Daftar Isi [Tampil]
There are many definitions of cyber crime. The term is often heard lately along with the development of the digital world. Cyber crime or crime in cyberspace itself is one of the negative impacts of the internet as a platform that is currently widely used.
So, in order to get to know you more, here is a more complete review of the meaning of cyber crime, examples, and the types of cyber crimes that are often found.
Definition of Cyber Crime
What is Cyber Crime? According to the Organization of European Community Development (OECD) cyber crime is all forms of illegal access to a data transmission. That means, all forms of unauthorized activity in a computer system are included in a crime.
In general, the definition of cyber crime itself is usually defined as a crime in the realm of cyberspace that utilizes computer technology and internet networks as targets. As has been mentioned, this cybercrime appears in line with the increasing intensity of digital, communication and information technology
Examples of Cyber Crime Crime
The following are examples of cyber crime cases that have occurred in Indonesia and in the world.
1. Fake Someone's Facebook Account
One of the most common examples of cyber crime is cloning someone's Facebook account. This action is rife with public figures or well-known figures who have many followers.
With the amount of attention that cloned accounts receive, forgers will usually find victims faster. This cyber crime model usually asks for money to be paid by transfer to a certain account. So, don't be fooled if you are contacted by someone who claims to be in need of help.
2. The WannaCry Ransomware Phenomenon
Several years ago, the digital world was enlivened by the emergence of the WannaCry Ransomware computer virus which was able to lock someone's computer data. To be able to open and access the data, all you have to do is bring a certain amount of ransom through your Bitcoin wallet.
3. Catfishing on Dating Apps and Social Media
The difference with account cloning is that catfishing uses other people's photos but their identities are fake identities.
You can usually find this on dating apps or on social media. Well, the purpose of this catfishing is to deceive.
The losses caused can range from psychological to material losses.
4. Doxxing and Cyberbullying
Doxxing that leads to cyberbullying is a very dangerous thing. This is an activity of taking personal data and distributing it on the internet.
The purposes of this doxxing vary. Starting from as a bluff, threats, humiliation to blackmail.
Types of Cyber Crime
After knowing about the definition of cyber crime and examples of cases, the following are the types of cyber crime that are common in the world.
1. Data Theft
This cyber crime activity is usually carried out to fulfill commercial interests because there are other parties who want other parties' confidential data. This action is certainly illegal to enter into criminal activity because it can cause material losses that lead to the bankruptcy of an institution or company.
2. Cyber Terrorism
Cyber terrorism is an act of cyber crime that is being fought by many major countries in the world, including Indonesia. The reason is that cyber terrorism activities often threaten the safety of citizens or even stakeholders who regulate the running of the government.
3. Hacking
The next type of cyber crime is Hacking. Dangerous actions that are often carried out by professional programmers are usually specifically targeting weaknesses or loopholes in the security system for material gain or personal satisfaction.
If you look at the activities carried out, hacking actually does not always have a bad connotation because there are also positive hackers who use their abilities for useful and not harmful activities.
For example, a hacker who is given the task of tracking down the whereabouts of a fugitive or a hacker who cooperates with the authorities to eradicate illegal activities in the digital realm.
Also read: What is Web Phishing? Here's How It Works and Tips To Avoid It
4. Carding
Carding is a term used to describe the misuse of other people's credit card information. Carders usually use other people's credit card access to buy groceries online. Then, the free stuff is resold at a low price for money.
Digital crimes by means of carding usually often occur abroad, while for users in Indonesia the number of recorded cases is not too large as there are still few credit card users who like to transact in cyberspace.
5. Defacing
Among previous cyber crimes, Defacing is arguably the lightest online crime activity. One of the reasons for this is because defacers usually target non-profit websites such as government, school, or university websites.
6. Cybersquatting
The term cybersquatting may not be so familiar among users in the country. It is natural because the act of stealing a domain name itself does require capital and foresight which not many people have. The results of this cyber crime are usually in the form of ransom money whose value is not fair.
7. Cyber Typosquatting
Almost similar to cybersquatting, cyber typosquatting is both targeting domain names belonging to well-known companies to be targeted. The difference is, this activity takes advantage of the similarity of domain names and the negligence of users who rarely re-check the company's website URL.
One of the goals of cyber typosquatting is to destroy the good image of the brand concerned by committing fraudulent acts or other illegal things that violate the law.
8. Spreading Illegal Content
Spreading illegal content that violates the law has become the most attention-grabbing cyber crime case. The reason is, this activity usually involves famous figures or content that is able to provoke controversy.
Some examples of illegal content that fall into the realm of cyber crime include pornographic videos, sale of illegal firearms, buying and selling of narcotics, and so on.
9. Malware
As we explained in the article about the dangers of malware, you have to be more careful if you don't want your computer or website to experience problems. In general, malware consists of various types, there are viruses, trojan horses, adware, worms, browser hijackers, and so on.
Cyber Crime Method
1. Sniffing
This is a method that threatens the security of cyber networks. In the context of network security, a sniffing attack or sniffer attack is equivalent to the theft or interception of data by collecting network traffic through a packet sniffer (an application intended to capture network packets).
2. Destructive devices
Cybercrime that aims to damage the device by using the media of a virus that is inserted into a program.
3. Password Cracker
This is an activity to hack or break other people's passwords. To do this, the perpetrator will use software to decrypt the program or password.
4. Distributed Denial of Attacks (DDoS)
DDoS (Distributed Denial of Service) attack is a type of distributed network attack. This form of attack takes advantage of the limited capacity of network resources, such as the infrastructure that supports corporate websites.
A DDoS attack will make multiple requests to targeted online resources to overwhelm the website's capacity to handle multiple requests and prevent them from working properly.
5. Spoofing
Spoofing is the act of misrepresenting a message from an unknown source as coming from a known and trustworthy source.
In its simplest form, spoofing can be a computer impersonating an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server, or even as complex as a computer spoofing an IP address, ARP, or DNS server.
How to Overcome Cyber Crime
1. Making Laws
The most elegant way to prevent cyber crime from becoming more rampant is to make regulations that are included in the law. Law enforcement will later make cyber crime perpetrators think long before committing a criminal act because the legal basis is clear.
In Indonesia, the rules regarding cyber crime are currently based on the ITE Law. However, unfortunately the pattern of enforcement is still not optimal and often seems forced. Law enforcement in the realm of cyberspace is still gray because electronic documents themselves cannot be used as evidence by the Criminal Code.
2. Establish a Special Handling Agency
You are certainly no stranger to the Cyber Crime Division of the Police Headquarters. Now, we need a special institution like that to prevent and investigate the potential for crime in the digital realm.
Several countries are noted to have started to apply this concept by establishing special institutions that deal with cyber crime issues, however this will only be effective if implemented by many countries, so that there is no gap for cybercriminals wherever they are.
3. Strengthening the System
System security is the first bastion that we can rely on to avoid potential cyber crime. To secure the system independently, you can add some add-ons such as SSL Certificate on the website, computer antivirus, to perform physical security on the network to protect the server.
Apart from that, if you have a business website, make sure to use the Indonesian VPS service from Qwords.com which is equipped with various modern technologies. As a result, cyber crimes such as malware or defacing can be minimized.
Conclusion
That is a brief explanation of the meaning of cyber crime, the types of crime, and how to overcome them. Currently cyber crime activity is increasing rapidly when compared to a few years ago when the internet did not have many users.
By knowing the information above, hopefully you can be more vigilant so that the crimes that occur in this virtual world do not happen to you at any time.
Thank You
0 Comments
PROHIBITED: Spam Comments, Promotions, Dirty Words, Insulting - Please give feedback so this blog can be even better