oumh1203 written

Upload: mohamad-zahari-abu-bakar

Post on 14-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Oumh1203 Written

    1/8

    FAKULTI PENDIDIKAN DAN BAHASA

    SEMESTER SEPT/2011

    OUMH 1203

    ENGLISH FOR WRITTEN COMMUNICATION

    NO. MATRIKULASI : 810214065665011

    NO. KAD PENGENALAN : 810214-06-5665NO. TELEFON : 012-7144542

    E-MEL : [email protected]

    PUSAT PEMBELAJARAN : JOHOR BAHRU LEARNING CENTRE

    NAMA TUTOR : PN FAZIAH ABDUL KARIM

  • 7/30/2019 Oumh1203 Written

    2/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    Abstract:

    yber crime is rampant in our country. Whether we realize it or not, crime is becoming more

    common in many fields including banking, entertainment areas, the field of

    entrepreneurship and so on. The government also has a lot to use all the expertise and

    collaboration with other countries to prevent this from cyber criminals continue to commit these

    illegal activities. This work provides information on how cyber crime is discussed in detail,

    including the characteristics of cyber crime and how to prevent these crimes from further

    damaging the world.

    This task also requires me to compare cyber crime in the U.S. and then see the similarities in

    Malaysia. I also had the opportunity to see the statistics of cyber crime on the website of the

    authorities like the FBI found a body in the United preventing this crime occurred.

    C

  • 7/30/2019 Oumh1203 Written

    3/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    Table of Contents

    Introduction

    I. The definition and the scope of cyber crimes

    II. Classification of cyber crimes

    III. Comparison of cyber crimes in Malaysia and USA

    IV. Suggestion

    Conclusion

  • 7/30/2019 Oumh1203 Written

    4/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    The definition and the scope of cyber crimes

    yber according to www.dictionary.com is a combining form meaning computer,

    computernetwork, or virtual reality, used in the formation of compound words(cybertalk; cyberart; cyberspace) and by extension meaning very modern

    (cyberfashion).

    Crime,offense,sinagree in meaning a breaking of law. Crime usually means any serious violation

    of human laws: thecrimeoftreasonorrobbery.Offense is used of an infraction of either humanor divine law, and does not necessarily mean a serious one: anoffenseleadingtoajailsentence;anoffenseagainstmorals.Sinmeans a breaking of moral or divine law: thesinsofgreedandlust.Cybercrime is criminal activity done using computers and the Internet. This includes anything

    from downloading illegal music files to stealing millions of dollars from online bank accounts.

    Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on

    other computers or posting confidential business information on the Internet.

    Cybercrime is criminal activity done using computers and the Internet. This includes anything

    from downloading illegal music files to stealing millions of dollars from online bank accounts.

    Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on

    other computers or posting confidential business information on the Internet.

    Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the

    Internet to steal personal information from other users. Two of the most common ways this is

    done is through phishing and pharming. Both of these methods lure users to fake websites (thatappear to be legitimate), where they are asked to enter personal information. This

    includes login information, such as usernames and passwords, phone numbers, addresses, credit

    card numbers, bank account numbers, and other information criminals can use to "steal" another

    person's identity. For this reason, it is smart to always check the URL or Web address of a site to

    make sure it is legitimate before entering your personal information.

    Because cybercrime covers such a broad scope of criminal activity, the examples above are only

    a few of the thousands of crimes that are considered cybercrimes. While computers and the

    Internet have made our lives easier in many ways, it is unfortunate that people also use these

    technologies to take advantage of others. Therefore, it is smart to protect yourself by usingantivirus and spyware blocking software and being careful where you enter your personal

    information.

    C

    http://www.dictionary.com/http://dictionary.reference.com/browse/networkhttp://dictionary.reference.com/browse/networkhttp://dictionary.reference.com/browse/networkhttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/virushttp://dictionary.reference.com/browse/networkhttp://www.dictionary.com/
  • 7/30/2019 Oumh1203 Written

    5/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    Classification of cyber crimes

    Cyber crime is one of the most popular crime today. But still many are not concerned with the

    crime because they do not know how to take action against the perpetrators. Cyber crime have

    different definitions.

    Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the

    Internet to steal personal information from other users. Two of the most common ways this is

    done is through phishing and pharming. Both of these methods lure users to fake websites (that

    appear to be legitimate), where they are asked to enter personal information. This includes logininformation, such as usernames and passwords, phone numbers, addresses, credit card numbers,

    bank account numbers, and other information criminals can use to "steal" another person's

    identity. For this reason, it is smart to always check the URL or Web address of a site to make

    sure it is legitimate before entering your personal information.

    Because cybercrime covers such a broad scope of criminal activity, the examples above are only

    a few of the thousands of crimes that are considered cybercrimes. While computers and the

    Internet have made our lives easier in many ways, it is unfortunate that people also use these

    technologies to take advantage of others. Therefore, it is smart to protect yourself by using

    antivirus and spyware blocking software and being careful where you enter your personal

    information.

    Saya ingin membahagikan jenayah siber kepada empat bahagian. Empat bahagian ini merupakanbahagian utama yang saya fikirkan amat penting. Namun di dalam bahagian itu terdapat contoh-

    contoh yang akan saya berikan dalam penerangan yang akan disampaikan kemudian. It can be

    classified to:

    1. Cyber crime against individual.

    http://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/phishing
  • 7/30/2019 Oumh1203 Written

    6/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    Comparison of cyber crimes in Malaysia and USA

    Berbanding dengan USA, jenayah siber mempunyai perbezaan di Malaysia. Kita semua sudah

    tahu bahawa USA merupakan sebuah Negara maju dan rakyatnya sangat mahir menggunakancomputer berbanding rakyat Malaysia. Motif dan juga matlamat jenayah siber di USA juga

    mempunyai perbezaan yang ketara. Perbezaan inilah yang akan di terangkan dalam esei ini.

  • 7/30/2019 Oumh1203 Written

    7/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    Suggestion

    Setiap masalah mesti mempunyai cara untuk menyelesaikannya. Begitu juga dengan jenayah

    siber ini. Pepatah ada menyebut prevention is better than cure. Cara pencegahan pula berbezadan ini amat bergantung kepada diri sendiri (jika berlaku pada diri sendiri) dan juga pihak

    kerajaan sebagai pihak yang perlu menjaga kebajikan rakyatnya. Kerjasama yang baik dari

    kedua-dua pihak amat diperlukan bagi mengawal jenayah siber daripada terus menjadi semakin

    teruk.

  • 7/30/2019 Oumh1203 Written

    8/8

    Cyber crime in Malaysia and USA-What should we do in Malaysia?

    ___________________________________________

    Conclusion

    Dengan berkembangnya kemudahan internet di dunia ini,maka akan bertambah jugalah jenayah

    siber ini.Hadapilah kenyataan bahawa jenayah siber merupakan jenayah masa kini yang amatbahaya bukan sahaja kepada individu terlibat tetapi juga kepada Negara. Saya juga berpendapat

    jenayah siber akan terus menjadi jenayah yang paling popular pada masa akan datang. Ini kerana

    penggunaan computer semakin luar dan juga kemudahan untuk mencapai internet sudah semakin

    meluas ke merata dunia. Mengambil contoh di Malaysia sahaja, kemudahan internet ini sudah

    meliputi 45% di seluruh Malaysia dan semakin meningkat dari semasa ke semasa.

    Untuk memastikan kita tidak terlibat daripada menjadi mangsa,kita haruslah sentiasa mengambil

    langkah berjaga-jaga dengan memberikan perhatian setiap kali kita hendak melayari internet.

    Langkah berjaga-jaga yang telah dijelaskan sebelum ini akan