MK Etika Profesi Pertemuan 7 Computer Crime Definition

  • Slides: 26
Download presentation
MK Etika Profesi Pertemuan 7 Computer Crime

MK Etika Profesi Pertemuan 7 Computer Crime

Definition • Computer Crime : An illegal act that involves a computer system or

Definition • Computer Crime : An illegal act that involves a computer system or computer related system like any mobile device microwave, satellite or other telecommunication systems that connect one or more computers or computer related systems

Definisi Kegiatan penggunaan komputer untuk melakukan tindakan ilegal ü Hak pengaksesan komputer ü Contoh

Definisi Kegiatan penggunaan komputer untuk melakukan tindakan ilegal ü Hak pengaksesan komputer ü Contoh : mencuri waktu pada komputer perusahaan, membobol situs web pemerintah, pencurian informasi kartu kredit

Example • • Intrusions into public packet networks Network integrity violations(pelanggaran) Privacy violations Industrial

Example • • Intrusions into public packet networks Network integrity violations(pelanggaran) Privacy violations Industrial or financial espionage Pirated computer software Computer-aided fraud Internet/e-mail abuse(penyalahgunaan) Using computers technology to commit murder, terrorism, pornography and many others

Siapa yang berkomitmen melakukan kejahatan komputer?

Siapa yang berkomitmen melakukan kejahatan komputer?

Kejahatan Komputer Jenis-jenis kejahatan komputer : 1. Data diddling : manipulasi atau pemalsuan data

Kejahatan Komputer Jenis-jenis kejahatan komputer : 1. Data diddling : manipulasi atau pemalsuan data 2. Salami slicing : bagian program yang memotong sebagian kecil dari nilai transaksi yang besar dan mengumpulkan-nya dalam suatu periode tertentu 3. Phreaking : making free long distance calls 4. Cloning : penyalahgunaan telpon selular menggunakan scanner

Kejahatan Komputer Jenis-jenis kejahatan komputer : 5. Carding : pencurian nomor kartu kredit secara

Kejahatan Komputer Jenis-jenis kejahatan komputer : 5. Carding : pencurian nomor kartu kredit secara online 6. Piggybacking : pencurian nomor kartu kredit dengan memata-matai 7. Social enggineering : menipu pegawai untuk mendapatkan akses 8. Dumper diving : pencarian informasi pribadi di bak sampah 9. Spoofing : pencurian password melalui pemalsuan halaman login

Kejahatan Komputer Virus Komputer dan Kode yang merusak Virus – program yang bersifat merusak

Kejahatan Komputer Virus Komputer dan Kode yang merusak Virus – program yang bersifat merusak yang mengganggu fungsi normal sistem komputer Jenis-jenis : Worm : biasanya tidak merusak file; mampu memperbanyak diri Trojan horses : kegiatan tak terdeteksi; tidak memperbanyak diri Logic bomb atau time bombs : sejenis Trojan Horse yang aktif setelah dipicu oleh suatu kejadian atau setelah selang waktu tertentu

Computer resources target • Hardware (computers, printers, servers, communication media) • Software (application, systems

Computer resources target • Hardware (computers, printers, servers, communication media) • Software (application, systems program, system backup, special program) • Data in storage, transition or undergoing modification

History of Computer Crimes • Computer virus : a self propagating computer program designed

History of Computer Crimes • Computer virus : a self propagating computer program designed to alter or destroy a computer system’s resources. It attaches to software, grows, reproduces many times & spread in the new environment. Attacks system weakening capacity bringing the system down • Hacking : computer attack technique utilizes the internetworking between computers and communication devices.

History of Computer Crimes • Mid 1980 : 414 club in San Francisco started

History of Computer Crimes • Mid 1980 : 414 club in San Francisco started series of attacks via a • • • Stanford University computer 1984: first hacker magazines launched 1988: a Cornel graduate student created a computer virus that crashed 6. 000 computers and shutdown the internet for two days 1991: michelangelo virus crashed computers on March 6, 1992. 1995: Kevin Mitnick arrested by the FBI on charges of computer fraud by stealing thousands credit card access End of 20 th century Y 2 K bug http: //www. kaskus. co. id/thread/512 aafee 48 ba 54 af 36000003/y 2 kmillenium-bug-bencana-internet-dunia/ Masalah millenium bug Y 2 K pendapat Onno W. Purbo

Major Types of Computer System Attack • Penetration – Breaking into a computer system

Major Types of Computer System Attack • Penetration – Breaking into a computer system using known vulnerabilities to gain access to a cyberspace resource – Source: insider, hackers, criminal group, hacktivism • Denial of Service (DDo. S) – Diminishing the system’s ability to function. Capable of bringing system down without destroying its resources – Aim to exhaust the network bandwidth, router processing capacity, breaking down the network – Example: ip spoofing, syn flooding, smurfing, buffer overflow, sequence number sniffing

Motives • Political Activism • Vendetta https: //www. maxmanroe. com/inilah-4 -kelompok-black-hat-hacker-yangpaling-ditakuti-di-dunia. html • •

Motives • Political Activism • Vendetta https: //www. maxmanroe. com/inilah-4 -kelompok-black-hat-hacker-yangpaling-ditakuti-di-dunia. html • • Joke/Hoax The Hackers ethics Terrorism Political Espionage Business Espionage Hate Game/Fun

Cost & Social Consequences • Cybercrime growing because of: – – – – Rapid

Cost & Social Consequences • Cybercrime growing because of: – – – – Rapid technology growth Easy availability of hacker tools Anonymity Cut and paste programming technology Communication speed High degree of internetworking Increasing dependency on computers

Mengapa Kejahatan Komputer Semakin Meningkat? • Aplikasi bisnis berbasis TI dan jaringan komputer meningkat

Mengapa Kejahatan Komputer Semakin Meningkat? • Aplikasi bisnis berbasis TI dan jaringan komputer meningkat online banking, e-commerce, Electronic data Interchange (EDI). • Desentralisasi server. • Transisi dari single vendor ke multi vendor. • Meningkatnya kemampuan pemakai (user). • Kesulitan penegak hokum dan belum adanya ketentuan yang pasti. • Semakin kompleksnya system yang digunakan, semakin besarnya source code program yang digunakan. • Berhubungan dengan internet.

Prevention Strategies • Three entities involved: – The computer as a tool – The

Prevention Strategies • Three entities involved: – The computer as a tool – The criminal – The innocent victim

Protect the computer • Physical protection • Procedural and operational protection • Antivirus Protection

Protect the computer • Physical protection • Procedural and operational protection • Antivirus Protection

Anticipate the criminal • Pass computer Crime Prevention laws • Enforcement of Criminal Laws

Anticipate the criminal • Pass computer Crime Prevention laws • Enforcement of Criminal Laws • Moral education

Monitor the innocent victim • Personal policies – Monitor employee activities – Change security

Monitor the innocent victim • Personal policies – Monitor employee activities – Change security password regularly – Establish rules – Educate

Keamanan Komputer • Merupakan tindakan pencegahan yang diambil untuk menjaga komputer dan informasi yang

Keamanan Komputer • Merupakan tindakan pencegahan yang diambil untuk menjaga komputer dan informasi yang ada di dalam nya tetap aman dari pengaksesan yang tidak berhak

Keamanan Komputer • Pengamanan yang disarankan : • Terapkan rencana pengamanan untuk mencegah pembobolan

Keamanan Komputer • Pengamanan yang disarankan : • Terapkan rencana pengamanan untuk mencegah pembobolan • Miliki rencana jika pembobolan terjadi • Buatlah backup • Hanya ijinkan akses untuk pegawai tertentu • Ubah password secara teratur • Jagalah informasi yang tersimpan dengan aman • Gunakan software antivirus • Gunakan biometrik untuk mengakses sumberdaya komputasi • Rekrut tenaga kerja/pegawa yang bisa dipercaya

Case: Kevin David Mitnick • • • August 63 – Born At 12 –

Case: Kevin David Mitnick • • • August 63 – Born At 12 – by pass the punch card system used in the Los Angeles bus system At 16 - He broke into DEC's computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. Mitnick fled, becoming a fugitive for two and a half years. Mitnick gained unauthorized access to dozens of computer network. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country's largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail. Mitnick was apprehended on February 15, 1995 in Raleigh, North Carolina. [4] He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification

 • The FBI arrested Mitnick on February 15, 1995, on federal offenses related

• The FBI arrested Mitnick on February 15, 1995, on federal offenses related to a 2½-year period of computer hacking. [6] • In 1999, Mitnick confessed to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication. He was sentenced to 46 months in prison plus 22 months for violating the terms of his 1989 supervised release sentence for computer fraud. He admitted to violating the terms of supervised release by hacking into Pac. Bell voicemail and other systems and to associating with known computer hackers, in this case co-defendant Lewis De Payne. • Mitnick served five years in prison — four and a half years pre-trial and eight months in solitary confinement — because, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone“ [8] He was released on January 21, 2000.

 • During his supervised release, which ended on January 21, 2003, he was

• During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone. Mitnick fought this decision in court, eventually winning a ruling in his favor, allowing him to access the Internet. • Mitnick now runs Mitnick Security Consulting LLC, a computer security consultancy.

 • http: //www. bbc. com/indonesia/majalah/2015/07/1507 09_majalah_finnish_hacker • http: //www. liputan 6. com/tag/cybercrime

• http: //www. bbc. com/indonesia/majalah/2015/07/1507 09_majalah_finnish_hacker • http: //www. liputan 6. com/tag/cybercrime

Referensi • Heru Priyanto, S. T. , MBA, “Materi Kuliah Computer Crime”

Referensi • Heru Priyanto, S. T. , MBA, “Materi Kuliah Computer Crime”