Computer crime law. Episode: assigning guilt and penalty provisions. Development of computer crime law that initially developed in consideration of the nature of offense per computer system. Information system and network system, which may conclude an important mistake is base 3.-Access without authority (Unauthorised Access)-Use the computer without the likes (Computer Misuse)-Anomalies are related to computers (Computer Related Crime)This is. An individual basis determined as summarized above. It is intended to provide.Different protection. As follows:1. an Access database without power or by violating the law and the use of computers in.Offense with access without authority, or by violating the law and the use of the computer misuse Act is regarded as a threat or hazard to the Security (Security) of computer systems and information systems. When the system is not secure, it will affect the completeness (Integrity), confidentiality (Confidential) and idle stability (Availability) of computer systems and information systems.(1) access without power.Violation of this legal provision may occur in several ways, such as hacking (Cracking or Hacking), or a computer intrusion (Computer Trespass) to destroy the computer system or to alter the information or to gain access to the information kept confidential, such as secret codes (Passwords), or trade secrets (Trade Secret), etc.This may also be the source of the offending other bases, such as using computers to fraud or counterfeiting a document which could cause continuous damage is huge.The term "access (Access)" in this case means access to all physical levels, such as those of the comments made by one of the methods by sitting in front the computer itself and includes access to a computer system in which even a person that has access to it is by a distance with the computer. But breaking into the system that they want."Access" in this case, it means access to all or part of a computer system, but it has. It may refer to access hardware or parts of a computer or the data stored in the system is to be used to send or transfer to another person, such as traffic information, etc.In addition, "access to" the means of access through a public network like the Internet as a link between a network of multiple networks together, and also means of access through the same network, such as a LAN (Local Area Network) is a network that connects computers located in together Street area.For this scale. Given access to without love is wrong, even if those actions are torture has no incentive to cause this damage, because doing so can cause an action to another base, or nearby bases relatively easily and may cause serious damage. Moreover, the incentive to commit torture proved quite difficult.(2) the stealth interceptor data.This article is about an act of hacking a trap by violating the law (Illegal Interception) because it is intended to protect the right to privacy in communications (The Right of Privacy of Data Communication) in the same way to communicate original format at dakfang or calling prohibiting secret tape recording secretly, etc."Stealth interceptor data" means that data is intercepted by a stealth method of technical (Technical Means) to hacking dakfang. Monitor or track the subject matter of the message to the communication between an individual or case is an action as well as to deceive or to supply such information to other persons, including the information note seeks to communicate to each other.This is. The technical method also refers to a device that is connected to the network, and includes the device type, such as wireless communication via mobile phone, etc.However, Acts as an interceptor stealth base data. The information that is sent must not send information and disclosure to the public perception. (Non-Public Transmissions) This foments the limitation, but just how to send data to the sender wishes to transmit the information to a designated person, one person only, specifically? Therefore, This article does not have an issue that must consider the subject matter of the information submitted by the.(3) a base system interferenceThese mistakes is to interfere with the system-wide information and computer systems (Data and System Interference) penalty committed by criminals who deliberately cause damage to computer systems and data. Focusing on the protection of Completeness of the information, and the stability in the implementation or use of the information or computer programs recorded on computer media as normal.Examples of these base offense: data entry, data destruction, or programs that contain viruses or Trojan Horse programs, is entered into the system in order to steal the password of the user computer. For the delete to change. Modify the information, or any action to interfere with the system or data entry program that causes the system to refuse to work (Daniel of Service), which is the most popular, or making the system slow down, etc.(4) use of Roo ngoto professional misuseThis scale is different from the previous scale provisions because it is about production, distribution,Pay supplier or possession of computer equipment that is used in the offense, such as drilling equipment systems (Hacker Tools) as well as computer passwords, access codes or other information in a similar manner.But this does not include. The device, created to defend the system or system testing, but these devices are used, they must be subject to the condition that there must be a competent or authorized to perform only.For the distribution, as well as to send information to others to one another (Forward) or linking together databases (Hyperlinks).For the nation's computer crime story Thai, we would say this only briefly. To make space for other matters of interest. Because of the offer.
การแปล กรุณารอสักครู่..
![](//thimg.ilovetranslation.com/pic/loading_3.gif?v=b9814dd30c1d7c59_8619)