อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

1,429 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,429
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

  1. 1. 6/2 20
  2. 2. 33101
  3. 3. 1 1-2 3 Computer Crime Law) 4-14 . 15-16
  4. 4. Cyber-Crime) “ ”
  5. 5. 10 The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders) 10-17 2543 5 , , , (Cyber-Crime and Intellectual Property Theft) 6
  6. 6. 6 e-terrorism)
  7. 7. 18 USC 2252 18 USC 2252A 47 USC 223
  8. 8. 1. 3 · (Hacker) · (Cracker) Hacker · (Script Kiddy) 2. (Hardware Theft and Vandalism) 3. (Software Theft) 4. (Malicious Code) 5. (Spyware) 6. (Spam Mail) 7. (Phishing)
  9. 9. 1. (Antivirus Program) 2. (Firewall System) 3. (Encryption) 4. (Back Up) Computer Crime Law) 6 5 10
  10. 10. Computer Crime Law) Computer Misuse Law) 2
  11. 11. Nullapoenasinelege) Domain Name)
  12. 12. Hard Disk) Hard Disk Hard Disk Hard Disk - Hacker Cracker
  13. 13. Computer Crime Law)
  14. 14. Computer Crime Law) Computer Misuse Law) 2545
  15. 15. Nullapoenasinelege) Domain Name) Hard Disk)
  16. 16. Hard Disk Hard Disk Hard Disk Hacker Cracker
  17. 17. Computer System) Information System) Computer Network) “ ” “ ” “ ” Hardware) Software) Digital Data) Peripheral) Input) Output) Store and Record)
  18. 18. “ ” “ ” “
  19. 19. Digital Data)” Traffic Data) Internet ProtocolAddress) IP Address Email Address) URL) “ ”
  20. 20. Virus Computer Virus Computer Computer Hard Disk - Trojan Hors Virus Computer Trojan Horse Hacker Bomb Time Bomb
  21. 21. Logic Bomb Bomb -- Rabbit Computer - Sniffer Log On Passward) Spoofin InternetAddress) -- The Hole in the Web
  22. 22. world wide web Website Websit Input Process) - Disk Disk Hard - Disk,Floppy Disk Disk Removable HardDisk- - Data) : Computer Espionage)-
  23. 23. Unauthorized Access) - Password) Hacker Hack Server ISP Account Account Data Processing Computer Subotage) - Virus Damageto Data and Program) - Alteration of Data and Program) -
  24. 24. Output Process) Sewaging)- Printout Print- National Computer SecurityCenter UnauthorisedAccess)-
  25. 25. Computer Misuse)- ComputerRelated Crime)- Security) Integrity) Confidential) Availability) Hacking or Cracking) Computer Trespass) Passwords) Secret Trade) “ Access)”
  26. 26. “ ” “ ” LAN (Local AreaNetwork) Illegal Interception)
  27. 27. TheRight of Privacy of Data Communication) “ ” Technical Means) Non-PublicTransmissions) Data and System Interference)
  28. 28. Trojan Horse Daniel of Service) Hacker Tools) Forward) Hyperlinks)
  29. 29. . . (Hacker) " " " " " "
  30. 30. " (Hacker) " " mail mail " " (Corporate Eepionage) . " " " " Mail
  31. 31. " " Mail . " - - - - - " - . "
  32. 32. Forward " " (electronic footprints) IP
  33. 33. http://www.lawyerthai.com/articles/it/ php http://www.microsoft.com/thailand/piracy/cybercrime.aspx http://noopor1991.blogspot.com/p/8_10.html

×