SSRG International Journal of Humanities and Social Science (SSRG-IJHSS) volume 3 Issue6 November to December 2016 ISSN: 2394 - 2703 www.internationaljournalssrg.org Page 22 Cyber Crime Prevention Strategy in Indonesia Yasmirah Mandasari Saragih 1 , Andysah Putera Utama Siahaan 2 1 Faculty of Law, 2 Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract—The development of the Internet and the cyber world did not lead to positive progress. One of the negative things that often happens in the virtual world is cyber crime. The loss of the limits of space and time on the Internet canaffectanything. A cracker can get into a system without an official permit. Some people who infiltrate the system will notify the weaknesses of the system but some of them use the weakness to profit. Several strategies were created to repel the cyber crime. Cybercrime is not only done through the Internet, but this can be done through a network that can transmit signals such as telephone communications. The Indonesian government to apply the law as it applies to online crime. Some of these rules have been applied in the Penal Code, including the Law on Information and Electronic Transactions (UUITE). By implementing this system, the cyber crime cases will be reduced each year. Keywords— Cyber Crime, Hacker, Strategy, UUITE, Law INTRODUCTION Along with the rapid advancement of information technology, this makes the Internet as a phenomenon in the life of mankind. The Internet, which is defined by the U.S. Supreme Court as: "International Network of Interconnected Computers" has presented the easiness for everyone to either communicate or conduct business transactions anytime and anywhere. There are many ways to interact in cyberspace has been developed [2][3]. An example is the birth of wireless application technology. For example, it allows mobile phones to access the Internet, pay a bank account, book air tickets, etc. Indonesia conducts technology research in the field of internet quickly. In development, the use of the internet brings many negative sides. It increases the chances for the actions of anti-social and criminal behavior that had been considered unlikely. As a theory says, "Crime is a product of society its self." It means that the community itself that creates crime. The higher the intellectual level of society, the more sophisticated crimes may also occur in the community. Cybercrime carried out by infiltrating into a computer network system illegally, without permission or the knowledge of the owner of the computer network system is entered [6]. Usually, the perpetrator (Cracker) sabotage or steal the valuable and confidential information. However, some are doing just because he felt challenged to try his skills to penetrate a system that has a high degree of protection. Crime is more prevalent with the development of technology internet/intranet rather than the past. The Indonesian government will apply the law on cybercrime. A legal entity should work with IT experts to tackle such crimes. To reveal who will be responsible for the crime, an IT expert should be able to perform network forensics to find out the origin and source of the offense. This strategy is expected to reduce or eradicate crimes committed in the world of technology. II. THEORIES A. Cyber Crime Currently, the development of technology is increasing rapidly. With the increasing public knowledge about information and communication technology, it brings a lot of positive and negative impacts. In the end, a lot of the man himself who committed abuse in the use of computer technology, which was later increased to a crime in the virtual world, or better known as cyber crime [1]. Cyber crime is a term that refers to criminal activity with a computer or computer network into a tool, target or scene of the crime. Included therein to include an online auction fraud, check forgery, credit card fraud (carding), confidence fraud, identity fraud, child pornography, etc. In the Internet, security issues are indispensable. For without security, data on existing systems on the Internet can be stolen by irresponsible people. Often an Internet-based network system has flaws or often called a security hole. If the hole is not closed, a thief can enter from the hole. Theft of data and systems from the Internet, including in the case of computer crime. Cybercrime is a crime that is often done on the Internet. B. Cyber Crime Types Based on the type of activities done, cyber crime can be classified into several types as follows: 1. Unauthorized Access It is a crime that occurs when someone enters or