS

FOR THE YEAR 2011 PAGE PAGE 11

8. HOW TO ADDRESS THE CYBER CRIME? PAGE 14

9. CONCLUSION PAGE 15

10. REFERENCS PAGE 16

1

Page 3: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

WELCOME SPEECH

Praise God that hath given His permission and strength given then what can I translate

in my heart in the quest for knowledge that is useful for self, family and children. Thanks

also to the wife and children a lot of help and motivating spirit to face the vagaries of long-

distance  students. Existing  trials  pretty much  waiting. Commitment to work and  family

at this age  is  challenging. Hopefully that what I wish to get I would pray for the love

of God. Sense of pride when the assigned tasks can be completed even in a state of

considerable  press, especially from the existing workload. Time is like gold. Time elapsed

will not be turned back. To complete this task, spare time is at night with snoring

accompanied by beloved children. Wake up till morning to find out all the essence. Thanks to

the progress of time available. The task becomes easier with the internet. Everything is at our

fingertips.  Job  experiences  over twenty  years  is  a lot of  help.  What is inside  poured

back  on top of each sheet of  this task. Finally, I  am confident  that the  work  produced  can 

yield  a very  valuable  one day. To lecturers  and friends  that helped, thank  spoken. To

the  beloved  family, may  be patient  and pray  for  success  and happiness  always 

appears. You all helped morally and understand the conditions that are encountered.

Thank you.

MOHAMAD SHAWALUDDINNOR B. HJ MD NOR

OPEN UNIVERSITY MALAYSIA

2011

2

Page 4: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

INTRODUCTION 

           What is cyber crime? Before we go much further on the topics discussed, it is better to

discuss first the meaning of cyber crime. Crime means activities such as theft, fraud, forgery,

murder, kidnapping, extortion, smuggling and so on. According to Mr. Donn B. Parker, a

researcher at the cyber crime and security for SRI International in Merlo Park, California,

cyber crime is a behaviours in which they have an intention and is associated with the

computer through any means to cause the victim to suffer or cause suffering, loss, and

continuous . Cyber crime involves all the usual criminal activities like theft, fraud,

extortion and all activities that involve the violation of existing law. 

            Meanwhile, the U.S. Justice Department to reiterate this definition by stating that

computer crime is any illegal activity in which knowledge of computer technology used to

make it happen. However, there is some different definitions of cyber crime in certain

countries.  For the Muslim countries, gambling, pornography, advertising, sex is a

crime but not for most countries, especially in the western block. 

             For example, in England, matters that related to pornography were taken for granted.

Those involved with child pornography are considered to be criminals. 

Countries in the western block focusing on security, trade and economy of their countries.

Various laws related to safety and commerce developed, such as 'trademark law', 'copyright

law', the law relating to 'hackers' and the spread of the virus and so on. Due to different

definitions of cyber crime, it is difficult for enforcement of cyber laws. In this

context, Malaysia is involved in internet usage agreements that are not refined to allow this

crime. However, due to the crime has caused great chaos, death, and significant losses,

then almost every country in the world to draft their own laws to address the problem

of cyber crime and to impose capital punishment to those involved.

3

Page 5: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

WHAT IS INTERNET?

Internet refers to the  network  constructed  by connecting  multiple computers,

thousands or millions of computers to each other via the global telephone lines and satellite.

Internet is the two main types of communication services and information retrieval. In terms

of consumption, it is a network that provides electronic communication services, remote

access file services, dissemination of information, locating information and several other

services. From the application is built various types of alternative services to facilitate various

transactions  such as  electronic commerce,  electronic banking  and the Internet, and

advertising.

When the advent of the internet as a communication tool to date, how to disseminate

information  more  easily,  fast, simple,  and  saves time. The information disseminated

throughout the world with no boundaries of time cause no one is able to control the passage

of information in cyberspace. Millions of websites have been built with all kinds of

information, ideas, ideology, propaganda and pornography are also  disseminated  through

the internet. Therefore   this  dissemination occurred independently, then  the

feelings of fear and security administrators in some countries that has to be negative about

the freedom of speech, thought and felt that their citizens. They use this cyberspace to

communicate their opinions to the world. Internet has surpassed all existing means of

communication.  Formerly  a radio  and television  are  important media  tools  to

spread information. But not now, radio and television are one way  media  interactive  not 

like  the Internet. This was done to facilitate the effective control of information.  Delivery of

information through radio and television and print materials can be controlled. Many

countries have  allocated  the law  to regulate broadcasting  and publishing  the

materials of these media. All publications in Malaysia require a valid permit or license, such

as the Printing, Newspaper and Publications Act 1984, the Broadcasting Act 1988, the

Sedition Act 1948, the Official Secrets Act 1972. This license permits and  limiting 

information that can be printed, disseminated,  or distributed to the public.

Traditional  media  is restricted by  geographic  limitations.  Dissemination of  books,

magazines, newspapers have to cost, manpower, infrastructure and transportation. All this

factors limit the dissemination of information and at the same time facilitate the control or 

filtering  information. Existing  media  is very  different from the  internet because the

internet  is  a platform that provides  information from  the millions of consumers and

4

Page 6: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

researchers or researchers from around the world. A person may disseminate information,

communicate and interact with others who are thousands of miles away.

WHY CYBER CRIME SHOULD BE CONTROLLED?

Each user developed and developing countries around the world have adopted

the control and  supervision  of  all  media and  printed  materials.  Since the  growing

sophistication of internet use and easily accessible, it is necessary, it is also regulated

and supervised, such as printed materials and other media. Is the internet will also pose a

threat to certain parties? In Malaysia, the government has taken positive steps to not censor

cyberspace. This is enshrined in the bill guarantees promised by the government of Malaysia

with companies Multimedia Super Corridor (MSC). Section 3 (3) of the Communications and

Multimedia Act 1998 also declares that none of the provisions under the Act which allows

any censorship of information occurs. This principle is based on the control information will

only produce negative effects on the development of communication technology through the

Internet.

But this case is different in some countries that stand firm and aggressive, such

as Cuba and China, who practice censorship in total or partial information.   They

think, not all advances in technology can be fully accepted.  Some Internet content

could threaten their ideology to the population.  They still want to stay with the

pattern of government and the lives that have been adopted in which the ideology of

the rule continued with little transparency.  They prefer their people passive, blind and

not savvy to the world's information and recent developments.

A little openness is admission is just technology-related information public facilities,

transportation, household and agricultural needs. There are still many countries that

moderation and censorship committed only information which may damage the public

mind. The existing freedom of speech should not be abused. If opposition parties or spread

false information, defamatory or ideologically opposed through the Internet, the government

considers it is not a serious threat. The Government will respond in a similar manner to the

user. The Government will increase public knowledge and spread the word of truth in print or

on television are usually controlled by the government. In this way, people will be able to

consider the truth of the information.

Who are the cyber criminals? What crimes? Where a crime is committed? These

answers are hard to come by because the perpetrator is anywhere in the world and they

5

Page 7: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

can move freely all over the world because of the widespread use of Internet around the

world. Ordinary criminals can be identified by physical and equipment can be seen. Cyber

crime and only use the internet seems to be in the universe. Their  identity  always

change. According to Michael A Vatis  from the Federal Bureau of Investigation (FBI),

United States, a major problem to distinguish cyber threats to the physical threat is to 

determine who  attacked  the system,  why,  how,  and where.  Generally,  cyber

criminals are the ones who are well versed in computer technology  and network

systems. They are professional criminals. It may be there next to  us,  doctors,  friends, 

professors, or anyone else. They will attack their own institutions, competitor institutions,

hired by certain parties, hobby or try something new and see the atmosphere of uncertainty.

Business organization may be the target of competitors, employees or former

employees. Banks and financial institutions being targeted professional robbers and 

criminals. While the university will be the target of  students  or  former

students. Government agencies  are likely to be targets of terrorists  and  traitors.  Military 

computer  may be  hijacked. Sometimes  the laws  designed to  curb  cyber crime  can’t  do

anything  like  what happened in the United States.  Sophisticated  technology  and

pioneer  of computer systems,  until now failed to  detect the  tragedy of  11 September 

attack  planning.  During the September 11 attacks, the 19 aircraft hijackers entered

the United States with a valid visa. They  respect as  other  users  via telephone and

internet. They planned the attack on the World Trade Centre,  New York  and  the Pentagon 

building  in Washington.  United States  received  a big misfortune and shame based on its

technological expertise.

Cyber crime occurs in various forms, objects and situations. What kind of computer

usage will always be dealing with cyber crime activities. Users will become victims or

manipulated  by criminals  or  both.  Input  operations, data processing,  output  and data

communications  operations  will be used  by criminals  for the purpose of  thoroughly

unhealthy. Cyber crime can be classified into: -

CYBER CRIME CLASSIFIED

1. Fraud: - This type of cyber crime is the same as what happens in the real world, just the

way behavior is through the internet. Crime is done solely to make money from the victim by

means of easy and difficult to detect. The frequency of  identity fraud occurs is via e-mail

where the user is required to enter personal information, supposedly the bank to update the

6

Page 8: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

data users. In fact, they steal user information  to enter  the banking website using another

person's identity.  E-mail  is  questionable  and is known  as “spam e-mail”. Consumers are

often fooled because the e-mail sent will be linked to websites that resemble the real website.

From information obtained, a personal declaration to be invaded and caused consumers to

lose money  in the account.  In addition to  identity fraud,  other  frauds  are  often 

committed in the sale of products and services activities. Users who are interested in the

products with a variety of nice words and praise the user will make a payment by internet

banking  to transfer  money  or use  credit cards.  After  payment is made.  Products

purchased but not received as promised website products are sometimes no longer exists.

According to an article in Anjung pc.com, an estimated 90 billion e-mail spam sent every day

and 20% of which is related to product sales. E-mail spam is not good often contain words 

such as obscenities, sex, sweepstakes,  giving gifts of money and also offer unreasonable. E-

mail  to  spam  is the most dangerous  fraud.  As a result of  the impact of e-

mail fraud is causing loss of property and dignity, and also can cause loss of life.

2. Damage or  modifications to the  program or  computer  data: - Activities or software

developed to do things that are not desired on a computer system, network operating systems,

applications or  information stored. In other words it is  dangerous software  which can cause 

aggression and  modifications to the  network  or computer systems and

trespassing stored information leading to damage systems or information. Events that  had

occurred was recently in Malaysia where the hacker has to do the cyber attacks against

government websites have a big impact on the information technology systems. This site is

not accessible as usual. Many online business cannot be done, stop and interrupted. It causes

panic for a while to internet users.

3. Theft  of information: - Creating a common cybercrime in which user information is taken

and used for impersonation, extortion, fraud and others. Examples of common theft is

through spyware software, cyber criminals  to steal data from infected computers such as

Internet search trends and confidential information without the knowledge and consent of the

user. Examples of events that had happened was in Tokyo, May 3, 2011, in which the

Company SONY has been hacked and the criminals have stolen data from 25 million users of

their computer game system, www.soe.com (SONY Online Entertainment).

4. Unauthorized access to the system: - One of them is the 'Root Hits' in which they access

the administrator or "root access" to a computer network. The main activities performed by

7

Page 9: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

this software is the installation of 'backdoor' invasion of the log file, or observations on all

activities undertaken by a computer it infects. Steal data, record the movement of a computer 

keyboard and mouse, and steal internet users to find traces of confidential information such

as account names, account numbers, passwords and so on.

5. Copying software illegally: - Software that is better known by the word 'piracy'. This

software is copied and modified for use by hackers to obtain information or use the

software to earn money many times over without the permission of the manufacturer.

Usually  the software is copied  illegally  is not  linked with  automatic updating  system.

Software "piracy" cannot be updated or repaired online.

6. Espionage: - Cyber Crimes are frequently associated with security and military to obtain

weapons and military technologies. The threat of computer hackers usually can be done by

professionals, intelligence agencies, organized crime, the investigation agency, part-

timemedia and political extremists. The purpose of  the  criminal  wiretaps  were used to

blackmail, war crimes, buying illegal weapons or modify the stolen technology. Top anti-

terrorism adviser White House, John Brennan warned that espionage by foreign

governments, individuals or certain groups either hackers or terrorist organizations are very

complex and very  complicated. United States House of  representatives  approved a bill

designed to protect Internet and computer networks by funding research and training in cyber

security.

7. Cyber gambling: - Gambling is conducted in the Internet from all over the world. Betting

and  payments  made  online or  using  the  middle man as in the cyber café

that running illegal Internet gambling. Cyber gambling is also involved with the creation of 

sports  betting  conducted by the  'bookie' local or international. Events like that are

often involved in these cyber-betting and gambling is football. Many consumers are in debt,

especially those who borrow money from illegal loan sharks or 'along'.

8. Get rich quick scheme: - According to Wikipedia, a free encyclopedia that get rich quick

scheme is a scheme in which a sum of money be deposited or invested to the organizers

promise get rich quick scheme and provided that the deposit will be returned back with

interest or profits higher than what is offered by licensed financial institutions. There are

many types of get rich quick schemes that exist, such as pyramid schemes, Ponzi schemes

and in Malaysia, the Pak Man Telo. At the start of the scheme, the organizers using the

deposit money received to pay the principal of the return or the previous depositors.

8

Page 10: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Organizer of this rich quick schemes are not investing deposits received into the investmentor

profitable enterprises of the same or higher. As such, they cannot continue to bear the

high return of payments to existing investors. If no new depositors received, the scheme is

revoked. It will fail and the investors and depositors will lose their money.

9. Pornography: - A lot of cyber crimes undermine the moral and social youths in Malaysia.

Significant threat to the frequent occurrence of free sex, abandoned babies, children out of

wedlock, prostitution, incest, rape and violation. Showing pornography that sometimes

appear automatically in the website is accessed or viewed, and often a small link in a

certain web sites. This cyber crime have a big impact in the lives and culture of Malaysians,

especially Muslims.

10. Internet hackers: - Hacker is a person to create and modify computer software and

hardware, including computer programming, administration, and safety-related matters. The

term is usually carried connotations reliable but can be good or bad, depending on cultural

context.

11. Spread of the virus: - Viruses  are  malicious  code  that spread  aggressively  attack  by

infecting other files or programs in a specific host. The activation of this virus requires

human interaction as users of the system before it can act to damage a computer system

that successfully invaded. Spread of the virus from one host to another host can not happen

without interaction  from users of the system and also through the sharing of external data

storage devices.

COMPARISON OF CYBER CRIME IN MALAYSIA AND THE UNITED STATES

Malaysia to adopt democracy  and  an Islamic state to adopt civil law and sharia law for

Muslim people. Awareness of cyber crime often spread to people through the mass media

because of its detrimental effects that could threaten the individual, religion, society and

nation. In the U.S. they are very different way of life even adopt a similar pattern of

government.  Their  social life  more  independent of Malaysia.  The threat of cyber crime 

in the United States  deemed to occur  if they  threaten the  safety of 

individuals and  countries, but  not  to the  social and  community  life.

In Malaysia,  cyber crime  cases  will be handled by  CyberSecurity Malaysia  an

agency under the Ministry of Science, Technology and Innovation (MOSTI). CyberSecurity

Malaysia chief executive officer,  Lt. Col (R) Professor Dato 'Husin Jazri  said, Cyber 

9

Page 11: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Forensics  is  commonly used  to refer  to  Digital Forensics.  It is a  scientific  application 

in the examination  and analysis  done on the  digital storage  of materials  involved in 

criminal or civil  investigations.  Users who  lack  knowledge of  computer systems  at high

risk of  falling prey to computer crimes. CyberSecurity Malaysia's  role is to provide 

technical  assistance  to local authorities  in carrying out the analysis of digital evidence such

as computers,  mobile phones, cameras, games player, digital music  devices  and  digital 

equipment  related  portable  computers.

In the Utusan Malaysia newspaper, dated July 25, 2008, an article issued in Penang 

by Lee Boon Hooi  said,  of  6.167  cases of Internet  fraud  involving  RM63  million 

losses  reported in Malaysia  last year.  Increased  4 times  in 4 years  from 2007  to  only 

1.139  cases  recorded losses of  RM11.4  million. According to  a statement by the 

Internet  Crimes  Unit,  Criminal Investigation  Division and Multimedia Cyber, Commercial

Crime Investigation Department in Bukit Aman, Deputy Superintendent  Abdul  Majid 

Record  when presenting a paper  during the  seminar on  the theme  of

International Industrial Technology in Crime and Loss Prevention. Frequent cyber crime is

in  internet banking, VoIP (Voice Over Internet Protocol)  and  e-commerce. This cyber

crime involving fraud in an attempt to  obtain  personal information such as usernames,

account  numbers, personal identification numbers, passwords and credit card details  to

masquerade  as a trusted  entities  through electronic communications.

10

Page 12: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

MyCERT INCIDENT STATISTICS FOR THE YEAR 2011

11

Page 13: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

12

Page 14: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

13

Page 15: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Cyber crime cases in the United States is similar to what happened in Malaysia. Significant

difference is the pattern of life there are more open with a social system that is free. Norton

survey report, consumers in the United States was ranked No. 3 is 73%  of cyber-crime

victims  from around the world.  Reported  cyber crime  is difficult  because sometimes  the

case  involved  no  firm evidence. Chief  Cyber Security Counsel  Adam  Palmer  Norton 

stated that  many consumers  in the United States  failed  to report and covers the activities of

cybercriminals.

HOW TO ADDRESS THE CYBER CRIME?

There are a number of proposals have been issued to deal with cyber crimes are:

a)  Control and  censor  the entry  relating to  pornographic  websites.

b)  Government should formulate originally Malaysia Communications and Multimedia

14

Page 16: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

Act1998, Section 3 (3) in which the information in the internet which have negative

effects filtered.

c)  To formulate the  Bill  of  Guarantees  to  MSC status  foreign  investors  that Internet 

censorship  should be done.  Objectives and  purposes of  information  only  real

INVESTMENT  can be  brought in  via the internet,

d)  Increase the security level information based on development of current technology.

e)  To increase awareness among consumers about the ethical use of computers.

f) Increase the number of experts in the field of computer security by opening

more education  and job opportunities  in these areas.

g)  To formulate  cyber crime  laws  are  more strict  and efficient  with

assistance of  computer forensic  experts  in the investigation.

h)  International cooperation to combat cyber criminals, such as sharing  information  and

expertise.

CONCLUSION

Developments in ICT there will be no end if we look at how it began. Any time there is

discovery and innovation in computer technology equipment or software either. Similarly,

the crime is also growing cyber current trend for a specific individual requirements that are

beyond control. What needs to be actually the consciousness of every individual and

Internet users to always practice ethics in everyday life and always ready to deal with bad

elements who want to take the easy way and make money immediately. Online safety must

be increased just as we love ourselves. The effect of these cyber crimes that are generally not

seen as a physical but a great effect if it is allowed to occur without strict control.

15

Page 17: Assigment OUMH1203 English for Written Communication

OUMH1203 ENGLISH for WRITTEN COMMUNICATION

REFERENCE

1. http://ms.wikipedia.org/wiki/penjenayahsiber

2. http://www.CyberSecurity.my

3. http://utusan.com.my/search.asp?stype=kw&stv=jenayah+siber

4. http://hmetro.com.my/r?searchterm=jenayah+siber@carian=cari

5. http://www.bernama.com.my/bernama/vs/bm/searchindex.php?terms=jenayah

%20siber

6. http://www.fbi.gov

7. http://www.cia.gov

16