Bhs Inggris 12 Ips

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

GROUP 1

MEMBER’S NAME:
- DHEA AULIA PUTRI
- IWAYAN RENDY PRASTA
- M.IRPAN HAKIM
- M.ABEL WAHYU GUSTIAN
- RARA SUCI SHAUMALA WARDANI
- SITI NABILA RHAMADINA
- ZHALWA ARTHA AVIVA

SMAN 15 PALEMBANG
SCHOOL YEAR
2019/2020
CYBER
CRIME
Cyber Crime, also called
“Computer Crime”, the use of a
computer as instrument to further
illegal ends, such as committing fraud,
trafficking in child pornography and
intellectual property, stealing
identities, or violating privacy. Cyber
Crime, especially through the Internet,
has grown in importance as the
computer has become central to
commerce, entertainment, and
government.
EXAMPLES
OF CYBER
1. FAKING SOMEONE’S FACEBOOK
CRIME:
ACCOUNT
One of the most common examples of
Cyber Crime is cloning of someone’s
CENCO

Facebook account. This action is rife for


R

public figuresCENCO
or famous figures who have
many followers.R

With the amount of attention received by


the clone account, the counterfeiter will get
faster victims. The model of Cyber Crime
requires payment of money by
CENCO
transferring to certain accounts. So, don’t
R

believe it easily if you are contacted by


someone who is asking for help
EXAMPLES
OF CYBER
2. WANNACRY RANSOMWARE
CRIME:
PHENOMENON
A few years ago the digital
universe was enlivened by
the emergence of the
WannaCry Ransomware
Computer Virus which was
able to lock a person’s
computer data. To be able to
open and access the data, all
you have to do is buy a
Such phenomena occur
ransom through
on May the
12-15 2017
throughout the world
Bitcoin wallet.
TYPES OF
CYBER
1. DATA THEFT CRIME
Don’t mind
me, I’m just
looking
1. DATA THEFT
This Cyber Crime activity
is usually carried out to
fulfill commercial interests
because there are other
parties who want the other
party’s confidential data.
This action is certainly
illegal in entering criminal
activities because it can
cause material losses that
result in bankruptcy of an
institution or company
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
TERRORISM
2. CYBER TERRORISM
Cyber Terrorism is an act of
Cyber Crime that is being
fought by many major
countries in the world,
including Indonesia.
Because the activities of
Cyber Terrorism often
threaten the safety of
citizens or even stake
holders who govern the
course of government.
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING
TERRORISM
3. HACKING
The next type of Cyber Crime is
Hacking.
Don’tThe dangerous
mind me, i’m actions
justoften
that are watching animeout by
carried
professional programmers are
usually specifically targeting
weaknesses or gaps in the security
system to gain benefits in the form
of material or personal
satisfaction.

If you view the activities carried


out, hacking actually does not
always have a bad connotation
because there are also positive
hackers who use their abilities for
beneficial and not harmful
activities
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING 4. CARDING
TERRORISM
4. CARDING
Carding is a term used to refer
to misuse of other people’s
credit card information.
Carders usually use other
people’s credit cards to buy
groceries online. Then, the free
goods are resold at cheap
prices to get money.

Digital crime by carding


usually occurs overseas, while
for users in Indonesia the
number of case recorded is not
too larger due to the lack of
credit card users who like to
transact in cyverspace.
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING 4. CARDING 5. DEFACING
TERRORISM
5. DEFACING
Among the previous
Cyber Crime acts,
Defacing is arguably
the lightest online
crime activity. This
is partly because
defenders usually
target non-profit
websites such as
government, school,
or university
websites.
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING 4. CARDING 5. DEFACING
TERRORISM

6.
CYBERSQUATTIN
G
6. CYBERSQUATTING
The term Cyber Squatting
may not be so familiar
among users in the country.
Naturally, it is because the
act of seizing domain names
itself does require capital
and foresight that many
people do not have. The
result of this Cyber Crime
is usually in the form of
ransom which is not fair in
values
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING 4. CARDING 5. DEFACING
TERRORISM

6. 7.
CYBERSQUATTIN CYBERTYPOSQUATTI
G NG
7. CYBERTYPOSQUATTING
Almost similar to Cyber Squatting, Cyber
Typosquatting actions are both targeting
domain names belonging to well-known
companies to be targeted. The difference,
this activity utilizes the similarity of domain
names and negligence of users who rarely
re-check the URL of the company’s website.

One of the objectives of Cyber


Typosquatting is to bring down the good
image of the brand concerned by
commiting fraud or other illegal thins that
violate the law
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING 4. CARDING 5. DEFACING
TERRORISM

6. 7. 8. SPREADING ILLEGAL
CYBERSQUATTIN CYBERTYPOSQUATTI CONTEN
G NG
8. SPREADING ILLEGAL
SpreadingCONTEN
Illegal Content that violates
the law becomes the most widely
watched Cyber Crime case. The
reason is, this activity usually involves
famous figures or content that is
capable of provoking controversy.

Soma examples of illegal content


included in the realm of Cyber Crime
include pornographic videos, illegal
firearm sales,
Buying and selling narcotics, and so
on.
TYPES OF
CYBER
1. DATA THEFT 2. CYBER CRIME
3. HACKING 4. CARDING 5. DEFACING
TERRORISM

6. 7. 8. SPREADING ILLEGAL 9. MALWARE


CYBERSQUATTIN CYBERTYPOSQUATTI CONTEN
G NG
9. MALWARE
Malware or abbreviation of Malicious Software is
any software intentionally designed to cause
damage to a computer server, client, or computer
network. A wide variety of types of Malware exist,
including computer viruses, worms, Trojan
horses, ransomware, spyware, adware, and
scareware.

Programs are also considered Malware if they


secretly act against the interests of the computer
user. For example, at one point Sony music
Compact discs silently installed a rootkit on
purchaser’s computers with the intention of
preventing illicit copying, but which also reported
on user’s listening habits, and unintentionally
created extra security vulnerabilities
CYBER
CRIME
1. SNIFFING METHOD
2. DESTRUCTIVE 3. PASSWORD
DEVICE CRACKER

4. DDoS 5. SPOOFING
HOW TO DEAL
WITH CYBER
1. MAKE THE CRIME
LAWThe most elegant way so that Cyber Crime is
not more rampant is to make regulations that
are included in the Act. Law enforcement will
later make cybercriminals think long before
committing criminal acts because the legal basis
is clear.

In Indonesia, the rules regarding Cyber Crime


currently are based on the ITE Law. However,
unfortunately the action pattern is still not
maximal and often seems forced. Law
enforcement in cyberspace is indeed still gray
because electronic documents themselves
cannot be used as evidence by the Criminal
Code.
HOW TO DEAL
WITH CYBER
2. ESTABLISH A SPECIAL CRIME
HANDLING INSTITUTION
You must have heard the name of the
Cyber Crime Police Headquarters
Divison. Now we need special
institutions like that to ward off and
investigate the potential for crime in the
digital sphere. Some countries have
already begun to implement this
concept by forming special institutions
that deal with Cyber Crime issues,
however this will only be effective if
implemented by many countries, so
there is no gap for Cyber Crime
perpetrators wherever they are.
HOW TO DEAL
WITH CYBER
3. STRENGTHEN THE CRIME
SYSTEM
The security system is the first fotress we can
rely on to avoid potential Cyber Crime. To
secure the system independently you can add
a number of add ons such as SSL Certificates
on websites, computer antivirus, to doing
physical security on the network to protect
the server

Apart from that, if you have a business


website, make sure to use the Indonesia VPS
service from Qwords.com, which is equipped
with various current technologies. As a result,
cyber crime such as malware or defacing can
be minimized.
CONCLUSI
ON
That is a brief explanation of the
understanding of Cyber Crime, the types
of crime, to how to overcome them. At
present Cyber Crime activities are
increasing rapidly compared to a few
years ago when the internet did not yet
have many users.

By Knowing the information above,


hopefully you can be more vigilant so that
crimes that occur in cyberspace will not
befall you at any time

You might also like