Type Cybercrime
Based on the types of activities done, cybercrime can be classified into several types as follows:
a. Unauthorized Access
It is a crime that occurs when someone is entering or breaking into a computer network system illegally, without permission, or without the knowledge of the owner of the computer network system into. Probing and port is an example of this crime.
b. Illegal Contents
Kejahatn is done by entering data or information to the internet about something that is untrue, unethical and may be illegal or disturbing public order, for example, is the spread of pornography.
c. The spread of the virus intentionally
The spread of the virus is generally done using email. Often the email system infected with the virus do not realize this. The virus is then transmitted to another place via email.
d. Data Forgery
Crimes of this type carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database site.
e. Cyber Espionage, Sabotage, and extortion
Cyber Espionage is a crime that uses the Internet to conduct espionage against the other party, by entering into the target computer network system. Sabotage and extortion are crimes committed by creating disturbances, vandalism or destruction of the data, computer programs or computer network systems connected to the Internet.
f. Cyberstalking
These crimes done to annoy or harass anyone using the computer, such as using e-mail and repetitive. The offense resembles terror directed against a person by using the internet. It can happen because of the ease of making a particular email address without having to include the identity of the true self.
g. Carding
Carding is a crime committed for stealing credit card numbers belonging to someone else, and used in commercial transactions on the Internet.
h. Hacking and Cracker
The term hacker refers to someone who had a great interest to learn the details of computer systems and how to improve its capabilities. As for those who often commit acts of vandalism on the internet generally called a cracker. Arguably this is actually a hacker cracker that utilizes the ability for negative things. Cracking activity on the Internet has a very wide scope, ranging from hijacking someone else's account, piracy websites, probing, spreading viruses, so disabling the target. The last action called DoS (Denial Of Service). Dos attack is an attack aimed at crippling a target (hangs, crashes) so it can provide services.
i. Cybersquatting and Typosquatting
Cybersquatting is a crime committed by registering the domain name of the company of others and then trying to sell them to the company at a higher price. The typosquatting domain is a crime to make a play on the similar domain to another domain name. The name is a domain name rival company.
j. Hijacking
Hijacking is a crime hijacking other people's work. The most common is Software Piracy (software piracy).
k. Cyber terrorism
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking to the government or military sites. Some examples of cyber terrorism cases as follows:
• Ramzi Yousef, mastermind of the first attack to the World Trade Center, known to store details of the attack in the encrypted files on his laptop.
• Osama Bin Laden was known to be using steganography for communication networks.
• A website called Club Hacker Muslim known to write a list tip for hacking into the Pentagon.
• A hacker who calls himself DoktorNuker known to have more than five years of defacing or change the content of a web page to the propaganda of the anti-American, anti-Israel and pro-Bin Laden.
Based on Motive Events
Based on the motif activity does, cybercrime can be classified into two types as follows:
a. Cybercrime as a purely criminal act
Pure evil is a crime is a crime committed by criminal motives. This type of crime is usually used only as a means of internet crime. Examples of this kind of crime is Carding, the theft of credit card numbers belonging to someone else to use in commerce transactions on the Internet. Also the use of the internet (webserver, mailing lists) to distribute pirated material. Anonymous sender of the e-mail that contains a promotion (spamming) can also be included in the sample a crime to use the Internet as a means. In some developed countries, the perpetrator could be charged with spamming allegations of privacy violations.
b. Cybercrime as a crime "gray"
On the type of crime on the Internet are included in the "gray", it is quite difficult to determine whether a crime or not their activities are sometimes not given the motive for the crime. One example is probing or portscanning. This is the name for a kind of reconnaissance actions against other people's systems to gather as much information from the system under surveillance, including operating system, ports, whether open or closed, and so on.
Based on the Target Crime
While based on the targets of crime, cybercrime can be grouped into several categories as follows:
a. Cybercrime that attack individuals (Against Person)
This type of crime, attack targets directed to individuals or individuals with certain characteristics or criteria for the purpose of the attack. Some examples of these crimes include:
• Pornography
Activities undertaken to create, post, distribute, disseminate material and pornography, obscenity, and expose things that are inappropriate.
• cyberstalking
Activities undertaken to disrupt or harass anyone using the computer, such as using e-mail is done repeatedly as the Terror in the cyber world. The disorder may be sexual, religious, and so forth.
• Cyber-Tresspass
Activities undertaken violate the privacy of others areas such as Web Hacking. Breaking into the PC, Probing, Port Scanning and others.
b. Cybercrime attack property rights (Against Property)
Cybercrime committed to disrupt or attack other people's property. Some examples of these types of crimes such as unauthorized computer access through cyber world, possession of unauthorized electronic information / information theft, carding, cybersquating, hijacking, data forgery, and any activity that is detrimental to the property of another.
c. Cybercrime attack the government (Against Government)
Cybercrime Against Government made special-purpose attacks against the government. Activities such as cyber terrorism as acts that threaten the government as well as cracking the official website of the government or military sites.
Cybercrime Response
Principal activity of cybercrime is the attack on content, computer systems and communication systems owned by others or the public in cyberspace. The phenomenon of cybercrime is to watch out for the evil is rather different from other crimes in general. Cybercrime can be done without knowing the territorial boundaries and does not require direct interaction between the offender to the victim of crime. Here are ways to overcome them:
a. Securing the system
Real purpose of a security system is to prevent the destruction of part of the system because it was invaded by unwanted users. Security integrated system is needed to minimize the possibility of destruction. Build a security system must be integrated steps in the overall subsistence, in order to narrow or even close the gaps unauthorized actions that harm. Securing personally do starting from the installation of the system until it finally headed to the stage of physical security and data security. The security system of the attack through the network can also be done by securing FTP, SMTP, Telnet and Web server security.
b. Global Poverty
The Organization for Economic Cooperation and Development (OECD) have created guidelines for policy makers dealing with computer-related crime, where in 1986 the OECD has published a report entitled Computer-Related Crime: Analysis of Legal Policy. According to the OECD, several important steps that must be done every state in the response to cybercrime are:
1. modernizing the national criminal law and its procedural law.
2. improving national computer network security system according to international standards.
3. enhance the understanding and skills of law enforcement officials regarding the prevention, investigation
and prosecution of matters related to cybercrime.
4. increase citizen awareness about the problem of cybercrime and the importance of preventing crime occurred.
5. enhance cooperation between countries, whether bilateral, regional or multilateral, in tackling cybercrime.