Abstract

Cybercrime or crime at cyberspace has many forms or shapes, but from that all existing’s forms, hacking is a forms that gets a lot of attention at the UN Congress X in Vienna st hacking is The first crime, also seen from The technical aspects, hacking have excess. First, The man who hacking must be can do other forms of cybercrime with ability to enter into computer system and then broke that system. Second, technically the quality of the hacking result from hacking that more seriously if compared with other forms of cybercrime, such as viruses and The Trojan Horse. Computer media and cyber world becomes most targets that attack by hackers because regarded as media that common owned by all levels of society. As that becomes problem in this research is how an arrangement crime of Virus and The Trojan Horse, and how the law enforcements tackling crime of Virus and The Trojan Horse. Research approach used normative juridical, the collected data both primary and secondary data examine by juridical review with not eliminate other nonjuridical element. This approach leads to laws and regulations as a major study of law and behavior of the perpetrator that wrongly use technology and information as concrete support to strengthening that juridical analysis. Result of research indicated that the role of law enforcement in handling crimes of Viruses and Trojan Horse that exercised so far was still very minimal.This cause many obstacles found by law enforcements, the existing statuary barriers, constraints of investigation, and the resistance of the people themselves.The most important thing is the system verification in order to cope with the crime of Viruses and Trojan Horse through repair or revision of existing statuary barriers, whether Law No.11 Year 2008 and The other regulation that related with The crimes of Viruses and The Trojan Horse.Keyword : Criminal Act, Cyberspace, Viruses, and The Trojan Horse

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.