Tuesday 15 December 2009

Poster



This is the poster that i designed~

tutorial question

Andrew is a computer science student attached with Microhard Corporation in Cyberjaya as a practical trainee. One day he managed to crack the company’s information system but did not do anything afterwards. The following day he also managed to intrude into Microhard Corporation’s website system and then posted his picture on the front page of the website and left his mobile number below his picture, hoping that someone will call him and make friends. Subsequently his phone rang, but unfortunately it was his training manager who called and later warned him that actions will be taken. Upon investigation, it was also revealed that Andrew had previously leaked the company’s system access code to his friends at University, to whom he also sent emails telling bad things about his manager. Advise Microhard Corporation in Various potential liabilities of Andrew from the above incidents, with reference to various cybercrime laws applicable in Malaysia.
Issue 1:
Andrew who works as a practical trainee in Microhard Corporation is using his computer knowledge to perpetrate crimes. His cracked the company’s information system without doing anything on it. But the act of him had been again the law of Computer Crimes Act 1997 in section 3(unauthorized access). And Andrew will be charge under the law of unauthorized access which is under Section 3(1): A person shall be guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case.

As a computer science student in University, the education of the basic law knowledge will be attach in the learning syllabus. I believed that Andrew doing all this is under the condition of sober. And all this is will possible bring him the punishment of liable to a maximum RM 50,000.00 fine or to 5 years imprisonment or to both.

Issue 2:

The following issue is about after he unauthorized access the computer system in Microhard Corporation the next day he access to the system again and posted his picture and mobile number on the front page of the system this act also had been again the law of Computer Crimes Act 1997 , section5(1) for unauthorized modification.

Like I mention just now, Andrew should have the ideal with what his doing now is illegal and is the act of again the law of Malaysia. So it is not excuse for what he did to the system of that company. The modification content in the system is a serious crime. And it can be influence the user of the system. Even he dint bring of harm to the system but there still is exist of possibility steal and destroy of the data of the system. So he will be punish with further intention of causing injury, it can be punished up to RM 150,000.00 fine or 10 years imprisonment or both.

Issue 3:
The third issue is the company found that he leaked the company's system access code to his university friends. And during that time he is under the investigation; He also sent emails telling bad things about his manager.
And all of his act is absolutely again the law of Computer Crimes Act 1997 in section 6(1).which is A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate. And this action can make the secrete of the company split to the public and cause the company in the trouble. So this act will punish with maximum RM 25, 00.00 fine or 3 years imprisonment or both.


Meera has been receiving emails from travel companies that keep offering her holiday packages to various places in the world. She replied to the senders to stop emailing her, but only to find that the emails keep coming and flooding her inbox. She came to you on the legal aspects that may arise out of this practice by the travel company. Advise her on both criminal and data protection aspects.
Issue 1: In this case the travel companies is again the law of Improper use of network facilities / service. And I suggest Meera to sue them with the law of under e Communications & Multimedia Act 1998.which is improper using of the network facilities / service. They are over use the service of network facilities and cause the public feel uncomfortable with the promotion strategy. And even the request had been made to stop send the mail to her but they are still doing the same thing.

So the punishment for this law imprisonment of maximum 1 year or fine of maximum RM 50,000 or both.

Issue 2: Unsolicited commercial e-mails (spamming)
The promote strategy of the company using is again the law of unsolicited commercial e-mails(spamming) which mean that the mail is force to access to the user inbox even they are not willing to accept it anymore.

Monday 14 December 2009

phising mail


In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies.Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing,[4] probably influenced by phreaking, and alludes to baits used to "catch" financial information and passwords.

How to tell if an e-mail message is fraudulent

Here are a few phrases to look for if you think an e-mail message is a phishing scam.

"Verify your account."
Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.

If you receive an e-mail from Microsoft asking you to update your credit card information, do not respond: this phishing scam. To learn more, read Fraudulent e-mail that requests credit card information sent to Microsoft customers.

"If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking. Phishing e-mail might even claim that your response is required because your account might have been compromised.

"Dear Valued Customer."
Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.

"Click the link below to gain access to your account."
HTML-formatted messages can contain links or forms that you can fill out just as you'd fill out a form on a Web site.
The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's Web address, which is a suspicious sign.

Tuesday 8 December 2009

online shopping crime



The development of internet had brought many of convenient to internet user. By rely on the servicer on internet provided internet user can just by simply click the mouse inform of the computer and can do many things. For example like pay the bill, transfer money to other parties, search for the information and so on. Internet service also provides the services of shopping to the user. They can just search the item or good they want from the internet then just key in some information and send. All the order information and money can easily transfer to the seller and they just wait at home to receive the good. No doubt those kinds of services really convenient the people now a day, but at the same time it also brought many of risk to the user if they did not know how to use the system carefully. One of the risk can be happen when user use the service is get cheat by the seller during the transaction on internet. For example like some sites claimed to sell heavily discounted designer goods, including Ugg Australia Boots, ghd hair straighteners and jewellery from Tiffany & Co and Links of London. Buyers either received counterfeit products or nothing at all. It is also likely that their credit card details have been used to fund other illegal activity. And it also made it “almost impossible” for victims to complain to the source about poor quality, counterfeited items or goods not received. So in orders to stop all this illegal behaviour keep on establish on the internet the government should set up the team to monitor the internet user. And I think this is the only way to decrease all those crime happen in the internet plat form.

Thursday 3 December 2009

glabal warming law


Now a day, the global warming is starting to be most popular news in the media. No matter in newspaper of the TV news every week sure they will have some news is about the global warming. The temperature rises and the sun’s heat and light is trapped in the earth’s atmosphere. And affecting many parts of the world and It might take a few year to destroy the whole creatures in the earth. But even how serious the media describe how serious the causes of global warming bring to the human. Human will still do whatever they like. Same in our country as while, people tend to be a ethical of selfish and just take care they own feeling and without concern other people feeling. All this cause our earth involve in the trouble. So in order to teach people and let them understand the serious cause of global warming. I think we need the government to set the law to help them understand that the serious of global warming.Like other country government they made a law called The Clean Air Act so there is less air pollution. Global warming is making people get very bad illnesses that could make them disabled, very sick, and sometimes even die. The Clean Air Act is making many companies change their products to decrease these problems. Part of the law says that you may not put a certain amount of pollutants in the air. Hairspray and some other products, like foam cups, had this problem. Making and using these products let out too many volatile organic compounds (VOC’s), ozone-destroying chemicals (chlorofluorocarbons (CFC’s), and related chemicals (such as CO2) into the air. Now, almost all of these products have a label on them telling people what this product can do to the environment and many people. The Clean Air Act has also made car companies change some of the things inside of the cars. Cars pollute a lot. While cars make more than half of the world’s smog (visible pollution in the air), many things that cars need to move and heat up make even more pollution. Some things that are inside of cars, buses, trucks, and motorcycles, like gasoline, pollute the air when the fuel is burned. It comes out as a chemical and when mixed in the air, forms smog. Smog is a kind of pollution that you see in the form of a cloud. If you have ever been to California you can see a lot of smog in some places. Sometimes the smog gets so bad that you cannot see at all! Smog forms when car exhaust, pollution from homes, and pollution from factories mixes in the air and has a chemical reaction. The sun’s heat and light add to the reaction.
Cars, buses, and trucks are also responsible for over 50% of dangerous chemicals let into the air. Some of these chemicals can cause cancer, birth defects, trouble breathing, brain and nerve damage, lung injures, and burning eyes. Some of the pollutants are so harmful that they can even cause death.

Friday 27 November 2009

cyber crime


1. Since 1961,the developer of internet connection had been bring a lot of convenient to human. It help human to easily sharing their information, transfer the date and so on. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by a broad array of electronic and optical networking technologies.And it carries a vast array of information resources and services. But even the evolution of the technology also brings a lot of harmful to human. Especially the privacy of the public. Every service now a day can be provided to the consumer. But it also explores the privacy of people at the internet. Some people will try to use illegal way to steal internet user data. And this action is call cyber crime. Actually cyber crime is not only stealing people data or hack computer. It can be Spam, Fraud, Harassment, Drug trafficking and so on. So in order to prevent those crime happen we need the law which can worked out the effectual measures to cyber crime.And the example of the law is Communications and Multimedia Act (CMA) 1998, Penal Code, Internal Security Act. With the existing of this law will help in prevention the crime happen in Malaysia.

Thursday 26 November 2009

Interview

Yesterday just finish interview section with Mr. Sonny with the topic of ethical and unethical issue in the education sector. After finish our interviews I realize that ethical issue have a strong relationship with rule and regulation which can be explain in law as while. For my opinion, ethical is the key to generate the law. And the existing of law make people have the concept of how to behavior in ethically. Human can’t live in the environment without law. But there is an argument law without ethical content does not proscribe or mandate an act because of the act's moral or ethical value. Laws should be understood to include not only statutory law, but also case law and common law. In general, a law may be said to have no ethical content if it represents a choice between two or more ethically equivalent options. The existence of laws without ethical content may be used to support the central claim of legal positivism, namely that law and ethics are separable. Legal positivism states that one may disobey certain laws without doing wrong, or conversely that one may wrongfully obey certain other laws. But for me I do think that the law should be include in the consideration for generate it. But there is not include with the punishment the crime. Because with the involvement of ethical issue to set the punishment to the criminal it will reduce the effect of prevent crime. It make people won’t feel about the punishment had been set.