Cyber Crime
Cyber Crime
Cyber Crime
TABLE OF CONTENTS
SUBMISSION FORM………………………………………………………………….. 1
TABLE OF CONTENTS…………………………….…………………….…………… 3
INTRODUCTION……….…………………………………………………...…………. 4
RESEARCH BACKGROUD…………………………………………………………….4
TARGET AUDIENCES...…………………………….………………………….………5
REFERENCES…………………………………………………………………………….7
MARKING SCHEME……………………………………………………………………..8
RUBRIC……………………………………………………………………………………9
3
Introduction
Most cybercrimes are carried out by cyber criminals or hackers who want to make money by
intentionally damaging other people's property, personal integrity, and life by stealing
valuable items and information from others.
Explore the Current Issues Regarding Cybercrime & Get Advice on Securing Yourself.
Know What Cybercrime Is and How to Protect Your Devices & Data from Attack. Leading
on the Internet. Case Studies & Videos.
Research Background
Cybercrime in India has been developing quickly since the advent of the technology era. A
common definition of cybercrime is a criminal offense or an unlawful act in which a
computer is used as a tool, a target, or both. Cyberattacks, which mostly employ MasterCard
and payment schemes, have already done significant harm to the retail banking sector.
Cybercrimes are impacted by unauthorised access to other databases, unauthorised
interceptions, interference with data and systems, misuse of technology, forgery, and
electronic fraud. (Chudasama et al., 2020)
4
Target Audience
TV Script
Cybercrime is everywhere, according to Cyber Security Malaysia (CSM), Malaysia
reported 4,741 incidents last year and 456 fraud incidents this year.
Nearly 70% of commercial crime cases are classified as cybercrime.
From 2019 to 2021, total losses received by the police amounted to RM2.23 billion.
What is Cybercrime? How does it happen?
Parcel Delivery Scam: checking delivery status through a link.
Hacking: shutting down or misusing websites or computer networks
Phishing: using fake email messages to get personal information from internet users
Electronic Money Laundering: A Scammer requesting personal information via a link
through a phone call.
Solution:
Be sure that you are using up-to-date security software like antivirus and firewalls.
Don’t browse untrusted websites or links.
Radio Script
Have you ever fallen into a cybercrime trap?
Hacking? Phishing? Frauds?
Afraid of being targeted by a scammer? Money was stolen? Information leakage?
OMG
Don’t worry! We have some pro tips for you by
Don’t browse untrusted websites or links,
Ensure your security software is up to date.
Also, Keep your personal information personal.
Be aware.
Don’t be a Victim of Cyber Crime
6
References
Chudasama, D. M., Patel, D., Shah, A., & Shaikh, N. (2020). Research on Cybercrime and its
Policing. ResearchGate.
https://www.researchgate.net/publication/350486308_Research_on_Cybercrime_and_
its_Policing
CyberTalents. (n.d.). What is Cyber Crime? Types, Examples, and Prevention. CyberTalents
Blog. https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-
prevention
What is cybercrime? How to protect yourself from cybercrime. (2023, June 30).
www.kaspersky.com. https://www.kaspersky.com/resource-center/threats/what-is-
cybercrime
7
MARKING SCHEME
Criteria Score
E-Brochure /20
Content /40
Sub-Total /100
Examiner’s Comments:
8
RUBRIC
Criteria 1 2 3 4 5 Total
Video for Television
E-Brochure
Content