อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

  • 1,329 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,329
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 6/2 20
  • 2. 33101
  • 3. 1 1-2 3 Computer Crime Law) 4-14 . 15-16
  • 4. Cyber-Crime) “ ”
  • 5. 10 The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders) 10-17 2543 5 , , , (Cyber-Crime and Intellectual Property Theft) 6
  • 6. 6 e-terrorism)
  • 7. 18 USC 2252 18 USC 2252A 47 USC 223
  • 8. 1. 3 · (Hacker) · (Cracker) Hacker · (Script Kiddy) 2. (Hardware Theft and Vandalism) 3. (Software Theft) 4. (Malicious Code) 5. (Spyware) 6. (Spam Mail) 7. (Phishing)
  • 9. 1. (Antivirus Program) 2. (Firewall System) 3. (Encryption) 4. (Back Up) Computer Crime Law) 6 5 10
  • 10. Computer Crime Law) Computer Misuse Law) 2
  • 11. Nullapoenasinelege) Domain Name)
  • 12. Hard Disk) Hard Disk Hard Disk Hard Disk - Hacker Cracker
  • 13. Computer Crime Law)
  • 14. Computer Crime Law) Computer Misuse Law) 2545
  • 15. Nullapoenasinelege) Domain Name) Hard Disk)
  • 16. Hard Disk Hard Disk Hard Disk Hacker Cracker
  • 17. Computer System) Information System) Computer Network) “ ” “ ” “ ” Hardware) Software) Digital Data) Peripheral) Input) Output) Store and Record)
  • 18. “ ” “ ” “
  • 19. Digital Data)” Traffic Data) Internet ProtocolAddress) IP Address Email Address) URL) “ ”
  • 20. Virus Computer Virus Computer Computer Hard Disk - Trojan Hors Virus Computer Trojan Horse Hacker Bomb Time Bomb
  • 21. Logic Bomb Bomb -- Rabbit Computer - Sniffer Log On Passward) Spoofin InternetAddress) -- The Hole in the Web
  • 22. world wide web Website Websit Input Process) - Disk Disk Hard - Disk,Floppy Disk Disk Removable HardDisk- - Data) : Computer Espionage)-
  • 23. Unauthorized Access) - Password) Hacker Hack Server ISP Account Account Data Processing Computer Subotage) - Virus Damageto Data and Program) - Alteration of Data and Program) -
  • 24. Output Process) Sewaging)- Printout Print- National Computer SecurityCenter UnauthorisedAccess)-
  • 25. Computer Misuse)- ComputerRelated Crime)- Security) Integrity) Confidential) Availability) Hacking or Cracking) Computer Trespass) Passwords) Secret Trade) “ Access)”
  • 26. “ ” “ ” LAN (Local AreaNetwork) Illegal Interception)
  • 27. TheRight of Privacy of Data Communication) “ ” Technical Means) Non-PublicTransmissions) Data and System Interference)
  • 28. Trojan Horse Daniel of Service) Hacker Tools) Forward) Hyperlinks)
  • 29. . . (Hacker) " " " " " "
  • 30. " (Hacker) " " mail mail " " (Corporate Eepionage) . " " " " Mail
  • 31. " " Mail . " - - - - - " - . "
  • 32. Forward " " (electronic footprints) IP
  • 33. http://www.lawyerthai.com/articles/it/ php http://www.microsoft.com/thailand/piracy/cybercrime.aspx http://noopor1991.blogspot.com/p/8_10.html