According to the Organization of European Community Development (OECD) cyber crime is all forms of illegal access to data transmission. That means, all forms of illegal activities in a computer system are included in a crime. In general, the notion of cyber crime itself is usually interpreted as a crime in the realm of cyberspace which utilizes computer technology and internet networks as targets. Like what has been mentioned, this cyber crime action arises along with the increasingly incessant digital technology, communication and information

Examples of Cyber ​​Crime Crimes

 The following are examples of cases of cyber crime that occurred in Indonesia and in the world.

1. Faking Someone’s Facebook Account

One of the most common examples of cyber crime is the cloning of someone’s Facebook account. This action is rife for public figures or famous figures who have many followers. With so many attentions received by a clone account, counterfeiters will usually get faster victims. Cyber ​​crime models usually charge money by transferring to a particular account. So, don’t believe it easily if you are contacted by someone who claims you need help.

2. WannaCry Ransomware Phenomenon

A few years ago the digital universe was enlivened by the appearance of the WannaCry Ransomware computer virus that was able to lock a person’s computer data. To be able to open and access the data, all you have to do is buy a ransom through the Bitcoin wallet.


Types of Cyber ​​Crime

After knowing about the understanding of cyber crime and its case examples, the following are the types of cyber crime that occur in the world.

1. Data Theft

This cyber crime activity is usually carried out to fulfill commercial interests because there are other parties who want the other party’s confidential data. This action is certainly illegal in entering into criminal activities because it can cause material losses that result in the bankruptcy of an institution or company.

2. Cyber ​​Terrorism

Cyber ​​terrorism is an act of cyber crime that is being fought by many major countries in the world, including Indonesia. Because the activities of cyber terrorism often threaten the safety of citizens or even stake holders who govern the course of government.

3. Hacking

The next type of cyber crime is Hacking. The dangerous actions that are often carried out by professional programmers are usually specifically targeting weaknesses or gaps in the security system to gain benefits in the form of material or personal satisfaction. If you view the activities carried out, hacking actually does not always have a bad connotation because there are also positive hackers who use their abilities for beneficial and not harmful activities. For example, a hacker who is given the task to track down the whereabouts of a fugitive or a hacker who collaborates with the authorities to eradicate illegal activities in the digital realm.

4. Carding

Carding is a term used to refer to misuse of other people’s credit card information. Carders usually use other people’s credit cards to buy groceries online. Then, the free goods are resold at cheap prices to get money. Digital crime by carding usually occurs overseas, while for users in Indonesia the number of cases recorded is not too large due to the lack of credit card users who like to transact in cyberspace.

5. Defacing

Among the previous cyber crime acts, Defacing is arguably the lightest online crime activity. This is partly because defenders usually target non-profit websites such as government sites, schools, or universities.

6. Cybersquatting

The term cybersquatting may not be so familiar among users in the country. Naturally, it is because the act of seizing domain names itself does require capital and foresight that many people do not have. The result of this cyber crime is usually in the form of ransom which is not fair in value.

7. Cyber ​​Typosquatting

Almost similar to cybersquatting, cyber typosquatting actions are both targeting domain names belonging to well-known companies to be targeted. The difference, this activity utilizes the similarity of domain names and negligence of users who rarely re-check the URL of the company’s website. One of the objectives of cyber typosquatting is to bring down the good image of the brand concerned by committing fraud or other illegal things that violate the law.

8. Spread Illegal Content

Spreading illegal content that violates the law becomes the most widely watched cyber crime case. The reason is, this activity usually involves famous figures or content that is capable of provoking controversy. Some examples of illegal content included in the realm of cyber crime include pornographic videos, illegal firearm sales, buying and selling narcotics, and so on.

9. Malware

As we explained in the article about the dangers of malware, you should be more vigilant if you don’t want your computer or website to experience problems. In general, malware consists of various types, there are viruses, Trojan horses, adware, worms, browser hijacker, and so forth.

How to deal with Cyber ​​Crime

1. Making the Law

The most elegant way so that cyber crime is not more rampant is to make regulations that are included in the Act. Law enforcement later will make cybercriminals think long before committing criminal acts because the legal basis is clear. In Indonesia, the rules regarding cyber crime currently are based on the ITE Law. However, unfortunately the action pattern is still not maximal and often seems forced. Law enforcement in cyberspace is indeed still gray because electronic documents themselves cannot be used as evidence by the Criminal Code.

2. Establish a Special Handling Institution

You are certainly no stranger to the Cyber ​​Crime Police Headquarters Division. Well, now we need special institutions like that to ward off and investigate the potential for crime in the digital sphere. Some countries have already begun to implement this concept by forming special institutions that deal with cyber crime issues, however this will only be effective if implemented by many countries, so there is no gap for cyber crime perpetrators wherever they are.

 3. Strengthening the System

The security system is the first fortress we can rely on to avoid potential cyber crime. To secure the system independently you can add a number of add ons such as SSL Certificates on websites, computer antivirus, to doing physical security on the network to protect the server

4/5 (1 Review)


Please enter your comment!
Please enter your name here