Вы находитесь на странице: 1из 30

Patricia aldana

Halder and Jaishankar (2011) defines Cybercrimes

as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

Most of these crimes are not new. Criminals

simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet

SOME THOUGHTS ABOUT CYBER CRIME

"The modern thief can steal more with a computer

than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". National Research Council, "Computers at Risk", 1991.

Computer used to commit a crime Child porn, threatening email, assuming someones

identity, sexual harassment, defamation, spam, phishing


Computer as a target of a crime Viruses, worms, industrial espionage, software piracy,

hacking, DDoS attacks

Crime against Government

Crime against property

Crime against persons

Cybercrime includes a wide variety of crime Offences under cyber crime: Offences against the confidentiality integrity and availability

of computer data and systems


Content-related offences

Copyright-related offences

Hacking

Trojan attacks

Information Theft

Cyber crimes

Denial of Service attacks

E-mail bombing

Salami attacks

Credit card frauds. Cyber pornography. Sale of illegal articles-narcotics, weapons, wildlife. Online gambling. Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code. Email spoofing. Forgery. Defamation. Cyber stalking. Phishing. Cyber terrorism.

Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

Malicious

software that attaches itself to other

software. Eg:(viruses, worms, Trojans, Time bomb, Logic Bomb)

Spam is the equivalent of physical junk mail and

unsolicited telemarketing phone calls. It has become one of the largest nuisances to computer users for both home and business users.

Email spam targets individual users with direct mail

messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.

It is technique of pulling out confidential

information from the bank/financial institutional account holders by deceptive means.

Law governing cyber space Cyber law encompasses laws relating to: Cyber Crimes Electronic and Digital Signatures Intellectual Property

Data Protection and Privacy

Penal Code: cyber crimes: 207-A Misuse of a database. Penalty not exceeding two years. 107-B Database destruction. Penalty from three to five years. 207-C Misuse of privileged information. Penalty 5-7 years. Article 154 Crime of violation of privacy Article 157 Misuse of computer files Article 181-A Child Pornography Article 186 Theft aggravated by electronic funds transfer

Article 217 Crimes against Copyright


Article 218 Plagiarism and labor market. Modified articles in

the year 2004, Ley N 27459.

Act

N 28493 Law that regulates the use of unsolicited commercial email (SPAM) published on 12.04.05. Spam is illegal when it does not contemplate the requirements established in Article No. 6 of the Act. (Responsability). The competent authority for violations is INDECOPI.

Child Pornography; Penal Code Art. 183-A. Intelectual Property; Penal Code Art. 216, 217, 218, 219,

220. Apology; Penal Code Art. 316. Defamation; Penal Code Art. 223, 224. Espionage; Penal Code Art. 331. Manipulation and/or data falsification; Penal Code Art. 427.

First Wave (privacy) Sweden (1973) ; USA (1974); Federal Republic of German

(1977); Austria, Denmark, France and Norway (1978), etc. Second Wave (property) Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc. Third Wave (intellectual property) Convention on Cybercrime Ensuring that countries adopt procedural laws. Harmonizing national cybercrime law.

Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security

updates and patches


Don't open emails or attachments from unknown sources
Use hard-to-guess passwords. Dont use words found in a

dictionary. Remember that password cracking tools exist


Back-up your computer data on disks or CDs often

Don't share access to your computers with strangers If you have a wi-fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info

too!

Treat your password like you treat your

toothbrush. Never give it to anyone else to use, and change it every few months.

Вам также может понравиться