Anda di halaman 1dari 5

Hackers and Crackers

CHAPTER I
INTRODUCTION
1.1 Problem Background
Crimes against the computer can pose a threat because it is an irresponsible act of a small
group of computer users and one can take advantage of the result.
Computer crime in the legal field
In an opening of the computer crime laws that include the acces of important documents in your
computer (used by the federal government) or operation.
Examples of computer crimes
1. theft of money
2. computer viruses
3. theft of service
4. Theft of data in the program
5. Increase the program
6. change data
7. destruction program
8. destruction of data
9. Violation of freedom
10. Violation of the law - law or international law
Information systems and computer crime
Against computer crime and computer criminals is a major challenge to the development of
information systems. Development of the system, as well as the accounting system should be
much use to control and negotiate before such systems are built and maintain the system
security
1.2 identification of Problems
Internet as a result of engineering technology not only uses sophisticated computer technology
but also involves in the operation of telecommunications technology.
In its development, was the use of the internet to bring the negative side, with the emergence of
opportunities acts of anti-social and criminal behavior that is considered unlikely.
As a theory, said: "crime is a product of society its self", which simply means that the society
itself that gave birth to a crime.
The higher the intellectual level of a society, are increasingly sophisticated crimes that may occur
in the community.
1.3 purpose
The purpose of this report is made include:
Meet one of the tasks Computers and Society
Knowing the difference between a Hacker and Cracker
How the effects that will arise and how we respond

1.4 systematics of Writing


In order to report properly understood by the reader, the authors make a systematic way of
writing the report as follows:
CHAPTER I INTRODUCTION
Introduction contains the background, problem identification, the purpose of writing the
report and systematics
CHAPTER II THEORY AND DISCUSSION
Contains the theoretical basis of theories that are used in making the report.
CHAPTER III FINAL
The last chapter contains a conclusion of the discussion and the submission of proposals or
suggestions
CHAPTER II
THEORY AND DISCUSSION
2.1 Hacker
Hacker is a term for those who provide a useful contribution to the network computers,
create a small program and share with the people on the Internet.
Seek, learn and change things for the hobby and to follow the development of legality set by
the game developer.
The hackers usually do infiltration-infiltration with the intention of satisfying the knowledge
and techniques. Average - average company in the world of global networks (the Internet) also has a
hacker.
They spend most of their time, expertise dedicated computers and everything related to the
IT world. These people are Internet experts, understand the world of computing. Your network
administrator, assume they understand what they were talking about, most are also a hacker.
Hackers are not people who have dibarisan leader in internet war in order to gain illegal access to
computers without good reason. A hacker will just take over the system if it requires a complicated
thought process, something that is challenging, and that will give them information or help clarify
information about how things are done. The hackers are always hungry for knowledge, learn more,
loved and always wanted to obtain more detailed information on specific subjects. Computer.
Internet. Note: The hacker can also be defined as a group of White Hat.
From time to time, the definition of "hacker" has evolved, but at this time can idefinisikan as
"People who love to learn the ins and outs of the comp system. And experimenting with it. "Eric
Raymond, author of" The New Hacker's Dictionary (MIT Press 1994), write the characteristics of a
hacker as follows:
Likes to study the detail system comp. Or programming language.
- Joy to the practice of programming rather than just menteorikannya.
- Able to appreciate the results hacing others.

- Learn programming quickly.


- Proficient in operating system / language specific programming (Unix).
True hacker is not a criminal group of tissue such as the assumption of many, but it must be
recognized that from time to time there are quite a lot of hackers are abusing their ability and
pengethuan to things that are destructive and negative, of committing crimes or acts by disrupting
and damaging nosy the file.
Hacker levels:
Elite
Semi Elite
Developed Kiddie
Script Kiddie
Lamer
2.2 Cracker
Cracker is a term for those who go into other people's systems and more destructive
cracker, usually on a computer network, bypassing passwords or licenses computer programs,
computer security against deliberate, deface the (changing the face of web pages) of others even up
to delete the data of others, stealing data.
In general, cracking to his own advantage, malice, or for other reasons as there are
challenges.
Is the dark side of computer security professionals who stray too far. The Script Kiddies, the
Black Hat, the people with no knowledge except how to do the hacking. This group does not know
how a computer works. A cracker does not care about the people and not think about consequences
of their actions. The Cracker despised in the hacking forum and is identical to the damage and
"Google". The cracker wants everything under their control is stored in the record. They do not seek
information for themselves and depend on anyone who gave it to them. These are the wanna-be.
2.3 forms of Cybercrime
the unlawful act committed using computers as a tool / device or the computer as an object,
either for profit or not, at the expense of others.
Crime directly related to the use of major computer-based technology and
telecommunications networks are in some of the literature and practice, grouped in several forms,
among others:
Unauthorized Access to Computer Systems and Service That Crimes committed by entering /
breaking into a computer network system illegally, without permission or without the
consent of the owner of the computer network system that entered.
Illegal Contents That is a crime by entering the data or information to the internet about
something that is untrue, unethical, and may be unlawful or disturb public order.
Data Forgery is a crime to falsify data on important documents are stored as scriptless
document via the internet. These crimes are usually directed to the documents e-commerce
by making as if happening "typo" that will ultimately benefit the offender.

Cyber Espionage is a crime that utilizes the Internet to conduct espionage against the other
party, by entering into a computer network system (computer network system) the target.
These crimes are usually directed against a business rival or a document the importance of
data stored in a computerized system.
Sabotage and Cyber Crimes Extortion is done by creating a disturbance, destruction or
demolition of a data, computer program or system of computer networks connected to the
internet.
Offense against Intellectual Property Crime is addressed to Intellectual Property Rights
owned by other parties on the internet.
Infringements of Privacy crime is directed against a person who the information is very
personal and confidential

CHAPTER III
CONCLUSIONS AND RECOMMENDATIONS
3.1 Conclusion
Hacker: make the Internet more and more advanced technologies for hackers to use his
expertise in computers to see, find and fix flaws in a security system in a computer system or
software, create a desire to work as an administrator re-live hacker helps administrators to
strengthen their networks.
Cracker: undermine and paralyze the entire computer system, so that the network user data
is damaged, lost, or changed.
3.2 Recommendeations
Some of the important steps that must be done every country in the response to cybercrime
are:
To modernize the national criminal law and its procedural law, which harmonized with the
international conventions relating to the crime
Increase the national computer network security system according to international
standards
Improve the understanding and expertise of law enforcement officials regarding the
prevention, investigation and prosecution of matters relating to cybercrime
Increase citizen awareness of the problem of cyber crime and the importance of preventing
the crime occurred
Promote cooperation between countries, both bilateral, regional and multilateral, in efforts
to address cybercrime, including through extradition treaties and mutual assistance treaties
Summary
1. What is the problem?
Hacker is a term for those who provide a useful contribution to the network computers, create a
small program and share with the people on the Internet.
Seek, learn and change things for the hobby and to follow the development of legality set by the
game developer.
Cracker is a term for those who go into other people's systems and more destructive cracker,
usually on a computer network, bypassing passwords or licenses computer programs, computer
security against deliberate, deface the (changing the face of web pages) of others even up to delete
the data of others, stealing data.

2. A. what to do?

Increase the national computer network security system according to international


standards
Improve the understanding and expertise of law enforcement officials regarding the
prevention, investigation and prosecution of matters relating to cybercrime
Increase citizen awareness of the problem of cyber crime and the importance of
preventingthe crime occurred
Promote cooperation between countries, both bilateral, regional and multilateral, in
efforts to address cybercrime, including through extradition treaties and mutual
assistance treaties
B. How to do?

To modernize the national criminal law and its procedural law, which harmonized with the
international conventions relating to the crime

3. what is gained?
- Joy to the practice of programming rather than just menteorikannya.
- Able to appreciate the results hacing others.
- Learn programming quickly.
- Proficient in operating system / language specific programming (Unix).

Anda mungkin juga menyukai