What is Cyber ​​Crime? Definition of Cyber ​​Crime

Daftar Isi [Tampil]
There are many definitions of cyber crime.  The term is often heard lately along with the development of the digital world.  Cyber ​​crime or crime in cyberspace itself is one of the negative impacts of the internet as a platform that is currently widely used.

 So, in order to get to know you more, here is a more complete review of the meaning of cyber crime, examples, and the types of cyber crimes that are often found.

 Definition of Cyber ​​Crime


 What is Cyber ​​Crime?  According to the Organization of European Community Development (OECD) cyber crime is all forms of illegal access to a data transmission.  That means, all forms of unauthorized activity in a computer system are included in a crime.

 In general, the definition of cyber crime itself is usually defined as a crime in the realm of cyberspace that utilizes computer technology and internet networks as targets.  As has been mentioned, this cybercrime appears in line with the increasing intensity of digital, communication and information technology

 Examples of Cyber ​​Crime Crime

 The following are examples of cyber crime cases that have occurred in Indonesia and in the world.

 1. Fake Someone's Facebook Account

 One of the most common examples of cyber crime is cloning someone's Facebook account.  This action is rife with public figures or well-known figures who have many followers.

 With the amount of attention that cloned accounts receive, forgers will usually find victims faster.  This cyber crime model usually asks for money to be paid by transfer to a certain account.  So, don't be fooled if you are contacted by someone who claims to be in need of help.

 2. The WannaCry Ransomware Phenomenon

 Several years ago, the digital world was enlivened by the emergence of the WannaCry Ransomware computer virus which was able to lock someone's computer data.  To be able to open and access the data, all you have to do is bring a certain amount of ransom through your Bitcoin wallet.

 3. Catfishing on Dating Apps and Social Media

 The difference with account cloning is that catfishing uses other people's photos but their identities are fake identities.

 You can usually find this on dating apps or on social media.  Well, the purpose of this catfishing is to deceive.

 The losses caused can range from psychological to material losses.

 4. Doxxing and Cyberbullying

 Doxxing that leads to cyberbullying is a very dangerous thing.  This is an activity of taking personal data and distributing it on the internet.

 The purposes of this doxxing vary.  Starting from as a bluff, threats, humiliation to blackmail.

 Types of Cyber ​​Crime

 After knowing about the definition of cyber crime and examples of cases, the following are the types of cyber crime that are common in the world.

 1. Data Theft

 This cyber crime activity is usually carried out to fulfill commercial interests because there are other parties who want other parties' confidential data.  This action is certainly illegal to enter into criminal activity because it can cause material losses that lead to the bankruptcy of an institution or company.

 2. Cyber ​​Terrorism

 Cyber ​​terrorism is an act of cyber crime that is being fought by many major countries in the world, including Indonesia.  The reason is that cyber terrorism activities often threaten the safety of citizens or even stakeholders who regulate the running of the government.

 3. Hacking

 The next type of cyber crime is Hacking.  Dangerous actions that are often carried out by professional programmers are usually specifically targeting weaknesses or loopholes in the security system for material gain or personal satisfaction.

 If you look at the activities carried out, hacking actually does not always have a bad connotation because there are also positive hackers who use their abilities for useful and not harmful activities.

 For example, a hacker who is given the task of tracking down the whereabouts of a fugitive or a hacker who cooperates with the authorities to eradicate illegal activities in the digital realm.

 Also read: What is Web Phishing?  Here's How It Works and Tips To Avoid It

 4. Carding

 Carding is a term used to describe the misuse of other people's credit card information.  Carders usually use other people's credit card access to buy groceries online.  Then, the free stuff is resold at a low price for money.

 Digital crimes by means of carding usually often occur abroad, while for users in Indonesia the number of recorded cases is not too large as there are still few credit card users who like to transact in cyberspace.

 5. Defacing

 Among previous cyber crimes, Defacing is arguably the lightest online crime activity.  One of the reasons for this is because defacers usually target non-profit websites such as government, school, or university websites.

 6. Cybersquatting

 The term cybersquatting may not be so familiar among users in the country.  It is natural because the act of stealing a domain name itself does require capital and foresight which not many people have.  The results of this cyber crime are usually in the form of ransom money whose value is not fair.

 7. Cyber ​​Typosquatting

 Almost similar to cybersquatting, cyber typosquatting is both targeting domain names belonging to well-known companies to be targeted.  The difference is, this activity takes advantage of the similarity of domain names and the negligence of users who rarely re-check the company's website URL.

 One of the goals of cyber typosquatting is to destroy the good image of the brand concerned by committing fraudulent acts or other illegal things that violate the law.

 8. Spreading Illegal Content

 Spreading illegal content that violates the law has become the most attention-grabbing cyber crime case.  The reason is, this activity usually involves famous figures or content that is able to provoke controversy.

 Some examples of illegal content that fall into the realm of cyber crime include pornographic videos, sale of illegal firearms, buying and selling of narcotics, and so on.

 9. Malware

 As we explained in the article about the dangers of malware, you have to be more careful if you don't want your computer or website to experience problems.  In general, malware consists of various types, there are viruses, trojan horses, adware, worms, browser hijackers, and so on.

 Cyber ​​Crime Method

 1. Sniffing

 This is a method that threatens the security of cyber networks.  In the context of network security, a sniffing attack or sniffer attack is equivalent to the theft or interception of data by collecting network traffic through a packet sniffer (an application intended to capture network packets).

 2. Destructive devices

 Cybercrime that aims to damage the device by using the media of a virus that is inserted into a program.

 3. Password Cracker

 This is an activity to hack or break other people's passwords.  To do this, the perpetrator will use software to decrypt the program or password.

 4. Distributed Denial of Attacks (DDoS)

 DDoS (Distributed Denial of Service) attack is a type of distributed network attack.  This form of attack takes advantage of the limited capacity of network resources, such as the infrastructure that supports corporate websites.

 A DDoS attack will make multiple requests to targeted online resources to overwhelm the website's capacity to handle multiple requests and prevent them from working properly.


 Spoofing is the act of misrepresenting a message from an unknown source as coming from a known and trustworthy source.

 In its simplest form, spoofing can be a computer impersonating an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server, or even as complex as a computer spoofing an IP address, ARP, or DNS server.

 How to Overcome Cyber ​​Crime


 1. Making Laws

 The most elegant way to prevent cyber crime from becoming more rampant is to make regulations that are included in the law.  Law enforcement will later make cyber crime perpetrators think long before committing a criminal act because the legal basis is clear.

 In Indonesia, the rules regarding cyber crime are currently based on the ITE Law.  However, unfortunately the pattern of enforcement is still not optimal and often seems forced.  Law enforcement in the realm of cyberspace is still gray because electronic documents themselves cannot be used as evidence by the Criminal Code.

 2. Establish a Special Handling Agency

 You are certainly no stranger to the Cyber ​​Crime Division of the Police Headquarters.  Now, we need a special institution like that to prevent and investigate the potential for crime in the digital realm.

 Several countries are noted to have started to apply this concept by establishing special institutions that deal with cyber crime issues, however this will only be effective if implemented by many countries, so that there is no gap for cybercriminals wherever they are.

 3. Strengthening the System

 System security is the first bastion that we can rely on to avoid potential cyber crime.  To secure the system independently, you can add some add-ons such as SSL Certificate on the website, computer antivirus, to perform physical security on the network to protect the server.

 Apart from that, if you have a business website, make sure to use the Indonesian VPS service from Qwords.com which is equipped with various modern technologies.  As a result, cyber crimes such as malware or defacing can be minimized.

 Conclusion

 That is a brief explanation of the meaning of cyber crime, the types of crime, and how to overcome them.  Currently cyber crime activity is increasing rapidly when compared to a few years ago when the internet did not have many users.

 By knowing the information above, hopefully you can be more vigilant so that the crimes that occur in this virtual world do not happen to you at any time.

 Thank You

0 Comments

PROHIBITED: Spam Comments, Promotions, Dirty Words, Insulting - Please give feedback so this blog can be even better

Post Terbaru