Such crimes may threaten a nation’s security and financial health.
Issues surrounding this type of crime have become high-profile,
particularly those surrounding cracking, copyright infringement, child
pornography, and child grooming. There are also problems of privacy when
confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in
cybercrimes, including espionage, financial theft,
and other cross-border crimes. Activity crossing international borders
and involving the interests of at least one nationstate is sometimes
referred to as cyber warfare. The international legal system is
attempting to hold actors accountable for their actions through the
International Criminal Court.
Types cybercrime
A. cybercrime is based targeting crime. cybercrime can be devided become 3 types :
1. Cybercrime Against Person :
This type of crimes, targeted attacks directed against individuals or individuals who have given their nature or according to objective criteria such attacks
2. Againts Property
Cybercrime committed to disrupt or attack the property of others. Some examples of these types crimes such as illegally accessing a computer through the cyber world, possession of unauthorized electronic information / information theft, carding, cybersquating, hijacking, data forgery, and all activities that are detrimental to other people's property
3. Againts Government
Cybercrime Against Government done with special purpose attacks against the government. These activities such as cyber terrorism as an act that threatens the government as well as cracking to the official website of the government or military sites.
B. Based on the pattern of activities that do, cybercrime can be classified into two types as follows:
1. Cybercrime as a purely criminal act
Pure evil is a crime is a crime committed because of criminal motives. Crimes of this type typically use the Internet only as a means of crimes. Examples of these crimes is Carding
2. Cybercrime as a crimes "gray"
On the type of crimes on the internet are included in the "gray", is quite difficult to determine whether it is a criminal offense or not the activities are sometimes not given a motive for the crimes. One example is probing or portscanning
C. Based on the type of activities done, cybercrime can be classified into several types as follows :
1. unauthorized Access
A crime that occurs when a person entering or breaking into a computer network system illegally, without permission, or without the consent of the owner of the computer network system that entered
2. illegal Contents
Committed a crime by entering the data or information to the internet about something that is untrue, unethical, and may be unlawful or disturbing public order
3. Deliberate spread of virus
The spread of the virus is generally carried out using email. Often times people are exposed to the email system does not recognize this virus. The virus is then transmitted to another place via email
4. data Forgery
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
5. Cyber Espionage, Sabotage, and Extortion
Cyber Espionage is a crimes that utilizes the Internet to conduct espionage against the other party, to enter the target networked systems
6. cyberstalking
This type of crime to interfere with or harass a person by using a computer
7. carding
Carding is a crime committed for stealing credit card numbers belonging to others and used in commercial transactions on the internet
8. Hacking and Cracker
The term hacker is usually refers to someone who has great interest to study in detail the computer systems and how to improve capabilities. As for those who frequently take strong action on the net destruction is typically called a cracker. Arguably this cracker is a hacker who is actually the ability to utilize things that are negative
9. Cybersquatting and Typosquatting
Cybersquatting is a crime committed by registering the domain name of the company of others and then try to sell them to companies with higher price
10. hijacking
The crimes of piracy hijacking other people's work.
11. cyber terrorism
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking into government or military sites