8
DATA PROTECTION 2003 DATA PROTECTION 2003 THEORY AND PRACTICE OF THEORY AND PRACTICE OF HANDLING WITH THE HANDLING WITH THE COMPUTER CRIME IN THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

Embed Size (px)

DESCRIPTION

COMPUTER CRIME NOTION AND DEFINITION SPECIFIC FORM OF THE MODERN CRIME SPECIFIC FORM OF THE MODERN CRIME PASSES STATE BORDERS AND CONTINENTS PASSES STATE BORDERS AND CONTINENTS SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON

Citation preview

Page 1: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

DATA PROTECTION 2003DATA PROTECTION 2003

THEORY AND PRACTICE OF THEORY AND PRACTICE OF HANDLING WITH THE HANDLING WITH THE

COMPUTER CRIME IN THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIAREPUBLIC OF MACEDONIA

01.12.2003 -04.11.2003 Belgrad

Page 2: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

CONTENTSCONTENTS::COMPUTER CRIMECOMPUTER CRIME - - NOTION AND DEFINITIONNOTION AND DEFINITION

LEGAL REGULATION OF THE COMPUTER CRIME IN THE LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIAREPUBLIC OF MACEDONIA

MANIFESTATION FORMS AND WAYS OF COMMITTING MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMESCOMPUTER CRIMES

WAYS OF DETECTING, MEASURES FOR FINDING OF THE WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIMECOMPUTER CRIME

PREVENTION OF THE COMPUTER CRIMEPREVENTION OF THE COMPUTER CRIME

CONCLUSIONCONCLUSION

Page 3: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

COMPUTER CRIMECOMPUTER CRIMENOTION AND DEFINITIONNOTION AND DEFINITION

SPECIFIC FORM OF THE MODERN CRIMESPECIFIC FORM OF THE MODERN CRIME PASSES STATE BORDERS AND CONTINENTSPASSES STATE BORDERS AND CONTINENTS SOCIALLY DANGEROUSSOCIALLY DANGEROUS, , ILLEGAL ACTS THAT ARE ILLEGAL ACTS THAT ARE

PUNISHABLE BY THE LAWPUNISHABLE BY THE LAW SPECIFIC WAY AND DEVICE OF COMMITTING CRIME SPECIFIC WAY AND DEVICE OF COMMITTING CRIME

WITH THE HELP OF COMPUTERWITH THE HELP OF COMPUTER SPECIAL OBJECT FOR PROTECTION, SECURITY OF SPECIAL OBJECT FOR PROTECTION, SECURITY OF

COMPUTER DATA OR INFORMATION SYSTEMS IN COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELYSEGMENTS OR ENTIRELY

THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSONDAMAGE TO OTHER PERSON

Page 4: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

LEGAL REGULATION OF THE LEGAL REGULATION OF THE COMPUTER CRIME IN THE COMPUTER CRIME IN THE

REPUBLIC OF MACEDONIAREPUBLIC OF MACEDONIA

Article 251 of the Criminal Law of RM Article 251 of the Criminal Law of RM (entering into computer system)(entering into computer system)

Official Gazette no 37/1996Official Gazette no 37/1996..

Page 5: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

computer trickerycomputer trickery financial theft and misusefinancial theft and misuse making and use of computer virusesmaking and use of computer viruses forgery of dataforgery of data computer sabotage and espionagecomputer sabotage and espionage hackershiphackership

MANIFESTATION FORMS AND MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER WAYS OF COMMITTING COMPUTER

CRIMESCRIMES

Page 6: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

injured party reports damageinjured party reports damage administrators of information systems find out administrators of information systems find out

external attack external attack the investigation and producing evidence must be the investigation and producing evidence must be

done by experts that have practical knowledgedone by experts that have practical knowledge computer forensiccomputer forensic

WAYS OF DETECTING, WAYS OF DETECTING, MEASURES FOR FINDING OF THE MEASURES FOR FINDING OF THE PERPETRATORS AND PERPETRATORS AND PRODUCING EVIDENCE FOR PRODUCING EVIDENCE FOR COMPUTER CRIMECOMPUTER CRIME

Page 7: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

PREVENTION OF THE PREVENTION OF THE COMPUTER CRIMECOMPUTER CRIME

information educationinformation education administering of the information systems by trained administering of the information systems by trained

personspersons use of modern protection from unauthorized entering use of modern protection from unauthorized entering

(both hardware and software security systems)(both hardware and software security systems) punishing of the computer crimespunishing of the computer crimes

Page 8: DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

CONCLUSIONCONCLUSION

The computer crime is a great social dangerThe computer crime is a great social danger

Each individual who is a computer user in a network Each individual who is a computer user in a network should be aware of the possibilities of external intruding should be aware of the possibilities of external intruding and attackand attack

Protection in time Protection in time

Punishing and re-socialization of the perpetratorsPunishing and re-socialization of the perpetrators