A. Definition and Types of Cyber Crime
A. Understanding The Language and Terminology
Cyber crime (cyber crime) is a new term in the literature of criminal law and criminology. The
term cyber crime is emerging as the advent of the internet which is a
system of information and communication in cyberspace (virtual world)
are no longer bound by national borders and are global.
viewed in terms of language, cyber crime is composed of two words, ie,
and cyber crime or in the Indonesian language can be interpreted and
cyber crime. As
is the crime, according to Big Indonesian Dictionary is: the act of
evil, the nature of evil, sin, behavior contrary to the values and
norms that apply that have been authorized by written law. Meanwhile,
according to Soedjono, crime can be regarded as a violation of human
action / conflict with what is specified / contrary to the rule of law,
he asserted that the act violates the prohibition set forth in the rule
of law in societies where the concerned resident.
terms of the term (terminology), according to British police, cyber
crime are all kinds of use of computer networks for criminal purposes
and or high-tech criminals to abuse the ease of digital technology.
Safitri argues, is the type of cybercrime crimes related to the use of a
seamless information technology and has strong characteristics with an
engineering technology that rely on high levels of security and
credibility of the information presented and accessed by Internet
2. Various kinds and forms of cyber crime
In line with kkemajuan information technology, led to several crimes that have new characteristics. The
offense is a crime arising from the misuse of information technology
which is marked by the birth of the internet that make up the cyber
space. Crime is then referred to as cyber crime. There are various kinds and forms of cyber crime. Among them are:
a. Joy Computing, namely the use of other people''s computers without permission. This includes theft of computer operating time.
b. Hacking, which is accessing illegally or without authorization by means of terminal suaut.
Trojan Horse, namely the manipulation of data or program by changing
data or instructions in a program, erase, add, making unaffordable for
the purpose of personal gain or any other person.
Leakage, which is related to the leaking of data to the outside,
especially regarding the data should be kept confidential. Disclosure
of computer data that can be a state secret, the company, which was
entrusted to one''s data and data in a given situation.
e. Diddling data, which is an act that changes the valid or invalid data in a way not valid, change the data input or output data.
f. To Frustate data communication or computer waste.
g. Software Piracy, which is software piracy of copyright-protected intellectual property.
the seven types of cyber crime, it seems that the core of cyber crime
is an attack on the content, computer systems and communication systems
owned by others or the public in cyberspace.
There is also a group of cyber crime as follows:
a. Unauthorized Access to Computer System and Service. Crimes
committed by mamasuki / infiltrate into the computer network illegally,
without permission or without the consent of the owner of the computer
network system that entered.
b. Illegal Contents. A
crime by entering the data or information to the internet about
something that is untrue, unethical, and may be unlawful or disturb
c. Forgery of data. A crime by falsifying data on important documents stored as scriptless document over the internet.
d. Cyber Espionage. A
crime that utilizes the Internet to conduct espionage against the other
party, by entering into a computer network system (computer network
system) the target.
e. Cyber Sabotage and Extortion. Crime
is done by creating a disturbance, destruction or demolition of a data,
computer program or system of computer networks connected to the
f. Offense Against Intellectual Property. These crimes directed against intellectual property rights of any party on the internet. An
example is the imitation of the appearance of the web page of a site
owned by others illegally, broadcasting the information on the internet
which was a trade secret to others and so on.
g. Infrengements of Privacy. These crimes directed against a person who the information is very personal and confidential. These
crimes are usually directed against one''s testimony in the form of
personal data stored in computerized, which if known by others will be
able to harm the victim is in material or immaterial such as credit card
numbers, PIN numbers, ATM numbers, a hidden defect or disease and so
the various kinds of cyber crime classification above, cyber crimes
that often occur, especially in Indonesia is a crime in the form of
credit card theft by chronology; track name, credit card numbers has its
expire date (due date) a person to be owned and used as a means to do the crime, the tracking can be done through the chat, or go to certain sites that display the credit card number. After
getting everything, then the actors perform transactions or ordering
goods over the Internet with certain companies that provide purchase and
shipping of goods via the internet.
more information about the discussion clearly criminal Cyber Crime in
Indonesia in the form of paper please visit my blog on the related
Please give a star for this resensiku assessment. Thank you.