Академический Документы
Профессиональный Документы
Культура Документы
as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet
than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, "Computers at Risk", 1991.
Computer used to commit a crime Child porn, threatening email, assuming someones
Cybercrime includes a wide variety of crime Offences under cyber crime: Offences against the confidentiality integrity and availability
Copyright-related offences
Hacking
Trojan attacks
Information Theft
Cyber crimes
E-mail bombing
Salami attacks
Credit card frauds. Cyber pornography. Sale of illegal articles-narcotics, weapons, wildlife. Online gambling. Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code. Email spoofing. Forgery. Defamation. Cyber stalking. Phishing. Cyber terrorism.
Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
Malicious
unsolicited telemarketing phone calls. It has become one of the largest nuisances to computer users for both home and business users.
messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.
Law governing cyber space Cyber law encompasses laws relating to: Cyber Crimes Electronic and Digital Signatures Intellectual Property
Penal Code: cyber crimes: 207-A Misuse of a database. Penalty not exceeding two years. 107-B Database destruction. Penalty from three to five years. 207-C Misuse of privileged information. Penalty 5-7 years. Article 154 Crime of violation of privacy Article 157 Misuse of computer files Article 181-A Child Pornography Article 186 Theft aggravated by electronic funds transfer
Act
N 28493 Law that regulates the use of unsolicited commercial email (SPAM) published on 12.04.05. Spam is illegal when it does not contemplate the requirements established in Article No. 6 of the Act. (Responsability). The competent authority for violations is INDECOPI.
Child Pornography; Penal Code Art. 183-A. Intelectual Property; Penal Code Art. 216, 217, 218, 219,
220. Apology; Penal Code Art. 316. Defamation; Penal Code Art. 223, 224. Espionage; Penal Code Art. 331. Manipulation and/or data falsification; Penal Code Art. 427.
First Wave (privacy) Sweden (1973) ; USA (1974); Federal Republic of German
(1977); Austria, Denmark, France and Norway (1978), etc. Second Wave (property) Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc. Third Wave (intellectual property) Convention on Cybercrime Ensuring that countries adopt procedural laws. Harmonizing national cybercrime law.
Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security
Don't share access to your computers with strangers If you have a wi-fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info
too!
toothbrush. Never give it to anyone else to use, and change it every few months.