7. cyber law & computer crimes

40
INTRODUCTION TO ICT CYBER LAW

description

 

Transcript of 7. cyber law & computer crimes

Page 1: 7. cyber law & computer crimes

INTRODUCTION TO ICT

CYBER LAW

Page 2: 7. cyber law & computer crimes

PENGENALAN KEPADA ICT

UNDANG-UNDANG SIBER

Page 3: 7. cyber law & computer crimes

CYBER LAWWhat is Cyber Law? Cyber law refers to any laws relating to protecting the

Internet and other online communication technologies.

NEEDS FOR CYBER LAW In the recent years, many concerns and issues were

raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.

Page 4: 7. cyber law & computer crimes

UNDANG-UNDANG SIBERApa itu undang-undang siber? Undang-undang siber merujuk kepada mana-mana undang-

undang yang berkaitan dengan melindungi internet dan teknologi komunikasi yang lain.

KEPERLUAN TERHADAP UNDANG-UNDANG SIBER Dalam beberapa tahun ini, ramai bimbang dan banyak isu telah

meningkat terhadap keutuhan dan keselamatan maklumat, status kesahan transaksi atas talian, kerahsiaan dan kesulitan bagi maklumat, undang-undang harta intelek dan keselamatan bagi data kerajaan di internet.

Page 5: 7. cyber law & computer crimes

CYBER LAW

Page 6: 7. cyber law & computer crimes

CYBER LAW

Undang-undang Siber

Keutuhan dan Keselamatan Maklumat

Status Sah Transaksi Atas Talian

Kerahsiaan dan Kesulitan Maklumat

Keselamatan Data Kerajaan

Undang-undang Harta Intelek

Page 7: 7. cyber law & computer crimes

THE CYBER LAW ACTS IN MALAYSIA

The Malaysian Government has already passed several cyber laws to control and reduce the Internet abuse.

These cyber laws include:– Digital Signature Act 1997– Computer Crimes Act 1997– Telemedicine Act 1997– Communications and Multimedia Act 1998

Beside these cyber laws, there are three other cyber laws being drafted.– Private Data Protection Bill– Electronic Government Activities Bill– Electronic Transactions Bill

Page 8: 7. cyber law & computer crimes

AKTA UNDANG-UNDANG SIBER DI MALAYSIA

Kerajaan Malaysia telah menyediakan beberapa undang-undang siber bagi mengawal dan mengurangkan penyalahgunaan internet.

Undang-undang siber termasuklah:– Akta Tandatangan Digital 1997– Akta Jenayah Komputer 1997– Akta Teleperubatan 1997– Akta Komunikasi dan Multimedia 1998

Disamping undang-undang siber ini, terdapat tiga undang-undang siber lagi yang sedang dipinda.– Bil Perlindungan Data Peribadi– Bil Elektronik Aktiviti Kerajaan– Bil Transaksi Elektronik

Page 9: 7. cyber law & computer crimes

THE CYBER LAW ACTS IN MALAYSIA

1) DIGITAL SIGNATURE ACT 1997 The Digital Signature Act 1997 secures

electronic communications especially on the Internet.

Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message.

By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.

Page 10: 7. cyber law & computer crimes

AKTA UNDANG-UNDANG SIBER DI MALAYSIA

1) AKTA TANDATANGAN DIGITAL 1997 Akta Tandatangan Digital 1997 melindungi

komunikasi elektronik terutamanya di internet.

Tandatangan Digital adalah standard pengesahan identiti yang menggunakan teknik pengkripan bagi melindungi daripada pemalsuan e-mail. Kon yang dikripkan mengandungi nama pengguna dan pengolahan bagi semua bahagian mesej.

Dengan memasang tandatangan digital, kita dapat memastikan tiada sesiapa dapat mengintip, memintas atau merosakkan data yang dihantar.

Page 11: 7. cyber law & computer crimes

THE CYBER LAW ACTS IN MALAYSIA

2) COMPUTER CRIMES ACT 1997 The Computer Crimes Act 1997 gives protection against the

misuses of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks.

By implementing the Computer Crimes Act 1997, users can protect their rights to privacy and build trust in the computer system. At the same time, the government can have control at a certain level over cyberspace to reduce cyber crime activities.

Page 12: 7. cyber law & computer crimes

AKTA UNDANG-UNDANG SIBER DI MALAYSIA

2) AKTA JENAYAH KOMPUTER 1997 Akta Jenayah Komputer 1997 melindungi daripada

penyalahgunaan komputer dan aktiviti jenayah komputer seperti penggunaan program komputer tanpa kebenaran, transmisi tidak sah data atau mesej menerusi komputer dan pengodaman sistem dan rangkaian komputer.

Dengan melaksanakan Akta Jenayah Komputer 1997, pengguna boleh melindungi hak-hak untuk kerahsiaan dan membina kepercayaan terhadap sistem komputer. Pada masa yang sama, kerajaan boleh mengawal pada tahap tertentu menerusi ruang siber bagi mengurangkan aktiviti jenayah komputer.

Page 13: 7. cyber law & computer crimes

THE CYBER LAW ACTS IN MALAYSIA

3) TELEMEDICINE ACT 1997 The Telemedicine Act 1997 ensures that only

qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected.

These act provides the future development and delivery of healthcare in Malaysia.

Page 14: 7. cyber law & computer crimes

AKTA UNDANG-UNDANG SIBER DI MALAYSIA

3) AKTA TELEPERUBATAN 1997 Akta Teleperubatan 1997 memastikan hanya

pengamal perubatan yang berkelayakkan boleh mengamalkan teleperubatan dan dengan itu hak-hak dan keinginan pesakit mereka dilindungi.

Akta ini menyediakan pembangunan masa hadapan penyelamatan bagi penjagaan kesihatan di Malaysia.

Page 15: 7. cyber law & computer crimes

THE CYBER LAW ACTS IN MALAYSIA

4) COMMUNICATIONS AND MULTIMEDIA ACT 1998

The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.

This Act also ensures high level of user's confidence in the information and communication technology industry.

Page 16: 7. cyber law & computer crimes

AKTA UNDANG-UNDANG SIBER DI MALAYSIA

4) AKTA KOMUNIKASI DAN MULTIMEDIA 1998

Perlaksanaan Akta Komunikasi dan Multimedia 1998 memastikan keselamatan bagi maklumat, rangkaian dipercayai dan kemampuan perkhidmatan di seluruh Malaysia.

Akta ini juga bagi memastikan keyakinan pengguna pada tahap yang tinggi di dalam industri teknologi maklumat dan komunikasi.

Page 17: 7. cyber law & computer crimes

INTRODUCTION TO ICT

COMPUTER CRIMES

Page 18: 7. cyber law & computer crimes

PENGENALAN KEPADA ICT

JENAYAH-JENAYAH KOMPUTER

Page 19: 7. cyber law & computer crimes

COMPUTER CRIMES

COMPUTER CRIMES DEFINITIONA computer crime is defined as any criminal

activity that is related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.

Page 20: 7. cyber law & computer crimes

JENAYAH-JENAYAH KOMPUTER

DEFINISI JENAYAH KOMPUTERJenayah komputer didefinisikan sebagai

aktiviti jenayah yang berkaitan dengan penggunaan komputer. Aktiviti ini termasuklah penipuan, pelanggaran hak cipta, kecurian komputer dan serangan komputer.

Page 21: 7. cyber law & computer crimes

COMPUTER CRIMES

1) COMPUTER FRAUD Computer fraud is defined as having an intention to take

advantage over or causing loss to other people, mainly on monetary basis through the use of computers.

There are many forms of computer fraud which include e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields.

Students need to be aware of other computer frauds such as health frauds, scams and hacking. Students will also most likely get false information while researching information on the Internet.

Page 22: 7. cyber law & computer crimes

JENAYAH-JENAYAH KOMPUTER

1) PENIPUAN COMPUTER Penipuan komputer didefinisikan sebagai mempunyai niat

untuk mengambil keuntungan atau menyebabkan kehilangan kepada orang lain, terutamanya yang melibatkan kewangan menerusi penggunaan komputer.

Terdapat pelbagai bentuk penipuan komputer termasuklah penipuan e-mail, penipuan program, skema pelaburan, promosi jualan dan tuntutan kepakaran bagi lapangan tertentu.

Pelajar perlu berhati-hati terhadap penipuan komputer yang lain seperti penipuan kesihatan, pengkomplotan dan penggodaman. Pelajar akan selalunya mendapat maklumat yang salah apabila mencari maklumat di internet.

Page 23: 7. cyber law & computer crimes

COMPUTER CRIMES

2) COPYRIGHT INFRINGEMENT Copyright infringement is defined as a violation of

the rights secured by a copyright. Copyright infringement involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal.

With the current technology, the most perfect copy of the original copy can be downloaded from the internet.

Page 24: 7. cyber law & computer crimes

JENAYAH-JENAYAH KOMPUTER

2) PELANGGARAN HAK CIPTA Pelanggaran hak cipta didefinisikan sebagai

pencabulan terhadap perlindungan hak oleh sebuah hak cipta. Pelanggaran hak cipta melibatkan salinan tidak sah (haram) atau pengeluaran semula bahan-bahan hak cipta oleh kumpulan pasaran gelap. Penjualan terbuka secara komersial bagi item cetak rompak juga adalah salah di sisi undang-undang.

Dengan teknologi yang terkini, salinan yang paling sempurna bagi salinan original boleh dimuat turun dari internet.

Page 25: 7. cyber law & computer crimes

COMPUTER CRIMES

3) COMPUTER THEFT Computer theft is defined as the unauthorised use of

another person’s property with the intention to deny the owner the rightful possession of that property or its use.

Examples of computer theft include:– transfer of payments to the wrong accounts– tap into data transmission lines on database at no

cost– divert goods to the wrong destination

Page 26: 7. cyber law & computer crimes

JENAYAH-JENAYAH KOMPUTER

3) KECURIAN KOMPUTER Kecurian komputer didefinisikan sebagai

penggunaan tanpa kebenaran milikan orang lain dengan niat untuk menafikan hak-hak milikan pemilik terhadap harta atau kegunaannya.

Contoh bagi kecurian komputer termasuklah:– Pemindahan pembayaran ke akaun yang salah– Memasuki ke talian penghantaran data pada

pangkalan data tanpa sebarang kos atau pembayaran.

– Mengalihkan peralatan ke destinasi yang salah.

Page 27: 7. cyber law & computer crimes

COMPUTER CRIMES

4) COMPUTER ATTACK Computer attack may be defined as any activities taken to

disrupt the equipment of computer systems, change processing control or corrupt stored data.

Computer attack can be in the forms of:– physical attack that disrupt the computer facility or its

transmission lines.– an electronic attack that uses the power of electromagnetic

energy to overload computer circuitry.– a computer network attack that uses a malicious code to

exploit a weakness in software, or in the computer security practices of a computer user

Page 28: 7. cyber law & computer crimes

JENAYAH-JENAYAH KOMPUTER

4) SERANGAN KOMPUTER Serangan komputer didefinisikan sebagai aktiviti yang

dilakukan bagi menganggu peralatan sistem komputer, mengubah kawalan pemprosessan atau merosakkan data yang disimpan.

Serangan komputer boleh terdapat dalam beberapa keadaan:– Serangan fizikal yang menganggu kemudahan komputer atau

talian transmisinya.– Serangan elektronik yang menggunakan tenaga

elektromagnetik bagi merosakkan litar-litar komputer.– Serangan rangkaian komputer yang menggunakan kod

malicious bagi mengeksploitasi kelemahan di dalam perisian atau amalan keselamatan komputer bagi pengguna komputer.

Page 29: 7. cyber law & computer crimes

INTRODUCTION TO ICT

COMPUTER SECURITY

Page 30: 7. cyber law & computer crimes

PENGENALAN KEPADA ICT

KESELAMATAN KOMPUTER

Page 31: 7. cyber law & computer crimes

COMPUTER SECURITY

DEFINITION OF COMPUTER SECURITY Computer security means protecting our computer systems

and the information they contain against unwanted access, damage, destruction or modification.

We need to protect our computer from any intruders such as hackers, crackers and script kiddie.

TYPES OF COMPUTER SECURITY Three types of computer security are:a) hardware securityb) software security/data securityc) network security

Page 32: 7. cyber law & computer crimes

KESELAMATAN KOMPUTER

DEFINISI KESELAMATAN KOMPUTER Keselamatan komputer bermaksud melindungi sistem

komputer dan maklumat kita daripada akses yang tidak dikehendaki, kerosakkan, pemusnahan dan pengubahsuaian.

Kita perlu melindungi komputer kita daripada sebarang pencerobohan seperti pengodam, cracker dan script kiddie.

JENIS-JENIS KESELAMATAN KOMPUTER Terdapat tiga jenis keselamatan komputer iaitu:a) Keselamatan perkakasanb) Keselamatan perisian/keselamatan datac) Keselamatan rangkaian

Page 33: 7. cyber law & computer crimes

TYPES OF COMPUTER SECURITY

a) HARDWARE SECURITYHardware security refers to security

measures used to protect the hardware specifically the computer and its related documents.

The examples of security measures used to protect the hardware include PC-locks, keyboard-locks, smart cards and biometric devices.

Page 34: 7. cyber law & computer crimes

JENIS-JENIS KESELAMATAN KOMPUTER

a) KESELAMATAN PERKAKASANKeselamatan perkakasan merujuk kepada

pengukuran keselamatan yang digunakan untuk melindungi perkakasan terutamanya komputer dan dokumen-dokumen yang berkaitan.

Contoh bagi pengukuran keselamatan yang digunakan bagi melindungi perkakasan termasuklah PC-locks, keyboard-locks, kad pintar dan peralatan biometrik.

Page 35: 7. cyber law & computer crimes

TYPES OF COMPUTER SECURITY

b) SOFTWARE AND DATA SECURITY Software and data security refers to the security

measures used to protect the software and the loss of data files.

Examples of security measures used to protect the software are activation code and serial number.

An example of security measure used to protect the loss of data files is the disaster recovery plan method. The idea of this plan is to store data, program and other important documents in a safe place that will not be affected by any major destruction.

Page 36: 7. cyber law & computer crimes

JENIS-JENIS KESELAMATAN KOMPUTER

b) KESELAMATAN PERISIAN DAN DATA Keselamatan perisian dan data merujuk kepada pengukuran

keselamatan yang digunakan bagi melindungi perisian dan kehilangan fail-fail data.

Contoh bagi pengukuran keselamatan yang digunakan bagi melindungi perisian adalah kod pengaktifan dan nombor siri.

Contoh bagi pengukuran keselamatan yang digunakan bagi melindungi kehilangan data adalah dengan kaedah pelan pemulihan semula kemusnahan. Idea bagi pelan ini adalah dengan menyimpan data, program dan dokumen penting yang lain di tempat yang selamat yang tidak akan dijejaskan oleh kemusnahan besar-besaran.

Page 37: 7. cyber law & computer crimes

TYPES OF COMPUTER SECURITY

c) NETWORK SECURITY The transfer of data through network has become a

common practice and the need to implement network security has become significant.

Network security refers to security measures used to protect the network system. One example of network security measures is firewall. With firewall, network resources can be protected from the outsiders.

Page 38: 7. cyber law & computer crimes

JENIS-JENIS KESELAMATAN KOMPUTER

c) KESELAMATAN RANGKAIAN Penghantaran data menerusi rangkaian telah menjadi

amalan biasa dan keperluan untuk melaksanakan keselamatan rangkaian telah menjadi satu keperluan.

Keselamatan rangkaian merujuk kepada pengukuran keselamatan yang digunakan bagi melindungi sistem rangkaian. Satu contoh bagi pengukuran keselamatan rangkaian adalah firewall. Dengan firewall, sumber-sumber rangkaian boleh dilindungi daripada orang luar.

Page 39: 7. cyber law & computer crimes

PERSONAL COMPUTER SECURITY CHECKLIST

In order to make sure our computers are secured, here are the computer security checklist to follow.Do not eat, drink or smoke near the computerDo not place the computer near open windows or doorsDo not subject the computer to extreme temperaturesClean the equipment regularlyPlace a cable lock on the computerUse a surge protectorStore disks properly in a locked containerMaintain backup copies of all filesStores copies of critical files off sitesScan a floppy disk before you open itDo not open any unknown email received

Page 40: 7. cyber law & computer crimes

SENARAI SEMAK KESELAMATAN KOMPUTER PERIBADI

Bagi memastikan komputer kita dilindungi, di sini adalah senarai semak keselamatan komputer yang perlu diikuti. Jangan makan, minum atau merokok berhampiran komputer Jangan menempatkan komputer berdekatan tingkap atau pintu yang

terbuka Jangan menggunakan komputer pada suhu yang melampauBersihkan peralatan dengan kerapTempatkan kabel pengunci pada komputerGunakan pelindung habaSimpan disk dengan baik di dalam bekas berkunciKekalkan salinan sokongan bagi semua failSimpan salinan bagi fail kritikal secara tertutup Imbas disket sebelum kamu membukanya Jangan buka sebarang e-mail tidak dikenali yang diterima