Upload
kristian-nash
View
217
Download
0
Embed Size (px)
DESCRIPTION
COMPUTER CRIME NOTION AND DEFINITION SPECIFIC FORM OF THE MODERN CRIME SPECIFIC FORM OF THE MODERN CRIME PASSES STATE BORDERS AND CONTINENTS PASSES STATE BORDERS AND CONTINENTS SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON
Citation preview
DATA PROTECTION 2003DATA PROTECTION 2003
THEORY AND PRACTICE OF THEORY AND PRACTICE OF HANDLING WITH THE HANDLING WITH THE
COMPUTER CRIME IN THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIAREPUBLIC OF MACEDONIA
01.12.2003 -04.11.2003 Belgrad
CONTENTSCONTENTS::COMPUTER CRIMECOMPUTER CRIME - - NOTION AND DEFINITIONNOTION AND DEFINITION
LEGAL REGULATION OF THE COMPUTER CRIME IN THE LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIAREPUBLIC OF MACEDONIA
MANIFESTATION FORMS AND WAYS OF COMMITTING MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMESCOMPUTER CRIMES
WAYS OF DETECTING, MEASURES FOR FINDING OF THE WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIMECOMPUTER CRIME
PREVENTION OF THE COMPUTER CRIMEPREVENTION OF THE COMPUTER CRIME
CONCLUSIONCONCLUSION
COMPUTER CRIMECOMPUTER CRIMENOTION AND DEFINITIONNOTION AND DEFINITION
SPECIFIC FORM OF THE MODERN CRIMESPECIFIC FORM OF THE MODERN CRIME PASSES STATE BORDERS AND CONTINENTSPASSES STATE BORDERS AND CONTINENTS SOCIALLY DANGEROUSSOCIALLY DANGEROUS, , ILLEGAL ACTS THAT ARE ILLEGAL ACTS THAT ARE
PUNISHABLE BY THE LAWPUNISHABLE BY THE LAW SPECIFIC WAY AND DEVICE OF COMMITTING CRIME SPECIFIC WAY AND DEVICE OF COMMITTING CRIME
WITH THE HELP OF COMPUTERWITH THE HELP OF COMPUTER SPECIAL OBJECT FOR PROTECTION, SECURITY OF SPECIAL OBJECT FOR PROTECTION, SECURITY OF
COMPUTER DATA OR INFORMATION SYSTEMS IN COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELYSEGMENTS OR ENTIRELY
THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSONDAMAGE TO OTHER PERSON
LEGAL REGULATION OF THE LEGAL REGULATION OF THE COMPUTER CRIME IN THE COMPUTER CRIME IN THE
REPUBLIC OF MACEDONIAREPUBLIC OF MACEDONIA
Article 251 of the Criminal Law of RM Article 251 of the Criminal Law of RM (entering into computer system)(entering into computer system)
Official Gazette no 37/1996Official Gazette no 37/1996..
computer trickerycomputer trickery financial theft and misusefinancial theft and misuse making and use of computer virusesmaking and use of computer viruses forgery of dataforgery of data computer sabotage and espionagecomputer sabotage and espionage hackershiphackership
MANIFESTATION FORMS AND MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER WAYS OF COMMITTING COMPUTER
CRIMESCRIMES
injured party reports damageinjured party reports damage administrators of information systems find out administrators of information systems find out
external attack external attack the investigation and producing evidence must be the investigation and producing evidence must be
done by experts that have practical knowledgedone by experts that have practical knowledge computer forensiccomputer forensic
WAYS OF DETECTING, WAYS OF DETECTING, MEASURES FOR FINDING OF THE MEASURES FOR FINDING OF THE PERPETRATORS AND PERPETRATORS AND PRODUCING EVIDENCE FOR PRODUCING EVIDENCE FOR COMPUTER CRIMECOMPUTER CRIME
PREVENTION OF THE PREVENTION OF THE COMPUTER CRIMECOMPUTER CRIME
information educationinformation education administering of the information systems by trained administering of the information systems by trained
personspersons use of modern protection from unauthorized entering use of modern protection from unauthorized entering
(both hardware and software security systems)(both hardware and software security systems) punishing of the computer crimespunishing of the computer crimes
CONCLUSIONCONCLUSION
The computer crime is a great social dangerThe computer crime is a great social danger
Each individual who is a computer user in a network Each individual who is a computer user in a network should be aware of the possibilities of external intruding should be aware of the possibilities of external intruding and attackand attack
Protection in time Protection in time
Punishing and re-socialization of the perpetratorsPunishing and re-socialization of the perpetrators