Hanis+Sakinah_912



==Based on the article above,cybercrimes refers to all activities done with criminal intent in cyberspace.Today,citizens and nations alike have __increasely__ become __victim__ to cyber crimes that occur anytime.The criminals do this illegal activity based on their skill.Cyber crimes is very wide and covers various aspects including fraud unauthorized access, child pornography and cyber stalking.__This criminal can divide __ into two categories which are first,from the perspective of the victim.They will download the Trojan horse and receive an email that connected to a hostile website.As a result,__the victims’ computer__s will be controlled by the criminals and may take advantages from the weaknesses in the browser. == ==Second type of cybercrime is at the other end of spectrum but not limited to activities such as "black mailing and child predation".This type happened when the criminals try to connect with someone to make a relationship between them.Sometimes they use hidden message to get the __informations__. In a nutshell, parents, teachers,government and industry needs to cooperate to overcome __these crimes__.The Internet users must be more careful while surfing the Internet and giving __the personal information__ ==
 * __SUMMARY __**


 * __SUMMARY 2 __**

In the article “What is Cybercrime?” cybercrime has various definitions.The Council of Europe's Cybercrime Treaty, Zeviar-Geese, and The United Nations Manual on the Prevention and Control of Computer Related Crime have their own definition on cyber crime.Based on the all definitions,it can be concluded that cybercrime it is an action using computers and networks to do something bad to other person.This criminal can divide into two big categories.The first is criminal through the downloaded file.The email received after downloads Trojan horse which is a link to the to the criminal.As a result,they will controlled the victims’ operating system.Next,the second type of cybercrime is not limited to activities such as “blackmailing and child predation” but its included other spectrum.By this type,criminal are trying to use another method to get an information about the victims and try to create relationship between them.In a nut shell,people have to be more careful when surfing the Internet and giving their own personal details.