CONSIDERATIONS OF CRIMINAL LAW AND FORENSIC SCIENCE REGARDING THE ILLEGAL ACCESS TO A COMPUTER SYSTEM

Authors

  • Adrian Cristian MOISE Faculty of Juridical, Economic and Administrative Sciences “Spiru Haret” University of Bucharest, Romania *Correspondence: “Spiru Haret” University of Bucharest,Vasile Conta Street no.4, Craiova, Romania

DOI:

https://doi.org/10.15837/aijjs.v11i2.3160

Abstract

Starting from the provisions of Article 2 of the Council of Europe Convention on Cybercrime and from the provisions of Article 3 of Directive 2013/40/EU on attacks against information systems, the present study analyses how these provisions have been transposed into the text of Article 360 of the Romanian Criminal Code.  Illegal access to a computer system is a criminal offence that aims to affect the patrimony of individuals or legal entities.

The illegal access to computer systems is accomplished with the help of the social engineering techniques, the best known technique of this kind is the use of phishing threats. Typically, phishing attacks will lead the recipient to a Web page designed to simulate the visual identity of a target organization, and to gather personal information about the user, the victim having knowledge of the attack.

References

Computer Security Institute (2007). CSI Computer Crime and Security Survey 2007, Retrieved 25th of October 2017 from: http://gocsi.com/survey.

Dobrinoiu, Maxim (2006). Infracțiuniîndomeniulinformatic, [Crimes in the IT field], Bucharest: C.H. Beck Publishing House.

Gercke, Marco (2009). Council of Europe. Economic Crime Division. Directorate General of Human Rights and Legal Affairs. Strasbourg, Octopus Interface 2009, Cybercrime training for judges:Training manual(draft), March 2009.

Gercke, Marco (2012). International Telecommunication Union. Understanding Cybercrime: Phenomena, Challenges and Legal Response. Geneva.

The Honeynet Project.Know Your Enemy: Phishing, Retrieved 25th of October 2017 from: http://www.honeynet.org/papers/ phishing.

Hotca, Mihai Adrian; Dobrinoiu, Maxim (2008). Infracţiuniprevăzuteînlegispeciale. ComentariiÈ™iexplicaÈ›ii, [Crimes under special laws. Comments and explanations], Bucharest: C.H. Beck Publishing House.

Ollmann, Gunter. Next Generation Security Software Ltd., NGSSoftware Insight Security Research, The Phishing Guide. Understanding&Preventing Phishing Attacks.

Reed, Chris; Angel, John (2007). Computer Law. The Law and Regulation of Information Technology. Sixth Edition. Oxford: Oxford University Press.

Romanian Information Technology Initiative; Romanian Government (2004), Ghid introductive pentruaplicareadispoziţiilorlegalereferitoare la criminalitateainformatică [An introductory guide to the application of legal provisions on cybercrime], Bucharest, Retrieved 25th of October 2017 from: http://www.riti-internews.ro/ro/ghid.htm.

Spiridon, IonuţCiprian (2008).Reflecţii cu privire la legislaţiaromânăîndomeniulcriminalităţiiinformatice, [Reflections on the Romanian legislation on cybercrime], in Law Review no. 8.

Savin, Andrej (2013). EU Internet Law. Cheltenham, Glos: Edward Elgar Publishing Limited.

Vasiu, Ioana; Vasiu, Lucian (2001). Totuldesprehackeri, [Everything about hackers], Bucharest: Nemira Publishing House.

Vasiu, Ioana; Vasiu, Lucian (2007). Informaticăjuridicăşidreptinformatic, [Legal informatics and IT law], Cluj-Napoca: Albastră Publishing House.

Vasiu, Ioana; Vasiu, Lucian (2011). Criminalitateaîncyberspațiu, [The criminality in cyberspace], Bucharest: UniversulJuridic Publishing House.

Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013 on attacks against information systemsand replacing Council Framework Decision 2005/222/JAI, Official Journal of the European Union, 14.08.2013, L218/8.

The European Council Convention on cybercrime.

Downloads

Published

2018-01-20

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.