Question

In: Computer Science

Question 3 (25 marks) Cybercrimes are increasing in Malaysia. Combating the threat is very challenging since...

Question 3

Cybercrimes are increasing in Malaysia. Combating the threat is very challenging since Malaysia is still lacking in many of the tools required including manpower and technology.

a) Based on your thoughts and opinions, what do we need in order to prevent cybercrimes in Malaysia? Justify your answers. [10 marks]

b) Discuss the FIVE (5) Cyberlaw Acts in Malaysia. [15 marks]

Solutions

Expert Solution

a) Based on my thoughts and opinons the following measures can be taken to combat cyber crime in Malasiya:

  • Up-to-date Security and Management Software. Keep the systems up to date, and get security software that allows one to manage, monitor, and protect every device and file in every organization (without impeding any workers).
  • Cybersecurity Training Program. The biggest threat to enterprise data is and always will be the employees. You can’t completely eliminate that risk, but you can mitigate it through cybersecurity training processes and protocols.
  • Educate and inspire the importance of having a strong and secure password and ecouraging people for not sharing it with their near and dear ones.
  • Using VPNs where more security and privacy is required and avoiding freeware programs as much as possible.
  • Ethical Hackers. These white hats will approach every piece of your infrastructure as though they were a criminal trying to break in, and once they find a weakness, you’ll be the first to know.

b) The following are the Cyberlaw Acts in Malaysia

  • Computer Crimes Act 1997 (“CCA”)

    Malaysia’s Computer Crimes Act 1997 (“CCA”) has been enacted in 1997 to cater offences relating to the misuse of computers (which includes hacking). It was enacted two years after what has been considered as the beginning of the Internet age in Malaysia.

  • Communications and Multimedia Act 1998 (“CMA”)

    The CMA provides for and regulates the converging areas of communications and multimedia in Malaysia. In particular, the CMA regulates various activities carried out by licensees (i.e. network facilities providers, network service providers, applications service providers and content applications service providers) as well as those utilising the services provided by the licensees.

  • Penal Code

    The CCA has specifically mentioned about the Penal Code in section 4 of the CCA. Section 4 states that it is an offence under the CCA if a person does a ‘computer crime’ with the intention to commit fraud or dishonesty or to cause injury as defined in the Penal Code.

    Malaysian cyber laws do not have a specific provision on the electronic or computer-related identity theft or identity fraud. However, it has been proposed for section 416 of the Penal Code to also be applied to identity theft. Under section 416 of the Penal Code, it is an offence to “cheat by personation”, i.e. where a person cheats by pretending to be some other person, or by knowingly substituting one person for another, or representing that he or any other person is a person other than he or such person really is.

  • Personal Data Protection Act 2010 (“PDPA”)

    PDPA in Malaysia only protects personal data received and processed in commercial transactions. Ironically, PDPA does not apply to the GOM and state governments, which now gives us no apparent right to take action against the GOM or state governments in the event our personal data stored, controlled, and processed by the GOM and state governments have been manipulated or leaked. Despite we still have the option under common law principle to take action against the GOM and state governments if our personal data have been wrongly used, this still does not guarantee that we will have a bright chance to proceed with this action. From what we might know, the court will strike out our application for any reason the court may think reasonable, eventually.

  • Copyright Act 1987

    Under the Malaysia’s Copyright Act 1987, copyright owners have the right to bring an action against any person for copyright infringement, either as a civil or criminal offence.

    Section 41 of the Copyright Act 1987 sets out a range of offences for copyright infringement, which include making for sale or hire, distributing, and exhibiting in public any infringing copy during the subsistence of copyright in a work or performer’s right.


Related Solutions

Question 1 (25 marks) A local online trading company, Bursa Malaysia (BSKL) is running out of...
Question 1 A local online trading company, Bursa Malaysia (BSKL) is running out of capacity and performance with the current storage system. BSKL has decided to own a RAID system at a reasonable cost to increase the speed, capacity, availability and scalability of the trading activities. (a) Identify any FIVE (5) RAID systems that might be suitable for BSKL. (Refer to the BSKL website to understand the online activities that have been actively running.) [10 marks]
QUESTION 3 (25 MARKS) (a) Differentiate between Translation and Transaction Exposure (6 marks) (b) Currently the...
QUESTION 3 (a) Differentiate between Translation and Transaction Exposure (b) Currently the exchange rate is USD1.5000/GBP and the three-month forward exchange rate is USD1.5200/GBP. The three-month interest rate is 8.0% per annum in the U.S. and 5.80% in the U.K. Assume you can borrow as much as USD1,500,000 or GBP1,000,000. (i) Determine whether the interest rate parity (IRP) is currently holding. (ii) If the IRP is not holding, show the procedures you carry out covered interest arbitrage. Calculate the arbitrage...
Question 1(25 Marks) A steady stream of philosophers, scientists, and management gurus have since echoed Adams,...
Question 1 A steady stream of philosophers, scientists, and management gurus have since echoed Adams, lamenting the acceleration and calling for similar leaps to fundamental new ways of thinking and acting. Many advocate the development of systems thinking the ability to see the world as a complex system, in which we understand that “you can’t just do one thing” and that “everything is connected to everything else.” a-Explain what is meant by system dynamic and show how System dynamics is...
QUESTION 3          (15 MARKS) The evaluating and concluding stage of the audit process is very important....
QUESTION 3          The evaluating and concluding stage of the audit process is very important. At this stage all the evidence that has been gathered on the audit must be brought together so that decisions can be taken as to whether anything further needs to be done and ultimately what the appropriate audit opinion will be. YOU ARE REQUIRED TO: a. State, giving reasons which member of the audit team should conduct the evaluation of audit evidence and conclude on fair...
Question 3(25 Marks) Part A (12 Marks) Reusable Inc uses the sun to provide charging facilities...
Question 3 Part A Reusable Inc uses the sun to provide charging facilities for the rapidly growing electric vehicle market. The traditional methods of charging these vehicles takes too long so a product was designed for a fast charging system which reduces charging time by 50%. It has just completed the prototype for a new model. The information for the Charging system is shown below.             Direct material cost per unit                                                 $25,000             Direct labour time for the assembly...
Question 3 (25 marks / Money Market and Equity Financing) a) Assume the rate of interest...
Question 3 (25 marks / Money Market and Equity Financing) a) Assume the rate of interest quoted in the 90-day commercial paper market is 4.0%. You issued $10 million (face value) of 90-day commercial paper, with an interest rate of 4.0%. i) How much did you borrow? Show the supporting calculations. ii) If you borrowed the same amount in the Eurodollar deposit market and paid 4% interest in that market, how much would you pay back in 90 days? Show...
QUESTION 3 (25 MARKS) A national job placement company is interested in developing a model that...
QUESTION 3 A national job placement company is interested in developing a model that might be used to explain the variation in starting salaries for college graduates based on the college GPA score. The following data were collected through a random sample of the clients with which this company has been associated. GPA Score Starting Salary (RM) 3.20 3,500 3.40 2,950 2.90 3,000 3.60 3,640 2.80 3,150 2.50 2,900 3.00 3,320 3.60 3,760 2.90 3,200 3.50 3,600 Based on this...
Question 3 (25 marks) Samsung is the manufacturer of flat panel TV sets in South Korea....
Question 3 Samsung is the manufacturer of flat panel TV sets in South Korea. The company is evaluating two different operating structures which are described below. Samsung has annual interest expense   of $250,000   with 1,000,000   common   shares   outstanding.   The   firm’s marginal tax rate is 40%. . Selling price per unit Fixed costs Variable cost per unit Operating Structure A: $1,000 $500,000 $750 Operating Structure B: $1,000 $1,200,000 $700 Answer the following questions: For each operating structure, calculate: i EBIT and...
Question 3: (25 marks) (200 words) In your own words, explain the stages or steps for...
Question 3: (200 words) In your own words, explain the stages or steps for own-brand development strategy using examples.
Question 3 (25 marks) Consider the following information: (Rate of Return) (Rate of Return) State of...
Question 3 Consider the following information: (Rate of Return) (Rate of Return) State of Economy Probability Stock A    Stock B Recession 0.30 2% 5% Normal 0.50 7% 4% Boom 0.20 12% 3% Required: a,) Calculate the expected return for the two Stocks A and B respectively. b.) Calculate the standard deviation for the two Stocks A and B respectively. c,) If you own a portfolio that has $1.3 million invested in Stock A and $2.2 million invested in Stock...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT