Article ETHIS
Beware of Cybercrime and Its Kinds!
Published on 1 Jul 2022
Admin Relations
Cybercrime is types of crime committed through computers and internet networks. In Indonesian law, cyber crimes against individuals and institutions are considered criminal offenses, because they are considered to be detrimental to the victim physically, mentally, or even in the good name of a person or institution.
In today's digital era, cybercrime is a serious threat. There have been many cases of crimes that invaded a person's privacy or even the security of state data. even according to the Indonesian Cyber Research Institute Communication and Information System Security Research Center (CISSReC), global cyber-attack losses are predicted to reach 84,000 trillion by 2021.
One sector that is prone to attack by cybercrime is the financial sector, where cybercrime can attack bank accounts, and credit card data, or even steal digital money that is already in circulation.
Therefore, so that we can be more careful about this cybercrime, we must know several types of cybercrimes that can attack us at any time. Then what are the forms of cybercrime that we must be aware of?
Cracking is a cybercrime that damages the security system of a computer system, social media, financial accounts, websites, and so on. Usually, cracking is done by looking for vulnerabilities in a system to gain wider access. Cracking can have an impact on the theft of data and money.
Phishing scams are various ways that someone uses to trick victims into giving out personal information such as bank account numbers, passwords, or credit card numbers.
Often, fraudsters suddenly contact victims either via email, sms, phone calls, or even through social media. Perpetrators will pretend to be business parties or state institutions such as banks, population data collections, and so on to ask for personal data from victims.
Fraudsters claiming to be from these institutions will ask victims to update their data because of system updates, or data repair. From there the fraudster will be able to gain access to email addresses, phone numbers, and other important accounts to carry out their crimes.
It is a crime committed to gain access using someone else's credit card so that he can carry out various kinds of transactions as he pleases.
If you have a credit card and then a card usage notification appears, even though you don't use it at all, be careful. It is better to immediately report to the bank that issued the card so that it gets the right treatment.
Usually, this type of crime targets someone's data that is already stored in a computer system such as forms, emails, social media, and so on. After he gets your data, the perpetrator can use this data for various things that harm you materially or non-materially, such as breaking into your credit card number, or even your ATM PIN.
So, next time, be careful when filling out forms that ask for your data!
Data diddling is a cybercrime by skewing data entry in someone's user system. With diddling data, criminals can alter financial figures by adding or subtracting them, or they can do more complex things that render the entire system unusable. Of course, this was done for personal gain.
Electronic money laundering is an alternative for people who want to do money laundry for an amount obtained illegally. Usually, money laundering is done by 'passing' money on a particular account, exchanging it into other currencies, and so on.
However at this time, if there is money passing in a bank account, usually the bank considers this a suspicious action, and the bank will immediately take appropriate action.
Those are some cybercrimes that can attack you at any time. Therefore, let's be more careful in using technology in this day and age, and protect ourselves and those closest to us from various cyber crimes that exist by using various efforts that we can do!
PT. ETHIS FINTEK INDONESIA
Rukan Puri Mansion block B no. 7 Outer Ring West Kembangan Street, RT.2/RW.1, South Kembangan, Kembangan District, Special Capital Region of Jakarta 11610
Customer Service: support@ethis.co.id
Operational Hours: 09.00 - 18.00 WIB
Notes:
1. Tech-based Islamic Financing service (P2P Financing) is a civil agreement between Funder and Beneficiary, in which all risks are charged to all parties.
2. Payment failure is charged to the Funder, except for fraud case and mismanagement. Beneficiaries are imposed if fraud and mismanagement happens as in Risk Sharing terms based on Islamic Principles. There is no national institution or authority that is responsible to financing risk or payment failure or compensating on any parties including loss, failures, fees or consequences after.
3. The platform with agreement from all respective users (funders and/or beneficiaries) accesses, gains, stores, manages and/or uses users’ personal data (Data Utilization) on or in the objects, electronic devices (including smartphones or cellular phones), hardwares or softwares, electronic documents, applications or electronic systems belong to Users or managed by Users, upon the information of aims, limitations and mechanism of Data Utilization to the Users before the approvals.
4. Funders with limited knowledge on this financing are suggested not to use this service.
5. Beneficiaries are obliged to consider return rates/margin/service fee and other fees according to the ability to repay the financing.
6. Each fraud is recorded electronically in cyberspace and easily recognized by public through social media.
7. Users should read and understand this information before deciding to be a Funder or Beneficiary.
8. Government as in this case is Otoritas Jasa Keuangan (OJK) / Financial Services Authority is not responsible for violation or disobedience of users, Funder and Beneficiary (intentionally or unintentionally) against terms and conditions or agreement or attachment between the platform and Funder and/or Beneficiary.
9. Each transaction and financing activities, funding, financing or enforcement agreement regarding financing between or involves the Platform, Funder, Field Partner and/or Beneficiary should happen through escrow account and virtual account as stated in OJK regulation No. 77/POJK.01/2016 about Tech-Based Financing Services.