Analysis Of Issue Cyber Crime Information Technology Essay

Cyber crime is not a common issue happening in Malaysia. We read about it in newspapers very often. It is a criminal activity committed on the internet. In broader and understanding term, it can be said that” everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money”

It had been reported that year 2009, more than 4,000 cyber crime cases reported in Malaysia within two years. It had been lodged with Cyber security Malaysia. According to its chief executive officer Lieutenant-Colonel Husin Jazri said that the complaints mostly consisted of hack threats, fraud, denial of services and other computer problems such files lost or corrupted by viruses.

In year of 2008, a total of 2,123 cases reported .Society now days are depending on the advanced of ICT. Activities from the music download and computer games, purchasing books and magazine, getting new fiends are all involved through ICT and internet. Advancement of ICT and internet actually Cybercrime happened every 0.25 seconds in everyone of five internet user. The easiest place of cybercrime occurred through any of socials websites. Cyber crime is the latest and perhaps the most complicated problem in the cyber world.

There is different type of cyber crime occurred in Malaysia. Therefore, government plays an important role on how to prevent this issue from spreading. Government implemented few acts and with the collaboration with cyber security of Malaysia will eventually prevent this cyber crime.



From the chart above, the amount of cyber crime is increased in most of the item classify in above. Spam is the item that has increase the most in its total case, from 0 cases in January increased to 120 cases in August. Total cases of all items are also increased from 381 cases in January to 742 cases in August.

Analysis of Issue Cyber crime.

Generally, there are few acts which may likely amount to cyber crimes which is unauthorized access , email bombing by sending a large amount of mail to cause the targeted email account, phishing by creating fake websites and the common cases such as virus/woman attack , Trojan attack and salami attack.

Types of Cyber crime

1. Salami Attack.

Salami attack has once happened in Malaysia. A banker worker makes changes to the banking system so that the system will deduct RM 0.05 from every client’s account and be transferred to his own account. The client may not aware of this in a single case but at whole the worker has made a lot of money from this event.

Although the bank many times said that safety is a priority, in fact, there are still has consumers who complained of losing money through transactions carried out, without conscious or aware. The reason given by the bank of what had been happened is not their fault because all of the transactions that have provided guarantees of safety features are high.

2. Email bombing

Email bombing is one of the major issues happening in Malaysia. Every of the email account user will experience this email bombing. There is one example issue where fake email using the name of Samsung one of the corporate brand name for electronics.

The announcement that made by irresponsible party such as the name of the winner of the contest will be published in the media and Samsung Malaysia website that is In fact, the winners will be contacted to be informed of their victory by the agency appointed by Samsung Malaysia.

The public is advised to ignore e-mails sent to individuals and claimed that they had won cash prizes of Samsung Corporation or Samsung Promo Board. In fact, Samsung Malaysia Electronics (SME) Sdn. Bhd never use any e-mail or short messaging service (SMS) to communicate with the  winner of the contest or to get their bank account information.

3. Phishing

Phishing is one of the biggest concern issues in Malaysia. This phishing normally occurred in the banking sector where one of the hackers favorite is to create a fake websites.

According to a computer expert “with only a computer, Internet and browser software, someone can create a website to dissipate bank customers’ millions of dollars of money.” In fact, to create a fake web site, they do not require a long time, only about one to two hours.

However, they cannot imitate the URL (domain address) from the website because they are protected, but they can create an alternative network to mislead bank customers. This is not a strange thing. Recently, National ICT Security & Emergency Response Centre (NISER) detect the fraud occurred. At the same time, the police arrested four university students and nine others for creating fake Web sites of local banks to steal customers’ information before them withdrawing their money.

4. Pornography

Pornography is also one of the cyber crimes. The easy access of internet, teenagers able access to pornographic websites to view the pornographic materials such as pictures and video. It begins with the magazine and publication of printed pornographic material, next to that era and the latest porn video, pornographic materials in the format High-Definition (HD) which is available on the Internet. Nowadays information technology also enables these materials are also distributed via e-mail and provides a challenge to the authorities in implementing preventive actions. This evolution is worrying because these pornographic materials may give negative effects such as stimulating a person to commit sexual assault. It could also impede the growth of children and adolescents who have access to these materials because they would be fancy and hard to concentrate.  

Roles of players for prevention

i) Malaysian cyber laws

Does Malaysian cyber laws and implementation work well? Malaysian has implemented few acts to overcome issue of cyber crime. Malaysian cyber laws act are as below:

Computer Crime Act 1997

Digital Signature Act 1997

Communications & Multimedia Act 1998

This is the laws that determine how computer users in the country should conduct themselves, their businesses and handle their data on the internet and intranets.

Computer Crime Act 1997

-Gives protection against the misuse of computers and computer criminal activities such as unauthorised use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks.

-Users can protect their rights to privacy and build trust in the computer system.

-The government can have control at a certain level over cyberspace to reduce cyber crime activities.

Digital Signature Act 1997

-Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message.

-By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data

Communications & Multimedia Act 1998

-The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia.

ii) Role of individual

Besides the Cyber law or Cyber security Malaysia, an individual plays an important role to curb this cyber crimes occurred. An understanding of knowledge of computer system. User of computers must make the password is the combination of alphanumeric which is alphabet and numbers. Besides that, do not open any of suspicious mail or unknown emails. Users of online banking account have to check frequently to make sure there is no fraud withdraws occurred. Any of the credit transaction, use the trusted credit card. Make sure, user checked the online website banking date and time whether it match with the date and time for the last registration f bank account is affected, fast action should be taken and reported to the bank in charge.

iii) Cyber Security in Malaysia.

Cyber security in Malaysia is one of the national cyber security specialists under the purview of the Ministry of Science, Technology and Innovation, Malaysia (MOSTI). It provide support to enforcement agencies and victims, in ensuring that justice will prevail regardless of the “space” where a particular crime is conducted.

It assists in cyber forensics and analysis such as analyzing evidence and providing expert witnesses for relevant cases. In order for enforcement agencies to fulfill their roles, they require processes, role players, technical support and specialist centers aid in analyzing and solving technical problems to help the judicial process.

Cyber security aims to create a culture of info- security among Malaysian by building a culture awareness programmers and best practices among children, teenagers, parents and organizations. We have organized and created many activities to improve the level of awareness in information security.

Example, if we subscribe to Internet banking, we should learn about the risk factors. We must be aware of the risk in dealing with people on the social networking like facebook. We should never blindly trust people and we must be critical about what we read and see.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more