DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
2 Language of Computer Crime Investigation
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Information Warfare Theory of Information Warfare
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
Information Society Security Risks.  Attacks  Origin  Consequences RISKS...
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
CYBER CRIME AND SECURITY TRENDS
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
COEN 152 Computer Forensics Introduction to Computer Forensics.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
General Awareness Training
Cyber crime & Security Prepared by : Rughani Zarana.
What does “secure” mean? Protecting Valuables
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Corporate crime prevention project and Best practices manual Dr. Wybe Th. Douma T.M.C. Asser Institute, The Hague.
Information Warfare Playgrounds to Battlegrounds.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Note1 (Admi1) Overview of administering security.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Information Warfare Playgrounds to Battlegrounds.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Cyber crime and security issues
(A CORPORATE NETWORK APPROACH)
Systems Security Keywords Protecting Systems
Data Protection Act and Other Laws
Seminar On Cyber Crime Submitted To: Submitted By:
Computer Forensics 1 1.
Cyber Crimes Chunlian QU 9/18/2018.
Unit 1.6 Systems security Lesson 3
Cyber Crime Today we will look at: Different types of cyber-crime
Introduction to Computer Forensics
Computer Crime and Security Measures
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter # 3 COMPUTER AND INTERNET CRIME
Security of network and information systems
LO1 - Know about aspects of cyber security
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Presentation transcript:

DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad

CONTENTS : COMPUTER CRIME - NOTION AND DEFINITION LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME PREVENTION OF THE COMPUTER CRIME CONCLUSION

COMPUTER CRIME NOTION AND DEFINITION SPECIFIC FORM OF THE MODERN CRIME SPECIFIC FORM OF THE MODERN CRIME PASSES STATE BORDERS AND CONTINENTS PASSES STATE BORDERS AND CONTINENTS SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON

LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Article 251 of the Criminal Law of RM (entering into computer system) Official Gazette no 37/1996. Official Gazette no 37/1996.

computer trickery computer trickery financial theft and misuse financial theft and misuse making and use of computer viruses making and use of computer viruses forgery of data forgery of data computer sabotage and espionage computer sabotage and espionage hackership hackership MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES

 injured party reports damage  administrators of information systems find out external attack  the investigation and producing evidence must be done by experts that have practical knowledge  computer forensic WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME

PREVENTION OF THE COMPUTER CRIME PREVENTION OF THE COMPUTER CRIME information education information education administering of the information systems by trained persons administering of the information systems by trained persons use of modern protection from unauthorized entering (both hardware and software security systems) use of modern protection from unauthorized entering (both hardware and software security systems) punishing of the computer crimes punishing of the computer crimes

CONCLUSION The computer crime is a great social danger Each individual who is a computer user in a network should be aware of the possibilities of external intruding and attack Protection in time Punishing and re-socialization of the perpetrators