TINDAK PIDANA DUNIA MAYA BERUPA VIRUS DAN TROJAN HORSE MENURUT UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK

Marco Orias
2019 Lex Journal Kajian Hukum & Keadilan  
Cybercrime or crime at cyberspace has many forms or shapes, but from that all existing's forms, hacking is a forms that gets a lot of attention at the UN Congress X in Vienna st hacking is The first crime, also seen from The technical aspects, hacking have excess. First, The man who hacking must be can do other forms of cybercrime with ability to enter into computer system and then broke that system. Second, technically the quality of the hacking result from hacking that more seriously if
more » ... ed with other forms of cybercrime, such as viruses and The Trojan Horse. Computer media and cyber world becomes most targets that attack by hackers because regarded as media that common owned by all levels of society. As that becomes problem in this research is how an arrangement crime of Virus and The Trojan Horse, and how the law enforcements tackling crime of Virus and The Trojan Horse. Research approach used normative juridical, the collected data both primary and secondary data examine by juridical review with not eliminate other nonjuridical element. This approach leads to laws and regulations as a major study of law and behavior of the perpetrator that wrongly use technology and information as concrete support to strengthening that juridical analysis. Result of research indicated that the role of law enforcement in handling crimes of Viruses and Trojan Horse that exercised so far was still very minimal.This cause many obstacles found by law enforcements, the existing statuary barriers, constraints of investigation, and the resistance of the people themselves.The most important thing is the system verification in order to cope with the crime of Viruses and Trojan Horse through repair or revision of existing statuary barriers, whether Law No.11 Year 2008 and The other regulation that related with The crimes of Viruses and The Trojan Horse.Keyword : Criminal Act, Cyberspace, Viruses, and The Trojan Horse
doi:10.25139/lex.v3i1.1820 fatcat:6xmlc6n6qbcgtd3v3sfmqhepwq