• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
 

อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

on

  • 1,234 views

 

Statistics

Views

Total Views
1,234
Views on SlideShare
1,234
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง Document Transcript

    • 6/2 20
    • 33101
    • 1 1-2 3 Computer Crime Law) 4-14 . 15-16
    • Cyber-Crime) “ ”
    • 10 The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders) 10-17 2543 5 , , , (Cyber-Crime and Intellectual Property Theft) 6
    • 6 e-terrorism)
    • 18 USC 2252 18 USC 2252A 47 USC 223
    • 1. 3 · (Hacker) · (Cracker) Hacker · (Script Kiddy) 2. (Hardware Theft and Vandalism) 3. (Software Theft) 4. (Malicious Code) 5. (Spyware) 6. (Spam Mail) 7. (Phishing)
    • 1. (Antivirus Program) 2. (Firewall System) 3. (Encryption) 4. (Back Up) Computer Crime Law) 6 5 10
    • Computer Crime Law) Computer Misuse Law) 2
    • Nullapoenasinelege) Domain Name)
    • Hard Disk) Hard Disk Hard Disk Hard Disk - Hacker Cracker
    • Computer Crime Law)
    • Computer Crime Law) Computer Misuse Law) 2545
    • Nullapoenasinelege) Domain Name) Hard Disk)
    • Hard Disk Hard Disk Hard Disk Hacker Cracker
    • Computer System) Information System) Computer Network) “ ” “ ” “ ” Hardware) Software) Digital Data) Peripheral) Input) Output) Store and Record)
    • “ ” “ ” “
    • Digital Data)” Traffic Data) Internet ProtocolAddress) IP Address Email Address) URL) “ ”
    • Virus Computer Virus Computer Computer Hard Disk - Trojan Hors Virus Computer Trojan Horse Hacker Bomb Time Bomb
    • Logic Bomb Bomb -- Rabbit Computer - Sniffer Log On Passward) Spoofin InternetAddress) -- The Hole in the Web
    • world wide web Website Websit Input Process) - Disk Disk Hard - Disk,Floppy Disk Disk Removable HardDisk- - Data) : Computer Espionage)-
    • Unauthorized Access) - Password) Hacker Hack Server ISP Account Account Data Processing Computer Subotage) - Virus Damageto Data and Program) - Alteration of Data and Program) -
    • Output Process) Sewaging)- Printout Print- National Computer SecurityCenter UnauthorisedAccess)-
    • Computer Misuse)- ComputerRelated Crime)- Security) Integrity) Confidential) Availability) Hacking or Cracking) Computer Trespass) Passwords) Secret Trade) “ Access)”
    • “ ” “ ” LAN (Local AreaNetwork) Illegal Interception)
    • TheRight of Privacy of Data Communication) “ ” Technical Means) Non-PublicTransmissions) Data and System Interference)
    • Trojan Horse Daniel of Service) Hacker Tools) Forward) Hyperlinks)
    • . . (Hacker) " " " " " "
    • " (Hacker) " " mail mail " " (Corporate Eepionage) . " " " " Mail
    • " " Mail . " - - - - - " - . "
    • Forward " " (electronic footprints) IP
    • http://www.lawyerthai.com/articles/it/ php http://www.microsoft.com/thailand/piracy/cybercrime.aspx http://noopor1991.blogspot.com/p/8_10.html