Ir al contenido principal

2.DELIBERATE ACT OF INFORMATION EXTORTION/BLACKMAIL

Illicit access will be typified in the event that a person accesses a computer system, however without authorization and could even exceed generating the security measures are violated. It is to be noticed, after reading the referred  article, does not require your configuration to subtract or delete information.

It has the following characteristics:

*The active subject is the one who accesses the computer system.
*The taxpayer is the owner of this system, who can be a natural person or legal.
*The behavior committed by the agent is fraudulent since he has had the will to access the computer system, without having an authorization or has exceeded of what he has. 

Comentarios

Entradas más populares de este blog

3. DELIBERATE ACT OF SABOTAGE OR VANDALISM.

SPAM: Receipt of unsolicited messages, mainly by email, whose it's a lot of commercial or propaganda messages.  Deliberate act of sabotage or vandalism (ex: Destruction of systems or information). Deliberate acts of theft (ex:Illegal Confiscation of equipment or information) Deliberate software attacks (ex: Viruses, worms, macros, denial-of-service) Deviations in quality of service from service providers(ex: Power and WAN issues). Forces of nature(ex: Flood, earthquake, fire, lightning). Technical or hardware failure or errors (ex: Equipment failure). Technical software failure or errors (ex: Bugs, code problems, unknown loopholes). Technological obsolescence (ex: Antiquated or outdated technologies). https://www.youtube.com/watch?v=ORD37NV_utY For me an act of vandalism means damage to morals or damage to public works, as you can see in this video there are two guys staining a wall, in computer science we can see how there a...

CONCEPTUAL MAP