80 likes | 234 Views
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA. 01.12.2003 -04.11.2003 Belgrad. CONTENTS :. COMPUTER CRIME - NOTION AND DEFINITION LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA
E N D
DATA PROTECTION 2003THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad
CONTENTS: • COMPUTER CRIME - NOTION AND DEFINITION • LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA • MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES • WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME • PREVENTION OF THE COMPUTER CRIME • CONCLUSION
COMPUTER CRIMENOTION AND DEFINITION • SPECIFIC FORM OF THE MODERN CRIME • PASSES STATE BORDERS AND CONTINENTS • SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW • SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER • SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY • THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON
LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA • Article 251 of the Criminal Law of RM (entering into computer system) Official Gazette no 37/1996.
computer trickery financial theft and misuse making and use of computer viruses forgery of data computer sabotage and espionage hackership MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES
injured party reports damage administrators of information systems find out external attack the investigation and producing evidence must be done by experts that have practical knowledge computer forensic WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME
PREVENTION OF THE COMPUTER CRIME • information education • administering of the information systems by trained persons • use of modern protection from unauthorized entering (both hardware and software security systems) • punishing of the computer crimes
CONCLUSION • The computer crime is a great social danger • Each individual who is a computer user in a network should be aware of the possibilities of external intruding and attack • Protection in time • Punishing and re-socialization of the perpetrators