1 / 8

DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA

DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA. 01.12.2003 -04.11.2003 Belgrad. CONTENTS :. COMPUTER CRIME - NOTION AND DEFINITION LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA

art
Download Presentation

DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DATA PROTECTION 2003THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA 01.12.2003 -04.11.2003 Belgrad

  2. CONTENTS: • COMPUTER CRIME - NOTION AND DEFINITION • LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA • MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES • WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME • PREVENTION OF THE COMPUTER CRIME • CONCLUSION

  3. COMPUTER CRIMENOTION AND DEFINITION • SPECIFIC FORM OF THE MODERN CRIME • PASSES STATE BORDERS AND CONTINENTS • SOCIALLY DANGEROUS, ILLEGAL ACTS THAT ARE PUNISHABLE BY THE LAW • SPECIFIC WAY AND DEVICE OF COMMITTING CRIME WITH THE HELP OF COMPUTER • SPECIAL OBJECT FOR PROTECTION, SECURITY OF COMPUTER DATA OR INFORMATION SYSTEMS IN SEGMENTS OR ENTIRELY • THE AIM OF THE PERPETRATOR IS TO GAIN BENEFIT (MATERIAL OR IMMATERIAL) FOR HIM, OR TO CAUSE DAMAGE TO OTHER PERSON

  4. LEGAL REGULATION OF THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA • Article 251 of the Criminal Law of RM (entering into computer system) Official Gazette no 37/1996.

  5. computer trickery financial theft and misuse making and use of computer viruses forgery of data computer sabotage and espionage hackership MANIFESTATION FORMS AND WAYS OF COMMITTING COMPUTER CRIMES

  6. injured party reports damage administrators of information systems find out external attack the investigation and producing evidence must be done by experts that have practical knowledge computer forensic WAYS OF DETECTING, MEASURES FOR FINDING OF THE PERPETRATORS AND PRODUCING EVIDENCE FOR COMPUTER CRIME

  7. PREVENTION OF THE COMPUTER CRIME • information education • administering of the information systems by trained persons • use of modern protection from unauthorized entering (both hardware and software security systems) • punishing of the computer crimes

  8. CONCLUSION • The computer crime is a great social danger • Each individual who is a computer user in a network should be aware of the possibilities of external intruding and attack • Protection in time • Punishing and re-socialization of the perpetrators

More Related