Professional Documents
Culture Documents
Ethics, Cyber Laws & Cyber Crime: October 23, 2012
Ethics, Cyber Laws & Cyber Crime: October 23, 2012
]
Continues ….
Malaysia’s strategy for moving into the
Information Age was announced in 1996
ICT-related activities would be at the core of
the new engine of growth.
A number of cyber-laws were proposed. The
Malaysian Communications and Multimedia
Act 1998 (CMA 98) was a key legislation to
facilitate the growth of convergence
activities.
What is “CYBER”
No standard definition.
Used to describe the virtual world of computers e.g. an
object in cyberspace refers to a block of data floating
around a computer system or network.
The word "cyberspace" is credited to William Gibson, who
used it in his book, Neuromancer, written in 1984.
(source http://www.sharpened.net)
cyberspace: The impression of space and community
formed by computers, computer networks, and their users;
the virtual "world" that Internet users inhabit when they are
online.
(source : http://www.atis.org/tg2k/_cyberspace.html)
What is “Cyber crime”?
“Crime committed over the Internet” – The Oxford
Reference Online
“Crime as any crime that is committed by means of
special knowledge or expert use of computer
technology” - The Encyclopedia Britannica
“Any illegal act involving a computer, its systems, or
its applications” - Kelly R. Burke, District Attorney,
Houston Judicial Circuit
“Any illegal act committed using a computer network
(especially the Internet)” – Debra Littlejohn Shinder,
MCSE.
Any crime committed through the computer networks
using software, application, network service and know
how – Ashwar Aziz LL.B
Types of Cyber Crime
Network unauthorized access & penetration
Theft of proprietary information
Financial fraud using computers, internet
Sabotage of data or networks
Disruption of network
Creation and distribution of computer viruses
Software, intellectual property piracy
Identity theft
Terrorism
CYBERLAW
“…REFERS TO ALL THE LEGAL AND
REGULATORY ASPECTS OF Internet and
the World Wide Web. Anything concerned
with or related to or emanating from any
legal aspects or issues concerning any
activity of netizens in and concerning
Cyberspace comes within the ambit of
Cyberlaw.”
Continues ….
OBJECTIVES
To provide a comprehensive framework of societal
and commerce - enabling laws which encompass
aspects concerning security of information and
network integrity and reliability
To create the right development of the
communication and multimedia industry and to
position Malaysia as a major hub for the
communications and multimedia information and
content services
MALAYSIA’S ICT LEGAL FRAMEWORK
The The Computer The
Telemedicine Crimes Act 1997 Communication
Act 1997 and Multimedia
Act (1998)
Computer is incidental
Motivation
• Greed
• Revenge
• Ego
Method
• Can strike from ANYWHERE
• Information only commodity that can be stolen without being
taken!
TREND- New Millenium
The new millennium has created big challenges to
enforcement agencies whereby the modus of operation
(M.O) has become more sophisticated.
Cross border
Anonymity
Easy money
Trans-border
Benefits of enacting cyber laws
Business can operate within framework that
specifies the legal status of digital transactions
and property rights and minimize conflict
Consumer obtain protection against new types of
infringements of their consumer and privacy rights,
and thus build the necessary trust to use new
applications
Government can maintain the necessary amount
of control over “cyberspace” to ensure that public
interest objectives are met and that cyber crime is
minimized.
FUTURE CHALLENGES
Hacking skills being combined with criminal intent
(Syndicates) such as website sabotage/ database
‘kidnapping’ or even cyber-terrorism. Eg. Botnets
E-Banking Fraud, on a more wider and systematic
scale. Attack on E-commerce websites.
Telecommunication line theft.
Criminals linked via networks, worldwide. Eg.
Cryptography
Wi-Fi implementation. Identification issue.
3G (next 3.5G) digital telephone technology The wider
and more rapid online distribution of illegal material .
Phone Viruses: Lasco.A, Cabir.H etc.
CONCLUSION
Threats of cyber crime is left unchecked will
be disastrous on the nation, society,
economy and security.
It is the collective responsibility of all to
ensure that technology is not abused.
Be a disciplined user.
Case Study
Negarakuku 我爱我的国家 by
NAMEWEE - www.namewee.com
Isu
Bidang kuasa statut Malaysia
tertakhluk dalam Malaysia sahaja.
Lagu Negaraku di duplicate dari
lagu “Mamula Moon”