Download presentation
Presentation is loading. Please wait.
Published byKristian Nash Modified over 8 years ago
1
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad
2
CONTENTS : COMPUTER CRIME - NOTION AND DEFINITION LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME PREVENTION OF THE COMPUTER CRIME CONCLUSION
3
COMPUTER CRIME NOTION AND DEFINITION SPECIFIC FORM OF THE MODERN CRIME SPECIFIC FORM OF THE MODERN CRIME PASSES STATE BORDERS AND CONTINENTS PASSES STATE BORDERS AND CONTINENTS SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON
4
LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Article 251 of the Criminal Law of RM (entering into computer system) Official Gazette no 37/1996. Official Gazette no 37/1996.
5
computer trickery computer trickery financial theft and misuse financial theft and misuse making and use of computer viruses making and use of computer viruses forgery of data forgery of data computer sabotage and espionage computer sabotage and espionage hackership hackership MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES
6
injured party reports damage administrators of information systems find out external attack the investigation and producing evidence must be done by experts that have practical knowledge computer forensic WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME
7
PREVENTION OF THE COMPUTER CRIME PREVENTION OF THE COMPUTER CRIME information education information education administering of the information systems by trained persons administering of the information systems by trained persons use of modern protection from unauthorized entering (both hardware and software security systems) use of modern protection from unauthorized entering (both hardware and software security systems) punishing of the computer crimes punishing of the computer crimes
8
CONCLUSION The computer crime is a great social danger Each individual who is a computer user in a network should be aware of the possibilities of external intruding and attack Protection in time Punishing and re-socialization of the perpetrators
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.