What is Cybercrime? recognize Types, Tools, Examples - Along with the development of Science and Technology, has led humans to a glorious civilization with the emergence of the internet as a product of technological developments.
make the world turn global so that the earth feels like it has no boundaries, because even though they are in different countries, but through smartphone technology, they can communicate via chat, voice calls, or directly using video calls. even easier to implement. Likewise, the pilgrimage to Mecca which used to feel so far away that it took months to get there, but now with the current advances in science and technology, when you take a plane it feels very close, it only takes a matter of hours to get there.
But on the other hand, with the advancement of science and technology, it turns out to have a negative impact because through the development of the internet, many new versions of crimes have emerged, one of which is cyber crime. Advances in information technology are like two sides of a coin, one side provides benefits for the benefit of the people and the other side destroys the people, including the emergence of cyber crime, prostitution, online prostitution and so on.
This cyber crime cannot be underestimated, because the perpetrators are not ordinary people who only play at the level of ordinary ordinary people, but they are great people who control the internet and its applications that can propagate government-owned websites.
As in 1999 it was recorded in the Kompas newspaper that the website of the Unitary State of the Republic of Indonesia was damaged by cybercriminals. Not only in Indonesia, but in the United States, the practice of cyber crime has also succeeded in penetrating the database of America Online, a company engaged in e-commerce. Electronic commerce, even though the database of AOL service users already has a high level of protective protection. Even the site of the Federal Bureau of Investigation was attacked by cyber crime so that the FBI site had not functioned for some time.
The word cyber crime is derived from the word cyber which means the internet or cyberspace while the word crime means crime, so simply it can be concluded that cyber crime is all forms of crimes committed by a person, group or corporation in the virtual world of the internet by utilizing the development of information technology. increasingly sophisticated internet.
There are at least seven forms of cyber crime, namely:
1. Unauthorized access to computer system and service
which is a crime committed by infiltrating and entering without permission of a computer network system without the knowledge of the owner of the computer network system with the aim of sabotage stealing confidential data, although some of the perpetrators are just for fun.
idly trying his skills to infiltrate a system that has a high level of protection. This model is increasing day by day along with the development of internet technology, where the perpetrators of crimes like this are often called hackers or intruders.
2. illegal contents
which is a crime by entering data or information into the internet regarding unethical information that can disrupt public order, such as loading false information related to state secrecy to provoke propaganda against the government. Or contain something, slander, pornography that can discredit the dignity of the dignity of others or contain false news.
The illegal contents model can be used by perpetrators to deceive by offering a product in an advertisement on the website as if the item exists and is real so that people who see it are interested and then buy it by transferring the payment via ATM to the perpetrator's advertiser then after the money is sent by the victim but the goods ordered by the buyer did not come as a result the victim was sad because he had been deceived.
3. Data forgery
is a crime by falsifying data on important documents stored as scriptless documents via the internet. This model of cyber crime is usually aimed at e-commerce documents by making it appear as if there was a typo in the data which in the end the perpetrators profit from this error.
4. Cyber espionage
is a crime by spying on other people by utilizing the internet network on the computer network system. This crime is usually aimed at business rivals by spying on documents or important data stored on their computerized systems. If the important data includes the most confidential data, then the perpetrator may proceed to extortion by threatening the victims via e-mail to force the victim to do something the perpetrator wants.
5. Cyber sabotage and extortion or cyber terrorism
namely crimes committed by creating viruses to disrupt, damage or destroy data, computer programs connected to the internet. Perpetrators of this crime are usually carried out by infiltrating logic bombs such as malware in the form of viruses, worms, Trojan horses, adware, browser hijackers and so on so that the operating system software on the computer program cannot function as usual, but the computer is controlled by the perpetrator so that according to the will of the perpetrator.
So if the perpetrator has controlled the victim's computer, the perpetrator will offer himself to the victim to repair the data, computer program or computer network system that has been sabotaged to be repaired for a certain fee.
6. Offense against intellectual property
namely crimes on the internet against Intellectual Property Rights owned by someone such as illegally imitating without the owner's permission to display someone's web page even though it has been confirmed by the owner of the web page.
Or broadcast information about other people's trade secrets on the internet. In other words, defame a person's company either through social media WhatsApp, facebook, twitter, instagram, skype, camfrog, mirc or spread it through the email mailing list so that everyone knows the company's important secrets.
7. infringements of privacy
which is a crime against someone's personal data which is very confidential which is stored in a computerized system where if the personal data is discovered by other people, the person concerned will suffer material and immaterial losses. Examples of highly confidential personal data include credit card numbers, ATM pin numbers or confidential disease information and so on.
Even if the perpetrator does not physically get the victim's credit card but the perpetrator has pocketed the victim's credit card number through the card generator software on the internet, a carding case will occur and will harm many people, not only the card owner but other people will also become victims, where the perpetrator steals credit card numbers.
The seller makes a transaction in e-commerce then after the transaction the goods are sent by the seller and arrive in the hands of the perpetrator. Ironically, when the seller who had sent the goods wanted to withdraw the money at the bank, the bank turned out to be rejected because the owner of the credit card was not the person who made the transaction with the seller.
Almost every activity that we do on a daily basis in cyberspace all provide opportunities for cyber crime to occur, even though at this time we are almost always connected to the internet so it is very impossible for us who live in today's era to be ignorant.
But we must always be vigilant and careful by deepening our knowledge as much as possible about the features we use on the internet, especially matters relating to the possibilities that cybercriminals can exploit to abuse digital technology against us.