DOI QR코드

DOI QR Code

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware

  • Received : 2021.04.05
  • Published : 2021.05.30

Abstract

There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.

Keywords

Acknowledgement

The research leading to the publication of this article is funded by a research grant from Universiti Kebangsaan Malaysia (DPK-2019-002).

References

  1. Virgil and Mandelbaum, A. (translator), The Aenied of Virgil. 35th ed. Berkeley, University of California Press, 2007.
  2. Trusted Integrated Circuits (TRUST). Defense Advanced Research Projects Agency, 2008, http://www.darpa.mil.
  3. Stokes, J. Pentagon Fears Trojans, Kill Switches In Foreign-Made CPUs. ArsTechnica. http://arstechnica.com [2 May 2008]
  4. Navarro, P. and Autry, G. Death by China: Confronting the Dragon - A Global Call to Action. Upper Saddle River, Prentice Hall, 2011.
  5. Freedman, A. Computer Desktop Encyclopedia. eBook edition. Osborne/McGraw-Hill, 2014.
  6. Malware Defense Guide, 2011. http://technet.microsoft.com.
  7. Dunham, K. (ed). Mobile Malware Attacks and Defense. Burlington, Syngress Publishing, 2009.
  8. The Symbian Foundation Community http://www.symbian.org.
  9. Threat Encyclopedia. Trend Micro, 2021. https://www.trendmicro.com/vinfo/us/threat-encyclopedia
  10. Boase, J., Wellman, B. A Plague of Viruses: Biological, Computer and Marketing. Current Sociology, 49(6), 39, 2001. https://doi.org/10.1177/0011392101496006
  11. Smith, R. Phlashdance: Discovering Permanent Denial of Service Attacks against Embedded Systems. Presentation Slides. EUSecWest, 2008. http://eusecwest.com.
  12. Trojans Suspected of Contributing to 2008 Madrid Aircrash. Infosecurity, 8, 2010. http://www.infosecurity-magazine.com.
  13. Kizza, J. M. A guide to Computer Network Security. Chattanooga, Springer, 2009.
  14. Kleissner, P. Stoned Bootkit. 2010. http://www.stonedvienna.com.
  15. Malware Evolution in 2007. Kaspersky Security Bulletin, 2007. http://www.kaspersky.com.
  16. Avira. http://www.avira.com [December 2010].
  17. Mobile Security Report. Avira, https://www.avira.com/en/mobile-security-report [November 2020].
  18. (1986) 83 Cr App R 54.
  19. (1991) 93 Cr App R 25.
  20. Wasik, M. Criminal Damage and the Computerised Law. New Law Journal, 136(6266), 763, 1986.
  21. Chao, L, Wei, J. and Xin, Z. Botnet: Survey and Case Study. IEEE Computer Society, 1184, 2009.
  22. Gao, Q., Hu, Y., Li, L., Chen, X. and Liu, H. A Novel Computer Architecture to Prevent Destruction by Viruses. J. Comput. Sci. & Technol, 17(3), 241, 2002. https://doi.org/10.1007/BF02947303
  23. Baskin, B. et al. Combating Spyware in the Enterprise. Rockland, Syngress Publishing, 2006.
  24. "W95/CIH-10xx" Sophos http://www.sophos.com.
  25. Lemos, R. Virulent Worm Calls into Doubt Our Ability to Protect the Net. CNET News, 2001. http://news.cnet.com.
  26. Zou, C. C., Towsley, D., Gong, W. & Cai, S. Advanced Routing Worm and Its Security Challenges. SIMULATION, 82(1), 75, 2006. https://doi.org/10.1177/0037549706065344
  27. Wei, Y., Nan, Z., Xinwen, F. & Wei, Z. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Transactions on Parallel and Distributed Systems, 21(10), 1501, 2010. https://doi.org/10.1109/TPDS.2009.161
  28. Nissenbaum, H. Where Computer Security Meets National Security in Balkin, J. M., Grimmmelmann, J., Katz, E., Kozlovski, N., Wagman, S., and Zarsky, T. (eds). Cybercrime: Digital Cops In A Networked Environment. New York, New York University Press, 2007.
  29. Gissel, R. The Development and Evaluation of a Computer Crime Investigative Distance-learning Program for the National Cybercrime Training Partnership. New York, MacroTech Press, 2005.