Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.5.10

The Viability of the Malaysian Penal Code in Handling Physical Damage Caused by Malware  

Rahman, Rizal (Malaysian and Comparative Law Centre, Faculty of Law, Universiti Kebangsaan Malaysia)
Zakaria, Mohd Sophian (Attorney General Chambers of Malaysia)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.5, 2021 , pp. 52-56 More about this Journal
Abstract
There is no assurance that malware could only cause virtual damage to computer programs and data as its potential is endless. However, legal provisions were earlier developed to cater to either a physical damage caused by a physical action or a virtual damage caused by a virtual action. When crossovers occur, it becomes quite uncertain as to how viable the current laws are in handling this matter. The author seeks to address the issue from the perspective of the laws of Malaysia.
Keywords
malware; damage; Penal Code; Malaysia;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dunham, K. (ed). Mobile Malware Attacks and Defense. Burlington, Syngress Publishing, 2009.
2 Wasik, M. Criminal Damage and the Computerised Law. New Law Journal, 136(6266), 763, 1986.
3 Chao, L, Wei, J. and Xin, Z. Botnet: Survey and Case Study. IEEE Computer Society, 1184, 2009.
4 Gao, Q., Hu, Y., Li, L., Chen, X. and Liu, H. A Novel Computer Architecture to Prevent Destruction by Viruses. J. Comput. Sci. & Technol, 17(3), 241, 2002.   DOI
5 Baskin, B. et al. Combating Spyware in the Enterprise. Rockland, Syngress Publishing, 2006.
6 "W95/CIH-10xx" Sophos http://www.sophos.com.
7 Lemos, R. Virulent Worm Calls into Doubt Our Ability to Protect the Net. CNET News, 2001. http://news.cnet.com.
8 Zou, C. C., Towsley, D., Gong, W. & Cai, S. Advanced Routing Worm and Its Security Challenges. SIMULATION, 82(1), 75, 2006.   DOI
9 Virgil and Mandelbaum, A. (translator), The Aenied of Virgil. 35th ed. Berkeley, University of California Press, 2007.
10 Trusted Integrated Circuits (TRUST). Defense Advanced Research Projects Agency, 2008, http://www.darpa.mil.
11 Stokes, J. Pentagon Fears Trojans, Kill Switches In Foreign-Made CPUs. ArsTechnica. http://arstechnica.com [2 May 2008]
12 Navarro, P. and Autry, G. Death by China: Confronting the Dragon - A Global Call to Action. Upper Saddle River, Prentice Hall, 2011.
13 Freedman, A. Computer Desktop Encyclopedia. eBook edition. Osborne/McGraw-Hill, 2014.
14 Malware Defense Guide, 2011. http://technet.microsoft.com.
15 (1986) 83 Cr App R 54.
16 (1991) 93 Cr App R 25.
17 Trojans Suspected of Contributing to 2008 Madrid Aircrash. Infosecurity, 8, 2010. http://www.infosecurity-magazine.com.
18 The Symbian Foundation Community http://www.symbian.org.
19 Threat Encyclopedia. Trend Micro, 2021. https://www.trendmicro.com/vinfo/us/threat-encyclopedia
20 Boase, J., Wellman, B. A Plague of Viruses: Biological, Computer and Marketing. Current Sociology, 49(6), 39, 2001.   DOI
21 Kizza, J. M. A guide to Computer Network Security. Chattanooga, Springer, 2009.
22 Kleissner, P. Stoned Bootkit. 2010. http://www.stonedvienna.com.
23 Malware Evolution in 2007. Kaspersky Security Bulletin, 2007. http://www.kaspersky.com.
24 Avira. http://www.avira.com [December 2010].
25 Mobile Security Report. Avira, https://www.avira.com/en/mobile-security-report [November 2020].
26 Gissel, R. The Development and Evaluation of a Computer Crime Investigative Distance-learning Program for the National Cybercrime Training Partnership. New York, MacroTech Press, 2005.
27 Smith, R. Phlashdance: Discovering Permanent Denial of Service Attacks against Embedded Systems. Presentation Slides. EUSecWest, 2008. http://eusecwest.com.
28 Wei, Y., Nan, Z., Xinwen, F. & Wei, Z. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Transactions on Parallel and Distributed Systems, 21(10), 1501, 2010.   DOI
29 Nissenbaum, H. Where Computer Security Meets National Security in Balkin, J. M., Grimmmelmann, J., Katz, E., Kozlovski, N., Wagman, S., and Zarsky, T. (eds). Cybercrime: Digital Cops In A Networked Environment. New York, New York University Press, 2007.