Cybercrime or commonly referred to with the crime of virtual worlds is a term that refers to the activity of the crime with a computer or network of computers become a tool, or the scene of the crime. Included in the virtual world of crime among other things is an online auction fraud, check forgery, credit card fraud/carding, confidence fraud, identity fraud, child pornography, etc. However the term is also used for traditional crimes where a computer or network of computers used to facilitate or allow evil to happen.
An example of the evils of cyberspace where the computer as a tool is spamming and crimes against copyright and intellectual property. Examples of cyberspace crimeswhere a computer as a goal is illegal access (access control trick), malware and DoS attacks. An example of the evils of cyberspace as a place where the computer is identity fraud. While the examples of traditional computer crime as his instrument is child pornography and online gambling.
The Characteristics Of Cybercrime
In its development of conventional crime cybercrime is known by:
1. blue collar crime
2. White collar crime
Cybercrime has unique characteristics which are:
1. The scope of the crime
2. The nature of the crime
3. The perpetrators of crime
4. Mode of crime
5. Types of loss
From some of the above characteristics, then the handle to facilitate cybercrime are classified:
a. Cyberpiracy: use of computer technology to reprint software or information, and then distribute the information or the software through computer technology.
b. Cybertrespass: the use of computer technology to enhance access to the computer system of an organization or indifidu.
c. Cybervandalism: use of computer technology to create programs that interfere with the process of electronic transmission, and destroy data dikomputer.
c. Estimate the development of cyber crime in the future
cyber crime developments to be expected in the future will increase along with thedevelopment of technology or globalization in the field of information and communication technologies, as follows:
Denial of Service Attack. The purpose of this attack was to crash the system by disrupting access from legitimate internet service users. Tactics used is to send or to flood web sites with junk data which are not necessary for the intended recipients. Web site owners are suffering losses, because to control or control those websites back can take no little effort and energy.
Hate sites. The site is often used by hackers to attack each other and throw the comments are rude and vulgar which is managed by the "extremists" to attack those who are not disenanginya. Attacks against the opponent or the opponent is often raised on racial issues, promotional programs and war policy or a view (ISM) embraced by a person/group, the nation and the State to be read and understood person or other parties as "messages" that were presented.
Cyber Stalking is any form of unsolicited e-mail submissions by user or junk e-mail folder frequently wear as well as not uncommon with coercion. Although this "junk"e-mail is not desired by the user.
3. Types of Cybercrime
a. types of cybercrime by type of activity
1. Unauthorized Access to Computer Systems and Service
Crimes committed by entering into/infiltrated in a system computer network illegally, without permission or without the knowledge of the owner of the computer network system which he enters. Usually the perpetrator of a crime (hacker) did it with intent to sabotage or theft of important and confidential information. However, there are also doing just because it feels challenged to try his skill to penetrate a system that has a high level of protection. This crime is getting popular recently with the development of internet/intranet technologies.
We certainly don't forget when the issue of East Timor was being discussed, while at the international level, several government-owned website defaced by hackers INDONESIA (Kompas, 11/08/1999). Some time ago, hackers have also managed to penetrate the entrance into the database contains the data on the users of the services of America Online (AOL), a United States company engaged in e-commerce, which has a high level of confidentiality (Indonesian Observer, 26/06/2000). The website of the Federal Bureau of Investigation (FBI) also did not escape from the hacker attacks,which resulted in no proper functioning of this site in a few days. (*)