sábado, 28 de julio de 2018

Deliberate act of extortion / informational blackmail

Deliberate act of extortion / informational blackmail.

➤ hacker or trusted insider steals information and demands compensation for its return.

It is not the potential threat of the computer over the individual that causes sleeplessness, but the
real use by man of information systems for espionage purposes; they are not
large information systems that affect private life, but manipulation or
Consent of this on the part of unconscious and irresponsible individuals of the data that
such systems contain.

Humanity is not facing danger of information technology, but in the face of the real possibility that
individuals or groups without scruples, with aspirations to obtain the power that information can confer them, use it to satisfy their own interests, at the expense of individual liberties iduals and to the detriment of people. In addition, the future threat will be directly proportional to the
advances in computer technologies.

The protection of computer systems can be addressed both from a criminal perspective and
of a p erspective civil or commercial perspective, and even administrative law. These different measures of protection do not have to be mutually exclusive, but, on the contrary, they must be
be closely linked. Therefore, given the characteristics of this problem, only to through global protection, from the different sectors of the legal system, it is possible achieve some effectiveness in defending attacks on computer systems.


Resultado de imagen para 2. Acto deliberado de extorsión / chantaje informático

➤ Theft of data files containg customer credit car information 



What is identity theft?
Identity theft is a serious and potentially very destructive crime. Identity theft is about someone who commits or attempts to commit fraud with the victim's personal information, for example, date of birth, social security number, driver's license number, etc. The thief could use this information to obtain new credit cards and other accounts on behalf of the victim.


How thieves steal identity.

Thieves have a variety of methods to obtain someone's identity, which include:

  •  Theft: traditional ways of obtaining information, for example by stealing wallets, purses and mail (such as bank account statements or credit cards), previously approved credit offers, orders for new checks or tax information.
  •     Change of address: they carry out the deviation of the invoice summaries to another location, for which they complete a change of address form or convince the companies that serve the victim to change the address in an account.
  •     They look for garbage cans: they look for documents that contain personal or confidential information in the garbage.
  •     Electronic scam or Smishing: a technique in which an expert scammer sends an email or text message that seems from a legitimate source to convince the victim to provide personal or financial information (for example: credit card number).
  •     Computer hacking: obtaining illegal access to email accounts or other Internet accounts of a person.
  •     Forgery: stealing information from a credit card.

Resultado de imagen para Deliberado acto de extorsión informatica gif


https://www.greghillassociates.com/what-is-extortion-or-blackmail-the-defenses-punishment.html





No hay comentarios:

Publicar un comentario