1 :
Computer Crime Law)
6
5
10
Computer Crime Law)
Computer Misuse Law)
2
….(
Nullapoenasinelege)
Domain Name)
Hard Disk)
Hard Disk
Hard Disk
Hard Disk
Hacker
Cracker
————————————————–
2 :
2545
(
3 2545
3
1. Computer System)
2. Information System)
3. Computer Network)
“ ”
“ ”
“ ” Hardware) Software)
Digital Data)
Peripheral)
Input) Output)
Store and Record)
“ ”
“ ”
“ Digital Data)”
Traffic Data)
Internet Protocol
Address) IP Address
Email Address)
URL)
“ ”
————————————————–
3 :
- Virus Computer
Virus Computer
Computer Hard Disk
- Trojan Horse
Virus Computer Trojan Horse
Hacker
- Bomb
Time Bomb
Logi...
- Sniffer
Log On Passward)
- Spoofing
Internet Address)
- The Hole in the Web world wide web
Website
Websit
Input Process)...
- Hard Disk
-
- Data) : (Computer Espionage)
- Unauthorized Access)
Password)
Hacker Hack Server
ISP Account
Account
Data ...
- Damage to Data and Program)
- Alteration of Data and Program)
Output Process)
- Sewaging)
- Printout Print
National Comp...
————————————————–
4 :
3
- Unauthorised Access)
- Computer Misuse)
- Computer Related Crime)
1.
Security)
Integrity)
Confid...
(1)
Hacking or Cracking) Computer Trespass)
Passwords)
Secret Trade)
“ Access)”
“ ”
“ ”
LAN (Local Area
Network)
(2)
Illegal Interception)
The
Right of Privacy of Data Communication)
“ ”
Technical Means)
Non-Public
Transmissions)
(3)
Data and
System Interference)
Trojan Horse
Daniel of Service)
(4)
Hacker Tools)
Forward) Hyperlinks)
Upcoming SlideShare
Loading in …5
×

อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

80 views
60 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
80
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

อาชญากรรมทางคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง

  1. 1. 1 : Computer Crime Law) 6 5 10
  2. 2. Computer Crime Law) Computer Misuse Law) 2 ….(
  3. 3. Nullapoenasinelege) Domain Name)
  4. 4. Hard Disk) Hard Disk Hard Disk Hard Disk Hacker Cracker ————————————————–
  5. 5. 2 : 2545 ( 3 2545 3 1. Computer System) 2. Information System) 3. Computer Network)
  6. 6. “ ” “ ” “ ” Hardware) Software) Digital Data) Peripheral) Input) Output) Store and Record) “ ” “ ”
  7. 7. “ Digital Data)” Traffic Data) Internet Protocol Address) IP Address Email Address) URL) “ ”
  8. 8. ————————————————– 3 :
  9. 9. - Virus Computer Virus Computer Computer Hard Disk - Trojan Horse Virus Computer Trojan Horse Hacker - Bomb Time Bomb Logic Bomb Bomb - Rabbit Computer
  10. 10. - Sniffer Log On Passward) - Spoofing Internet Address) - The Hole in the Web world wide web Website Websit Input Process) - Disk Disk Hard Disk,Floppy Disk Disk Removable
  11. 11. - Hard Disk - - Data) : (Computer Espionage) - Unauthorized Access) Password) Hacker Hack Server ISP Account Account Data Processing - Computer Subotage) Virus
  12. 12. - Damage to Data and Program) - Alteration of Data and Program) Output Process) - Sewaging) - Printout Print National Computer Security Center 2000 64 16
  13. 13. ————————————————– 4 : 3 - Unauthorised Access) - Computer Misuse) - Computer Related Crime) 1. Security) Integrity) Confidential) Availability)
  14. 14. (1) Hacking or Cracking) Computer Trespass) Passwords) Secret Trade) “ Access)” “ ” “ ” LAN (Local Area
  15. 15. Network) (2) Illegal Interception) The Right of Privacy of Data Communication) “ ” Technical Means)
  16. 16. Non-Public Transmissions) (3) Data and System Interference) Trojan Horse Daniel of Service) (4)
  17. 17. Hacker Tools) Forward) Hyperlinks)

×