MK Etika Profesi Definition Computer Crime An illegal act that involves a computer system or computer related system like any mobile device microwave satellite or other telecommunication systems that connect one or more computers or computer related systems ID: 793809
Download The PPT/PDF document "Pertemuan 7 Computer Crime" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Pertemuan 7Computer Crime
MK Etika Profesi
Slide2DefinitionComputer Crime :
An illegal act that involves a computer system or computer related system
like any mobile device microwave, satellite or other telecommunication systems that connect one or more computers or computer related systems
Slide3DefinisiKegiatan penggunaan komputer untuk melakukan tindakan ilegal
Hak pengaksesan komputerContoh : mencuri waktu pada komputer perusahaan, membobol situs web pemerintah, pencurian informasi kartu kredit
Slide4ExampleIntrusions into public packet networks
Network integrity violations(pelanggaran)Privacy violations
Industrial or financial espionage
Pirated computer software
Computer-aided fraud
Internet/e-mail
abuse
(penyalahgunaan)
Using computers technology to commit murder, terrorism, pornography and many others
Slide5Siapa yang berkomitmen melakukan kejahatan komputer?
Slide6Kejahatan KomputerJenis-jenis kejahatan komputer :
Data diddling : manipulasi atau pemalsuan dataSalami slicing :
bagian program yang memotong sebagian kecil dari nilai transaksi yang besar dan mengumpulkan-nya dalam suatu periode tertentu
Phreaking :
making free long distance calls
Cloning :
penyalahgunaan telpon selular menggunakan scanner
Slide7Kejahatan KomputerJenis-jenis kejahatan komputer :
Carding : pencurian nomor kartu kredit secara onlinePiggybacking :
pencurian nomor kartu kredit dengan memata-matai
Social enggineering :
menipu pegawai untuk mendapatkan akses
Dumper diving :
pencarian informasi pribadi di bak sampah
Spoofing :
pencurian password melalui pemalsuan halaman login
Slide8Kejahatan KomputerVirus Komputer dan Kode yang merusak
Virus – program yang bersifat merusak yang mengganggu fungsi normal sistem komputer
Jenis-jenis :
Worm :
biasanya tidak merusak file; mampu memperbanyak diri
Trojan horses :
kegiatan tak terdeteksi; tidak memperbanyak diri
Logic bomb atau time bombs :
sejenis Trojan Horse yang aktif setelah dipicu oleh suatu kejadian atau setelah selang waktu tertentu
Slide9Computer resources targetHardware (computers, printers, servers, communication media)
Software (application, systems program, system backup, special program)Data in storage, transition or undergoing modification
Slide10History of Computer CrimesComputer virus
: a self propagating computer program designed to alter or destroy a computer system’s resources. It attaches to software, grows, reproduces many times & spread in the new environment
.
Attacks system
weakening capacity
bringing the system down
Hacking
:
computer attack technique utilizes the internetworking between computers and communication devices.
History of Computer CrimesMid 1980
: 414 club in San Francisco started series of attacks via a Stanford University computer
1984
:
first hacker magazines launched1988
:
a Cornel graduate student created a computer virus that crashed 6.000 computers and shutdown the internet for two days
1991
:
michelangelo
virus crashed computers on March 6,1992.
1995
:
Kevin
Mitnick
arrested by the FBI on charges of computer fraud by stealing thousands credit card access
End of 20
th
century
Y2K bug
http
://www.kaskus.co.id/thread/512aafee48ba54af36000003/y2k-millenium-bug-bencana-internet-dunia
/
Masalah millenium bug Y2K
pendapat Onno W.Purbo
Slide12Major Types of Computer System Attack
PenetrationBreaking into a computer system using known vulnerabilities to gain access to a cyberspace resourceSource: insider, hackers, criminal group, hacktivism
Denial of Service (
DDoS
)
Diminishing the system’s ability to function. Capable of bringing system down without destroying its resources
Aim to exhaust the network bandwidth, router processing capacity, breaking down the network
Example:
ip
spoofing,
syn
flooding,
smurfing
, buffer overflow, sequence number sniffing
Slide13MotivesPolitical Activism
Vendettahttps://www.maxmanroe.com/inilah-4-kelompok-black-hat-hacker-yang-paling-ditakuti-di-dunia.html
Joke/Hoax
The Hackers ethics
TerrorismPolitical Espionage
Business Espionage
Hate
Game/Fun
Slide14Cost & Social ConsequencesCybercrime growing because of:
Rapid technology growthEasy availability of hacker toolsAnonymityCut and paste programming technology
Communication speed
High degree of internetworking
Increasing dependency on computers
Slide15Mengapa Kejahatan Komputer Semakin Meningkat?Aplikasi bisnis berbasis TI dan jaringan komputer meningkat
online banking, e-commerce, Electronic data Interchange
(EDI).
Desentralisasi server.
Transisi dari single vendor ke multi vendor.Meningkatnya kemampuan pemakai (user).
Kesulitan penegak hokum dan belum adanya ketentuan yang pasti.
Semakin kompleksnya system yang digunakan, semakin besarnya source code program yang digunakan.
Berhubungan dengan internet.
Slide16Prevention StrategiesThree entities involved:
The computer as a toolThe criminalThe innocent victim
Slide17Protect the computerPhysical protection
Procedural and operational protectionAntivirus Protection
Slide18Anticipate the criminalPass computer Crime Prevention laws
Enforcement of Criminal LawsMoral education
Slide19Monitor the innocent victimPersonal policies
Monitor employee activitiesChange security password regularly
Establish rules
Educate
Slide20Keamanan KomputerMerupakan tindakan pencegahan yang diambil untuk menjaga komputer dan informasi yang ada di dalam nya tetap aman dari pengaksesan yang tidak berhak
Slide21Keamanan KomputerPengamanan yang disarankan :
Terapkan rencana pengamanan untuk mencegah pembobolan Miliki rencana jika pembobolan terjadi Buatlah backupHanya ijinkan akses untuk pegawai tertentu
Ubah password secara teratur
Jagalah informasi yang tersimpan dengan aman
Gunakan software antivirus
Gunakan biometrik untuk mengakses sumberdaya komputasi
Rekrut tenaga kerja/pegawa yang bisa dipercaya
Slide22Case: Kevin David Mitnick
August 63 – BornAt 12 – by pass the punch card system used in the Los Angeles bus system
At 16 - He broke into DEC's
computer network
and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release,
Mitnick
hacked into
Pacific Bell
voice mail computers.
Mitnick
fled, becoming a fugitive for two and a half years.
Mitnick
gained unauthorized access to dozens of computer network. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies.
Mitnick
also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.
Mitnick
was apprehended on February 15, 1995 in
Raleigh, North Carolina
.
[4]
He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification
Slide23The FBI arrested Mitnick
on February 15, 1995, on federal offenses related to a 2½-year period of computer hacking.[6]In 1999,
Mitnick
confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into PacBell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne.
Mitnick
served five years in prison — four and a half years pre-trial and eight months in
solitary confinement
— because, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone“
[8]
He was released on January 21, 2000.
Slide24During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet.
Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy.
Slide25http://www.bbc.com/indonesia/majalah/2015/07/150709_majalah_finnish_hackerhttp://www.liputan6.com/tag/cybercrime
Slide26Referensi Heru Priyanto, S.T.,MBA, “Materi Kuliah Computer Crime”