Escolar Documentos
Profissional Documentos
Cultura Documentos
Muhammad Rashidi Bin Razali (2010391069) Muhamad Fadzile Bin Abd Malek (2010158019) Muhammad Haziq Bin Mazlan (2010715319)
HISTORY OF HACKING INTRODUCTION PURPOSE OF HACKING HACKTIVISM OR POLITICAL HACKING IN MALAYSIA EFFECT OF HACKING SOLUTION TAKEN & THE LAW IMPLEMENTED IN MALAYSIA CONCLUSION
HISTORY OF HACKING
1960s MITs artificial lab Ken Thompson invented UNIX 1970s Dennis Ritchie invented C 1980s Cyber Space coined 414s arrested Two hacker group formed 1990s National Crackdown on hackers Kevin Mitnick arrested Microsofts NT operating system
Tsutomu Shimomura
At the time of his arrest, he was the most-wanted computer criminal in the United States.
INTRODUCTION
Hacker is a person who access computer system and network without authorization There are 3 types of hacker which is white hat, black hat and grey hat Hacker hierarchy is divided into there which is script kiddies, intermediate hackers and elite hackers
PURPOSE OF HACKING
To steal Money Important data / information To test their knowledge in understanding network and computer system
EFFECT OF HACKING
Data loss Increasing maintenance cost Negative reputation
Hactivism
The act of hacking, or breaking into computer system, for a political or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.
They uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause.
THEIR MESSAGE
Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the worlds strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favor.
We are Anonymous.
THEIR MESSAGE
This is a message the hacker leave at the website. You never learnYou never learnYou never learnI email you remember? And I notice you have changed, most of the password after that. (And thanks to unknown Wifi owner, borrow your line for a while ya!)
SabahTourism.com Hacked + leaked Tour Malaysia (Not Tourism Malaysia) Hacked Tourism Malaysia Unaffected UiTM Penang Hacked JBiotech Hacked Social Welfare Department (Ezi2Care) Hacked CIDB Hacked but back up 12:20am Land Public Transport Commision Hacked but back up 12:15am 1Malaysia DoS / Switched off 3:45am Malaysian Communications and Multimedia Commission Unaffected ASEANConnect DoS / Switched off Malaysian Meteorological Service DoS / Switched off
Ministry of Education DoS / Switched off Suruhanjaya Pilihanraya Malaysia DoS / Switched off Bomba - DoS / Switched off TMNet Unaffected Perbendaharaan Malaysia - DoS / Switched off Kementerian Kerja Raya Malaysia - DoS / Switched off Parlimen Malaysia DoS / Switched off Malaysian Treasury DoS / Switched off University Kebangsaan Malaysia DoS / Switched off Jobs Malaysia DoS / Switched off Information, Communications and Culture DoS / Switched off Human Resouce Ministry DoS / Switched off 3:59am National Sports Council DoS / Switched off Polis Diraja Malaysia (PDRM) DoS / Switched off
By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with the transmitted data. By doing so, a more secure and safe electronic communication could be done.
Computer crimes are banned by this law. Those who disobey this law can be charged.
By implementing the Computer Crimes Act 1997, computer users can now protect their rights to privacy and build trust in the computer system. This Act also enable the government to track the illegal activities, thus reducing the cyber crimes cases.
In Malaysia, you can use this Act for any cases regarding your internet service provider and see whether they got accuses of part of this law. This Act also ensures high level of users confidence in the information and communication technology industry.
CONCLUSION
Hacking is a good computing skill that can be used for good or bad intention. There is reason to do the hack, and there are ways to prevent it.