CHAPTER I
INTRODUCTION
1.1 Problem Background
Crimes against the computer can pose a threat because it is an irresponsible act of a small
group of computer users and one can take advantage of the result.
Computer crime in the legal field
In an opening of the computer crime laws that include the acces of important documents in your
computer (used by the federal government) or operation.
Examples of computer crimes
1. theft of money
2. computer viruses
3. theft of service
4. Theft of data in the program
5. Increase the program
6. change data
7. destruction program
8. destruction of data
9. Violation of freedom
10. Violation of the law - law or international law
Information systems and computer crime
Against computer crime and computer criminals is a major challenge to the development of
information systems. Development of the system, as well as the accounting system should be
much use to control and negotiate before such systems are built and maintain the system
security
1.2 identification of Problems
Internet as a result of engineering technology not only uses sophisticated computer technology
but also involves in the operation of telecommunications technology.
In its development, was the use of the internet to bring the negative side, with the emergence of
opportunities acts of anti-social and criminal behavior that is considered unlikely.
As a theory, said: "crime is a product of society its self", which simply means that the society
itself that gave birth to a crime.
The higher the intellectual level of a society, are increasingly sophisticated crimes that may occur
in the community.
1.3 purpose
The purpose of this report is made include:
Meet one of the tasks Computers and Society
Knowing the difference between a Hacker and Cracker
How the effects that will arise and how we respond
Cyber Espionage is a crime that utilizes the Internet to conduct espionage against the other
party, by entering into a computer network system (computer network system) the target.
These crimes are usually directed against a business rival or a document the importance of
data stored in a computerized system.
Sabotage and Cyber Crimes Extortion is done by creating a disturbance, destruction or
demolition of a data, computer program or system of computer networks connected to the
internet.
Offense against Intellectual Property Crime is addressed to Intellectual Property Rights
owned by other parties on the internet.
Infringements of Privacy crime is directed against a person who the information is very
personal and confidential
CHAPTER III
CONCLUSIONS AND RECOMMENDATIONS
3.1 Conclusion
Hacker: make the Internet more and more advanced technologies for hackers to use his
expertise in computers to see, find and fix flaws in a security system in a computer system or
software, create a desire to work as an administrator re-live hacker helps administrators to
strengthen their networks.
Cracker: undermine and paralyze the entire computer system, so that the network user data
is damaged, lost, or changed.
3.2 Recommendeations
Some of the important steps that must be done every country in the response to cybercrime
are:
To modernize the national criminal law and its procedural law, which harmonized with the
international conventions relating to the crime
Increase the national computer network security system according to international
standards
Improve the understanding and expertise of law enforcement officials regarding the
prevention, investigation and prosecution of matters relating to cybercrime
Increase citizen awareness of the problem of cyber crime and the importance of preventing
the crime occurred
Promote cooperation between countries, both bilateral, regional and multilateral, in efforts
to address cybercrime, including through extradition treaties and mutual assistance treaties
Summary
1. What is the problem?
Hacker is a term for those who provide a useful contribution to the network computers, create a
small program and share with the people on the Internet.
Seek, learn and change things for the hobby and to follow the development of legality set by the
game developer.
Cracker is a term for those who go into other people's systems and more destructive cracker,
usually on a computer network, bypassing passwords or licenses computer programs, computer
security against deliberate, deface the (changing the face of web pages) of others even up to delete
the data of others, stealing data.
2. A. what to do?
To modernize the national criminal law and its procedural law, which harmonized with the
international conventions relating to the crime
3. what is gained?
- Joy to the practice of programming rather than just menteorikannya.
- Able to appreciate the results hacing others.
- Learn programming quickly.
- Proficient in operating system / language specific programming (Unix).