METHODS OF OPERATION RELATED TO THE OFFENSE OF UNAUTHORIZED ACCESS TO A COMPUTER SYSTEM Cover Image
  • Price 4.50 €

METHODS OF OPERATION RELATED TO THE OFFENSE OF UNAUTHORIZED ACCESS TO A COMPUTER SYSTEM
METHODS OF OPERATION RELATED TO THE OFFENSE OF UNAUTHORIZED ACCESS TO A COMPUTER SYSTEM

Author(s): Andrei-Cristian Barbu, Cristina Pielmuş
Subject(s): Law, Constitution, Jurisprudence, Criminal Law, Civil Law, ICT Information and Communications Technologies
Published by: Universul Juridic
Keywords: unauthorized access; computer system; methods of operation; password; IP; TCP attacks;

Summary/Abstract: This study presents some methods of operation related to the offense consisting in the unauthorized access to a computer system, which is stipulated in article 360 of New Romanian Criminal Code (Law no. 286/2009). Since the material element of the offense is represented by the unauthorized access to a computer system, there are several methods to achieve this access that can be analyzed, such as password attack, trusted access attack, exploitation of technological weaknesses, shared library attack, IP attack or TCP hijacking attack.

  • Issue Year: 2014
  • Issue No: 01
  • Page Range: 17-23
  • Page Count: 7
  • Language: English