SlideShare a Scribd company logo
1 of 5
República Bolivariana de Venezuela
Universidad Bicentenaria deAragua
VicerrectoradoAcadémico
Facultad de Ciencias Políticas y Jurídicas
Escuela de Derecho
SanAntonio- Edo. Miranda
DELITOS INFORMÁTICOS
AU TO R :
C A R L O TA M O R A L E S .
C . I : 3 0 . 4 5 2 . 8 5 6 .
T U TO R :
M I R L E N I S R A M O S
M AT E R I A: I N F O R M Á T I C A I I I
O C T U B R E , 2 0 2 2 .
Que es un delito informático?
L O S D E L I T O S I N F O R M Á T I C O S S O N T O D A S A Q U E L L A S A C C I O N E S I L E G A L E S , D E L I C T I V A S , A N T I É T I C A S
O N O A U T O R I Z A D A S Q U E H A C E N U S O D E D I S P O S I T I V O S E L E C T R Ó N I C O S E I N T E R N E T , A F I N D E V U L N E R A R ,
M E N O S C A B A R O D A Ñ A R L O S B I E N E S , P A T R I M O N I A L E S O N O , D E T E R C E R A S P E R S O N A S O E N T I D A D E S .
C O N O C I D O S T A M B I É N C O N E L N O M B R E D E D E L I T O S C I B E R N É T I C O S O E L E C T R Ó N I C O S , A B A R C A N U N A M P L I O
E S P E C T R O D E A C C I O N E S I L E G A L E S D E D I F E R E N T E N A T U R A L E Z A . T O D O S T I E N E N E N C O M Ú N L A S
T E C N O L O G Í A S D E L A I N F O R M A C I Ó N , S E A E S T A S E L M E D I O O E L O B J E T I V O E N S Í M I S M O .
E L C O N S T A N T E P R O G R E S O T E C N O L Ó G I C O Q U E E X P E R I M E N T A L A S O C I E D A D , S U P O N E U N A
E V O L U C I Ó N E N L A S F O R M A S D E D E L I N Q U I R , D A N D O L U G A R , T A N T O A L A D U L C I F I C A C I Ó N D E L O S D E L I T O S
T R A D I C I O N A L E S C O M O L A A P O R T A C I Ó N D E N U E V O S L Í C I T O S . E S T A R E A L I D A D H A O R I G I N A D O U N D E B A T E
E N T O R N O A L A N E C E S I D A D D E D I S T I N G U I R O N O A L O S D E L I T O S I N F O R M Á T I C O S D E L R E S T O .
D I V E R S O S A U T O R E S Y O R G A N I S M O S H A N P R O P U E S T O D E F I N I C I O N E S D E L O S D E L I T O S
I N F O R M Á T I C O S , A P O R T A N D O D I S T I N T A S P E R S P E C T I V A S Y M A T I C E S A L C O N C E P T O . A L G O S C O N S I D E R A N Q U E
E S I N N E C E S A R I O D I F E R E N C I A R L O S D E L I T O S I N F O R M Á T I C O S D E L O S T R A D I C I O N A L E S , Y A Q U E , S E G Ú N E S T O S
S E T R A T A D E L O S M I S M O S D E L I T O S C O M E T I D O S A T R A V É S D E O T R O S M E D I O S
Tipos de delitos informáticos
• F R A U D E S .
• S A B O TA J E I N F O R M Á T I C O .
• E S P I O N A J E I N F O R M Á T I C O .
• R O B O D E S O F T W A R E
• R O B O D E S E RV I C I O S
• A C C E S O N O A U T O R I Z A D O A S E RV I C I O S I N F O R M Á T I C O S .
Características de los delitos informáticos
• S O N C O N D U C T A S C R I M I N A L E S D E C U E L L O B L A N C O , E S T O S I G N I F I C A Q U E S O L O U N D E T E R M I N A D O N Ú M E R O D E
P E R S O N A S C O N C I E R T O S C O N O C I M I E N T O S T É C N I C O S L O S P U E D E N C O M E T E R , Y A Q U E E X I G E S E R E X P E R T O E N
S I S T E M A S .
• S O N A C C I O N E S I L Í C I T A S D E D E L I N C U E N T E S P R O F E S I O N A L E S , Q U E A P R O V E C H A N U N A O C A S I Ó N C R E A D A P O R E L
S I S T E M A T E C N O L Ó G I C O Y E C O N Ó M I C O P A R A A P R O V E C H A R A U S U A R I O S V U L N E R A B L E S .
• P R O V O C A N S E R I A S P É R D I D A S E C O N Ó M I C A S , Q U E D E P E N D E R Á N D E L T I P O D E D E L I T O D I G I T A L D E Q U E S E
T R A T E . A C T U A L M E N T E L A F U G A D E D A T O S E S M U Y C O M Ú N Y S U V A L O R E S M U C H A S V E C E S I N C O N M E N S U R A B L E .
• S E P R O D U C E N E N P O C O S S E G U N D O S Y S I N N E C E S I D A D D E P R E S E N C I A F Í S I C A . L A A C T I V I D A D D E L I C T U A L E S A
T R A V É S D E D I S P O S I T I V O S E L E C T R Ó N I C O S R E M O T O S .
• P R E S E N T A N G R A N D E S D I F I C U L T A D E S P A R A S U C O M P R O B A C I Ó N D E B I D O A S U C A R Á C T E R T É C N I C O , L O S
E X P E R T O S Q U E L O S C O M E T E N S A B E N C O M O O C U L T A R S U S H U E L L A S D I G I T A L E S .
Referencias Bibliograficas.
• Q U É S O N L O S D E L I T O S I N F O R M Á T I C O S . ( 2 0 1 9 , 2 4 A B R I L ) . S I G N I F I C A D O S .
H T T P S : / / W W W. S I G N I F I C A D O S . C O M / D E L I TO S - I N F O R M AT I C O S / 
• 3 E , A . ( 2 0 2 2 , 2 9 S E P T I E M B R E ) . C A R A C T E R Í S T I C A S P R I N C I PA L E S D E L O S D E L I TO S I N F O R M Á T I C O S .
A C A D E M I A 3 E . H T T P S : / / A C A D E M I A 3 E . C O M / C O M U N I D A D / C A R A C T E R I S T I C A S - P R I N C I PA L E S - D E - L O S -
D E L I T O S - I N F O R M AT I C O S /

More Related Content

Similar to Delitos Informáticos.pptx

INTRODUCCIÓN A LA GEOLOGÍA
INTRODUCCIÓN A LA GEOLOGÍAINTRODUCCIÓN A LA GEOLOGÍA
INTRODUCCIÓN A LA GEOLOGÍAjmsantaeufemia
 
Blue and Black Library Metal Sign (1).pdf
Blue and Black Library Metal Sign (1).pdfBlue and Black Library Metal Sign (1).pdf
Blue and Black Library Metal Sign (1).pdfBRAYANALEXANDERMENDI
 
carso danyverano.pdf
carso danyverano.pdfcarso danyverano.pdf
carso danyverano.pdfDanyVerano
 
Tecnicas publicitarias
Tecnicas publicitariasTecnicas publicitarias
Tecnicas publicitariasEnderson Ochoa
 
Efecto invernadero tatis
Efecto invernadero tatisEfecto invernadero tatis
Efecto invernadero tatisemilysofia1122
 
Energía renovable
Energía renovable Energía renovable
Energía renovable Arita01
 
Economía de Escala y Ag^.pptx
Economía de Escala y Ag^.pptxEconomía de Escala y Ag^.pptx
Economía de Escala y Ag^.pptxSeliKook
 
Dicas para potencializar o tratamento dos cabelos em casa
Dicas para potencializar o tratamento dos cabelos em casaDicas para potencializar o tratamento dos cabelos em casa
Dicas para potencializar o tratamento dos cabelos em casaCarla Lemos
 
El conflicto y los equipos de trabajo
El conflicto y los equipos de trabajoEl conflicto y los equipos de trabajo
El conflicto y los equipos de trabajoRamnFlores8
 
Lectura y construcción de gráficas de funciones lineales asociadas a divers...
Lectura y construcción de gráficas de funciones lineales asociadas a divers...Lectura y construcción de gráficas de funciones lineales asociadas a divers...
Lectura y construcción de gráficas de funciones lineales asociadas a divers...SEP
 
Metodologia simulacro
Metodologia simulacroMetodologia simulacro
Metodologia simulacroMartha Salas
 
EXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENE
EXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENEEXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENE
EXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENEcvswh9dqpw
 

Similar to Delitos Informáticos.pptx (20)

INTRODUCCIÓN A LA GEOLOGÍA
INTRODUCCIÓN A LA GEOLOGÍAINTRODUCCIÓN A LA GEOLOGÍA
INTRODUCCIÓN A LA GEOLOGÍA
 
Trabajo final química IV
Trabajo final química IVTrabajo final química IV
Trabajo final química IV
 
Trabajo final Química IV
Trabajo final Química IV Trabajo final Química IV
Trabajo final Química IV
 
Corrosión
CorrosiónCorrosión
Corrosión
 
Blue and Black Library Metal Sign (1).pdf
Blue and Black Library Metal Sign (1).pdfBlue and Black Library Metal Sign (1).pdf
Blue and Black Library Metal Sign (1).pdf
 
carso danyverano.pdf
carso danyverano.pdfcarso danyverano.pdf
carso danyverano.pdf
 
Tecnicas publicitarias
Tecnicas publicitariasTecnicas publicitarias
Tecnicas publicitarias
 
TORNILLOS
TORNILLOS TORNILLOS
TORNILLOS
 
Efecto invernadero tatis
Efecto invernadero tatisEfecto invernadero tatis
Efecto invernadero tatis
 
Energía renovable
Energía renovable Energía renovable
Energía renovable
 
Ada 5 b3_castillo_monica
Ada 5 b3_castillo_monicaAda 5 b3_castillo_monica
Ada 5 b3_castillo_monica
 
Economía de Escala y Ag^.pptx
Economía de Escala y Ag^.pptxEconomía de Escala y Ag^.pptx
Economía de Escala y Ag^.pptx
 
Jose carlos
Jose carlosJose carlos
Jose carlos
 
Dicas para potencializar o tratamento dos cabelos em casa
Dicas para potencializar o tratamento dos cabelos em casaDicas para potencializar o tratamento dos cabelos em casa
Dicas para potencializar o tratamento dos cabelos em casa
 
precentacion
precentacionprecentacion
precentacion
 
éTica en las tics
éTica en las ticséTica en las tics
éTica en las tics
 
El conflicto y los equipos de trabajo
El conflicto y los equipos de trabajoEl conflicto y los equipos de trabajo
El conflicto y los equipos de trabajo
 
Lectura y construcción de gráficas de funciones lineales asociadas a divers...
Lectura y construcción de gráficas de funciones lineales asociadas a divers...Lectura y construcción de gráficas de funciones lineales asociadas a divers...
Lectura y construcción de gráficas de funciones lineales asociadas a divers...
 
Metodologia simulacro
Metodologia simulacroMetodologia simulacro
Metodologia simulacro
 
EXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENE
EXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENEEXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENE
EXPRESIÓN ORAL Y ESCRITA UN DOCUMENTOQUE TIENE
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Delitos Informáticos.pptx

  • 1. República Bolivariana de Venezuela Universidad Bicentenaria deAragua VicerrectoradoAcadémico Facultad de Ciencias Políticas y Jurídicas Escuela de Derecho SanAntonio- Edo. Miranda DELITOS INFORMÁTICOS AU TO R : C A R L O TA M O R A L E S . C . I : 3 0 . 4 5 2 . 8 5 6 . T U TO R : M I R L E N I S R A M O S M AT E R I A: I N F O R M Á T I C A I I I O C T U B R E , 2 0 2 2 .
  • 2. Que es un delito informático? L O S D E L I T O S I N F O R M Á T I C O S S O N T O D A S A Q U E L L A S A C C I O N E S I L E G A L E S , D E L I C T I V A S , A N T I É T I C A S O N O A U T O R I Z A D A S Q U E H A C E N U S O D E D I S P O S I T I V O S E L E C T R Ó N I C O S E I N T E R N E T , A F I N D E V U L N E R A R , M E N O S C A B A R O D A Ñ A R L O S B I E N E S , P A T R I M O N I A L E S O N O , D E T E R C E R A S P E R S O N A S O E N T I D A D E S . C O N O C I D O S T A M B I É N C O N E L N O M B R E D E D E L I T O S C I B E R N É T I C O S O E L E C T R Ó N I C O S , A B A R C A N U N A M P L I O E S P E C T R O D E A C C I O N E S I L E G A L E S D E D I F E R E N T E N A T U R A L E Z A . T O D O S T I E N E N E N C O M Ú N L A S T E C N O L O G Í A S D E L A I N F O R M A C I Ó N , S E A E S T A S E L M E D I O O E L O B J E T I V O E N S Í M I S M O . E L C O N S T A N T E P R O G R E S O T E C N O L Ó G I C O Q U E E X P E R I M E N T A L A S O C I E D A D , S U P O N E U N A E V O L U C I Ó N E N L A S F O R M A S D E D E L I N Q U I R , D A N D O L U G A R , T A N T O A L A D U L C I F I C A C I Ó N D E L O S D E L I T O S T R A D I C I O N A L E S C O M O L A A P O R T A C I Ó N D E N U E V O S L Í C I T O S . E S T A R E A L I D A D H A O R I G I N A D O U N D E B A T E E N T O R N O A L A N E C E S I D A D D E D I S T I N G U I R O N O A L O S D E L I T O S I N F O R M Á T I C O S D E L R E S T O . D I V E R S O S A U T O R E S Y O R G A N I S M O S H A N P R O P U E S T O D E F I N I C I O N E S D E L O S D E L I T O S I N F O R M Á T I C O S , A P O R T A N D O D I S T I N T A S P E R S P E C T I V A S Y M A T I C E S A L C O N C E P T O . A L G O S C O N S I D E R A N Q U E E S I N N E C E S A R I O D I F E R E N C I A R L O S D E L I T O S I N F O R M Á T I C O S D E L O S T R A D I C I O N A L E S , Y A Q U E , S E G Ú N E S T O S S E T R A T A D E L O S M I S M O S D E L I T O S C O M E T I D O S A T R A V É S D E O T R O S M E D I O S
  • 3. Tipos de delitos informáticos • F R A U D E S . • S A B O TA J E I N F O R M Á T I C O . • E S P I O N A J E I N F O R M Á T I C O . • R O B O D E S O F T W A R E • R O B O D E S E RV I C I O S • A C C E S O N O A U T O R I Z A D O A S E RV I C I O S I N F O R M Á T I C O S .
  • 4. Características de los delitos informáticos • S O N C O N D U C T A S C R I M I N A L E S D E C U E L L O B L A N C O , E S T O S I G N I F I C A Q U E S O L O U N D E T E R M I N A D O N Ú M E R O D E P E R S O N A S C O N C I E R T O S C O N O C I M I E N T O S T É C N I C O S L O S P U E D E N C O M E T E R , Y A Q U E E X I G E S E R E X P E R T O E N S I S T E M A S . • S O N A C C I O N E S I L Í C I T A S D E D E L I N C U E N T E S P R O F E S I O N A L E S , Q U E A P R O V E C H A N U N A O C A S I Ó N C R E A D A P O R E L S I S T E M A T E C N O L Ó G I C O Y E C O N Ó M I C O P A R A A P R O V E C H A R A U S U A R I O S V U L N E R A B L E S . • P R O V O C A N S E R I A S P É R D I D A S E C O N Ó M I C A S , Q U E D E P E N D E R Á N D E L T I P O D E D E L I T O D I G I T A L D E Q U E S E T R A T E . A C T U A L M E N T E L A F U G A D E D A T O S E S M U Y C O M Ú N Y S U V A L O R E S M U C H A S V E C E S I N C O N M E N S U R A B L E . • S E P R O D U C E N E N P O C O S S E G U N D O S Y S I N N E C E S I D A D D E P R E S E N C I A F Í S I C A . L A A C T I V I D A D D E L I C T U A L E S A T R A V É S D E D I S P O S I T I V O S E L E C T R Ó N I C O S R E M O T O S . • P R E S E N T A N G R A N D E S D I F I C U L T A D E S P A R A S U C O M P R O B A C I Ó N D E B I D O A S U C A R Á C T E R T É C N I C O , L O S E X P E R T O S Q U E L O S C O M E T E N S A B E N C O M O O C U L T A R S U S H U E L L A S D I G I T A L E S .
  • 5. Referencias Bibliograficas. • Q U É S O N L O S D E L I T O S I N F O R M Á T I C O S . ( 2 0 1 9 , 2 4 A B R I L ) . S I G N I F I C A D O S . H T T P S : / / W W W. S I G N I F I C A D O S . C O M / D E L I TO S - I N F O R M AT I C O S / • 3 E , A . ( 2 0 2 2 , 2 9 S E P T I E M B R E ) . C A R A C T E R Í S T I C A S P R I N C I PA L E S D E L O S D E L I TO S I N F O R M Á T I C O S . A C A D E M I A 3 E . H T T P S : / / A C A D E M I A 3 E . C O M / C O M U N I D A D / C A R A C T E R I S T I C A S - P R I N C I PA L E S - D E - L O S - D E L I T O S - I N F O R M AT I C O S /