cyber crime
Recently Published Documents


TOTAL DOCUMENTS

753
(FIVE YEARS 285)

H-INDEX

14
(FIVE YEARS 2)

2022 ◽  
Vol 68 ◽  
pp. 100520
Author(s):  
Yuriy Timofeyev ◽  
Oksana Dremova
Keyword(s):  

2022 ◽  
Vol 6 (1) ◽  
pp. 1-8
Author(s):  
Ni Made Liana Dewi ◽  
I Made Wahyu Chandra Satriana

The social order in the digital era is increasingly diverse through interaction and communication using high-tech devices. However, this often causes violations and disturbances to public order and harms others (cyber crime). Based on the background above, there is problem formulation in this research, namely what is the legal basis for determining data confiscation in cyber crime and what the mechanism for data confiscation in cybercrime is. The type of research used is normative, namely seeing and analyzing from the point of view of legislation and applicable norms, especially those related to the problems in this research. The result of discussion is that the legal basis for data confiscation in cyber crime is referring to Law no. 11 of 2008 concerning Information and Electronic Transactions (ITE). This law contains regulations regarding the management of information and electronic transactions at the national level, with the aim that information technology development can be carried out optimally, evenly, and spread to all levels of society in order to educate the nation's life, while the mechanism for confiscation of data in cyber crime begins with electronic data in the form of writing, images and sound or all three are intangible and cannot be seen/heard.


Author(s):  
Nabila Malik

Abstract: Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness. This paper provides you vast information about methods of Cyber crime, Software used to perform cyber crime and a research study on them. In this paper you will also learn how can a software and its algorithm perform, what footprints your device left, what are the loopholes which help that software. This will help you for a better understanding of the software which were used to perform cyber crime and how can you prevent yourself from such activities. If you are a Forensic Expert than you will learn about the software tools which are used in computer forensic. I have analyzed many tools and I will share my study in this paper. After reading you will come to know how forensic science expert backup a hard drive, or how hackers steal your information.1 Keywords: Cybercrime, Hacking, Ethical hacking, Virus, Security, Cyber Security, Network Security.


2021 ◽  
Vol 6 (2) ◽  
pp. 99-124
Author(s):  
Raden dimas ari wibowo Dimas ◽  
Vivi Arfiani Siregar
Keyword(s):  

Hukum yang salah satu fungsinya menjamin kelancaran proses pembangunan nasionalsekaligus mengamankan hasil-hasil yang telah dicapai harus dapat melindungi hak parapemakai jasa internet sekaligus menindak tegas para pelaku cyber crime. Maka, pentingbagi pemerintah untuk memberlakukan Undang-Undang Nomor 19 Tahun 2016 tentangPerubahan Atas Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan TransaksiElektronik, yang melakukan pengawasan memblokir situs-situs fraud, dan merancangsistem yang baik untuk melindungi masyarakat dari ancaman cyber crime. Dalammelakukan penulisan, memerlukan adanya masalah pokok sebagai perincian pembahasanberupa pengaturan kejahatan carding dalam hukum pidana Indonesia dan upaya hukumdalam penanggulangan terhadap kejahatan carding Di Indonesia. Dilihat dari jenisnya,penelitian hukum ini adalah penelitian hukum normatif. Penelitian ini bersifat deskriptifanalisis dari hasil penelitian ini diharapkan diperoleh data yang menggambarkan secaramenyeluruh, jelas dan sistematis. Dalam kaitannya dengan tindak pidana kejahatan cardingdi Indonesia, sanksi yang di tetapkan terhadap terdakwa didasarkan pada Undang-UndangITE sebagai lex specialis. KUHP sebagai lex generais, tergantung pada penilaian hakimterhadap fakta persidangan dan alat bukti yang dihadirkan. Peningkatan upaya pencegahandini terhadap kemungkinan terjadinya potensi suatu gangguan keamanan dan ketertibanumum serta pelayanan masyarakat meliputi kegiatan penyuluhan hukum seperti melakukanseminar kesadaran hukum di masyarakat, patroli atau razia di tempattempat tertentu yangterindikasi adanya kejahatan carding, dan mengadakan koordinasi dengan instansi terkaitdan masyarakat dengan tujuan memperdayakan


Author(s):  
Natanael Christianto ◽  
Wiwin Sulistyo

Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime. Cyber crime can be done by all internet users, without exception, to earn a profit. Security monitoring system server through the app messenger Telegram can help administrators in the work because always be on standby in front of the server computer. Notice of Snort as IDS via Telegram also quicked and can be accepted anywhere. In taking action when the server something happened not too late. Target cyber crime also can attack anyone without exception. A system should be a strength, with the protection of a secure network that will be difficult to hack by hackers. The server is the main target in the conduct of cyber crime. The use of the server must maintain to secure all the data is not misused by persons who are not responsible. Each server is a system that should be an administrator as a guard on duty watching and taking action when something happens on the server. To monitor a server, an administrator should always standby in front of the server computer so as not to late take action when the server is about to happen something.


Author(s):  
Eko Budi ◽  
Dwi Wira ◽  
Ardian Infantono

Konsep Society 5.0 berpusat pada manusia dan berbasis teknologi. Dimana penggerak utama industri adalah teknologi dan masyarakat modern. Di era teknologi dan informasi berkembang dengan pesat memiliki dampak terhadap seluruh aspek kehidupan. Salah satunya adalah aspek keamanan berupa ancaman cyber crime. Oleh karena itu cyber security mempunyai peran vital untuk mencegah terjadinya cyber crime. Tujuan dari penelitian ini adalah untuk memperoleh gambaran tentang cyber crime dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka mewujudkan keamanan nasional di era society 5.0. Metode penelitian yang digunakan adalah pendekatan kualitatif dan deskriptif analitis dengan teknik pengumpulan data menggunakan studi pustaka dari penelitian sebelumnya dan data sekunder lainnya. Hasil dari penelitian ini adalah pandemi Covid-19 menjadi topik utama dalam tren keamanan siber. Para peretas memanfaatkan keresahan masyarakat sebagai celah dalam meluncurkan berbagai serangan, mulai dari phishing hingga ransomware, kasus kebocoran data 91 juta pengguna situs belanja online Tokopedia dan kebocoran data 1,2 juta pengguna situs Bhinneka. Indonesia pun terdampak oleh kasus keamanan siber global seperti Coronavirus Ransomware, Covidlock Malware, peretasan Border Gateway Protocol, kerentanan pada produk router Draytek Vigor, adanya Remote Code Execution pada beberapa versi produk sistem operasi Windows, kerentanan terjadinya Arbitrary Code Execution pada seluruh sistem operasi Google Android, hingga eksploitasi produk Solar Winds Orion Platform. Kesimpulannya adalah saat ini Indonesia tengah dalam keadaan darurat cyber security dan sudah mencapai tahap memprihatinkan. Strategi cyber security yang harus dilakukan Indonesia untuk mewujudkan keamanan nasional di era society 5.0, adalah 1) capacity building, 2) Pembentukan undang-undang khusus tentang tindak pidana siber, 3) Peningkatan sumberdaya manusia, 4) Kerjasama stakeholder di dalam negeri dan kerjasama internasional bidang cyber security untuk mewujudkan keamanan nasional di era society 5.0.


2021 ◽  
pp. 129-134
Author(s):  
O. ZHEREBETS

The article substantiates the importance of universally recognized international principles in the field of international security. The scientific article outlines legal framework of international security law and grounds for increasing the number of basic principles of international law.


2021 ◽  
pp. 251-259
Author(s):  
edit Bregu

The security challenges for Communication and Information Systems in Albania include all levels of the structures of the Ministry of Defense and the Armed Forces, starting from the individual equipment used in official working environments, to the provision of basic systems, which are critical to job performance. Some of the challenges that characterize this situation and their orientation for the future include: Th increasing threats in cyberspace, internet and mobile devices, social networks and portals, communication and transmission of information, creating a cybercrime market, espionage and sabotage, privacy and identity, anonymity and attributes, financial constraints, asymmetry of cyber warfare, etc. These will be some of the issues that this paper will try to address with reference to domestic and foreign literature, national and international legislation on cybercrime.


2021 ◽  
pp. 1279
Author(s):  
Cindy Cindy ◽  
Lydia Imelda Rachmat ◽  
Yahya Abdi Nugroho ◽  
Tatang Ruchimat

Information technology has important functions both now and in the future. Advances in technology make it easier for us to get information, but apart from having a good impact, technology can also have a bad impact, such as breaking the law. One example of a violation of the law on social media is cyber crime, which uses computers as a tool or target for criminal means (Widodo: 2011). The spread of fake news is an example of cyber crime that is quite rampant in Indonesia. no exception in the current pandemic, it also makes people afraid of information on social media and sometimes panics. The rise of this incident has made law enforcement in Indonesia run a cyber patrol system with the aim of monitoring the activities of spreading fake news (hoaxes), or the movement of terrorist networks, as well as other crimes related to social media. This is regulated in the ITE Law, Article 390 of the Criminal Code, Articles 14 and 15 of Law No.1 Year 1946 which is the legal basis for handling cyber crimes. The police are trying to overcome all the impacts of hoaxes and cybercrimes by establishing the Directorate of Cyber Crime. using research methods that focus on secondary data processing and data analysis is carried out qualitatively using deductive logic (Soekanto and Mamudji 2007). The results of this study are known that cyber crimes, especially hoax news, create panic in the community and solutions that can be done in overcoming these crimes that occurred. Teknologi informasi memiliki fungsi penting baik sekarang maupun di masa depan. Kemajuan teknologi mempermudah kita untuk mendapatkan informasi, namun selain berdampak baik teknologi juga bisa berdampak buruk, seperti pelanggaran hukum. Salah satu contoh pelanggaran hukum di media sosial adalah cyber crime, yang menggunakan komputer sebagai alat ataupun sasaran untuk sarana kejahatan (Widodo:2011).Penyebaran berita bohong merupakan salah satu contoh kejahatan siber yang cukup marak terjadi di Indonesia .Persentase penyebaran berita bohong sangatlah tinggi tidak terkecuali di masa pandemi seperti saat ini,juga membuat masyarakat menjadi ketakutan dengan informasi yang ada di media sosial dan  terkadang membuat menjadi panik.Maraknya kejadian ini membuat penegak hukum di indonesia menjalankan sistem patroli cyber dengan tujuan untuk memantau aktivitas penyebaran berita bohong (hoaks), atau pergerakan jaringan terorisme, serta kejahatan lainnya yang berkaitan dengan media sosial. Hal ini diatur dalam UU ITE, Pasal 390 KUHP, Pasal 14 dan 15 UU No.1 Thn.1946  yang menjadi landasan hukum terhadap penanganan kejahatan dunia maya. Kepolisian berupaya untuk menanggulangi semua dampak dari berita bohong (hoaks) maupun kejahatan dunia maya dengan membentuk Direktorat Tindak Pidana Siber.Artikel ini dibuat dengan tujuan agar masyarakat bisa lebih kritis terhadap setiap berita yang disebarkan di media sosial dan semakin bijak dalam menggunakannya .Dalam artikel ini menggunakan metode penelitian yang berfokus pada data sekunder pengolahan dan analisis data dilakukan secara kualitatif dengan menggunakan logika deduktif(Soekanto dan Mamudji(2007). Hasil dari penelitian ini diketahui bahwa kejahatan siber terutama berita hoaks membuat panik masyarakat dan penyelesaian yang dapat dilakukan dalam mengatasi kejahatan-kejahatan yang terjadi


Sign in / Sign up

Export Citation Format

Share Document