/
Pertemuan 7 Computer Crime Pertemuan 7 Computer Crime

Pertemuan 7 Computer Crime - PowerPoint Presentation

jezebelfox
jezebelfox . @jezebelfox
Follow
344 views
Uploaded On 2020-07-03

Pertemuan 7 Computer Crime - PPT Presentation

MK Etika Profesi Definition Computer Crime An illegal act that involves a computer system or computer related system like any mobile device microwave satellite or other telecommunication systems that connect one or more computers or computer related systems ID: 793809

yang computer system mitnick computer yang mitnick system komputer computers kejahatan software untuk program supervised dan network internet fraud

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "Pertemuan 7 Computer Crime" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Pertemuan 7Computer Crime

MK Etika Profesi

Slide2

DefinitionComputer Crime :

An illegal act that involves a computer system or computer related system

like any mobile device microwave, satellite or other telecommunication systems that connect one or more computers or computer related systems

Slide3

DefinisiKegiatan penggunaan komputer untuk melakukan tindakan ilegal

Hak pengaksesan komputerContoh : mencuri waktu pada komputer perusahaan, membobol situs web pemerintah, pencurian informasi kartu kredit

Slide4

ExampleIntrusions into public packet networks

Network integrity violations(pelanggaran)Privacy violations

Industrial or financial espionage

Pirated computer software

Computer-aided fraud

Internet/e-mail

abuse

(penyalahgunaan)

Using computers technology to commit murder, terrorism, pornography and many others

Slide5

Siapa yang berkomitmen melakukan kejahatan komputer?

Slide6

Kejahatan KomputerJenis-jenis kejahatan komputer :

Data diddling : manipulasi atau pemalsuan dataSalami slicing :

bagian program yang memotong sebagian kecil dari nilai transaksi yang besar dan mengumpulkan-nya dalam suatu periode tertentu

Phreaking :

making free long distance calls

Cloning :

penyalahgunaan telpon selular menggunakan scanner

Slide7

Kejahatan KomputerJenis-jenis kejahatan komputer :

Carding : pencurian nomor kartu kredit secara onlinePiggybacking :

pencurian nomor kartu kredit dengan memata-matai

Social enggineering :

menipu pegawai untuk mendapatkan akses

Dumper diving :

pencarian informasi pribadi di bak sampah

Spoofing :

pencurian password melalui pemalsuan halaman login

Slide8

Kejahatan KomputerVirus Komputer dan Kode yang merusak

Virus – program yang bersifat merusak yang mengganggu fungsi normal sistem komputer

Jenis-jenis :

Worm :

biasanya tidak merusak file; mampu memperbanyak diri

Trojan horses :

kegiatan tak terdeteksi; tidak memperbanyak diri

Logic bomb atau time bombs :

sejenis Trojan Horse yang aktif setelah dipicu oleh suatu kejadian atau setelah selang waktu tertentu

Slide9

Computer resources targetHardware (computers, printers, servers, communication media)

Software (application, systems program, system backup, special program)Data in storage, transition or undergoing modification

Slide10

History of Computer CrimesComputer virus

: a self propagating computer program designed to alter or destroy a computer system’s resources. It attaches to software, grows, reproduces many times & spread in the new environment

.

Attacks system

weakening capacity

bringing the system down

Hacking

:

computer attack technique utilizes the internetworking between computers and communication devices.

Slide11

History of Computer CrimesMid 1980

: 414 club in San Francisco started series of attacks via a Stanford University computer

1984

:

first hacker magazines launched1988

:

a Cornel graduate student created a computer virus that crashed 6.000 computers and shutdown the internet for two days

1991

:

michelangelo

virus crashed computers on March 6,1992.

1995

:

Kevin

Mitnick

arrested by the FBI on charges of computer fraud by stealing thousands credit card access

End of 20

th

century

Y2K bug

http

://www.kaskus.co.id/thread/512aafee48ba54af36000003/y2k-millenium-bug-bencana-internet-dunia

/

Masalah millenium bug Y2K

 pendapat Onno W.Purbo

Slide12

Major Types of Computer System Attack

PenetrationBreaking into a computer system using known vulnerabilities to gain access to a cyberspace resourceSource: insider, hackers, criminal group, hacktivism

Denial of Service (

DDoS

)

Diminishing the system’s ability to function. Capable of bringing system down without destroying its resources

Aim to exhaust the network bandwidth, router processing capacity, breaking down the network

Example:

ip

spoofing,

syn

flooding,

smurfing

, buffer overflow, sequence number sniffing

Slide13

MotivesPolitical Activism

Vendettahttps://www.maxmanroe.com/inilah-4-kelompok-black-hat-hacker-yang-paling-ditakuti-di-dunia.html

Joke/Hoax

The Hackers ethics

TerrorismPolitical Espionage

Business Espionage

Hate

Game/Fun

Slide14

Cost & Social ConsequencesCybercrime growing because of:

Rapid technology growthEasy availability of hacker toolsAnonymityCut and paste programming technology

Communication speed

High degree of internetworking

Increasing dependency on computers

Slide15

Mengapa Kejahatan Komputer Semakin Meningkat?Aplikasi bisnis berbasis TI dan jaringan komputer meningkat 

online banking, e-commerce, Electronic data Interchange

 (EDI).

Desentralisasi server.

Transisi dari single vendor ke multi vendor.Meningkatnya kemampuan pemakai (user).

Kesulitan penegak hokum dan belum adanya ketentuan yang pasti.

Semakin kompleksnya system yang digunakan, semakin besarnya source code program yang digunakan.

Berhubungan dengan internet.

Slide16

Prevention StrategiesThree entities involved:

The computer as a toolThe criminalThe innocent victim

Slide17

Protect the computerPhysical protection

Procedural and operational protectionAntivirus Protection

Slide18

Anticipate the criminalPass computer Crime Prevention laws

Enforcement of Criminal LawsMoral education

Slide19

Monitor the innocent victimPersonal policies

Monitor employee activitiesChange security password regularly

Establish rules

Educate

Slide20

Keamanan KomputerMerupakan tindakan pencegahan yang diambil untuk menjaga komputer dan informasi yang ada di dalam nya tetap aman dari pengaksesan yang tidak berhak

Slide21

Keamanan KomputerPengamanan yang disarankan :

Terapkan rencana pengamanan untuk mencegah pembobolan Miliki rencana jika pembobolan terjadi Buatlah backupHanya ijinkan akses untuk pegawai tertentu

Ubah password secara teratur

Jagalah informasi yang tersimpan dengan aman

Gunakan software antivirus

Gunakan biometrik untuk mengakses sumberdaya komputasi

Rekrut tenaga kerja/pegawa yang bisa dipercaya

Slide22

Case: Kevin David Mitnick

August 63 – BornAt 12 – by pass the punch card system used in the Los Angeles bus system

At 16 - He broke into DEC's

computer network

and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release,

Mitnick

hacked into

Pacific Bell

voice mail computers.

Mitnick

fled, becoming a fugitive for two and a half years.

Mitnick

gained unauthorized access to dozens of computer network. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies.

Mitnick

also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.

Mitnick

was apprehended on February 15, 1995 in

Raleigh, North Carolina

.

[4]

He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification

Slide23

The FBI arrested Mitnick

on February 15, 1995, on federal offenses related to a 2½-year period of computer hacking.[6]In 1999,

Mitnick

confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into PacBell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne.

Mitnick

served five years in prison — four and a half years pre-trial and eight months in

solitary confinement

 — because, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone“

[8]

He was released on January 21, 2000.

Slide24

During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet.

Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy.

Slide25

http://www.bbc.com/indonesia/majalah/2015/07/150709_majalah_finnish_hackerhttp://www.liputan6.com/tag/cybercrime

Slide26

Referensi Heru Priyanto, S.T.,MBA, “Materi Kuliah Computer Crime”