Recently, with the development of an information network on which corporations and public services trafficked each other important data, it became necessary to introduce measures to protect personal information.Another even more significant problem became money online fraud and other crimes in the sphere of computer information.
a couple of years ago, it was thought that the track fraudsters operating in the Internet, it is impossible.Also, it is impossible to protect against hacking virtual wallet and the electronic signature from forgery.
But information technology is not standing still, and the police are on the alert.
turned out that crimes in the sphere of computer information, you can stop by following simple safety measures (which, unfortunately, no one adheres to).If it is a virtual wallet - should observe the development of the program.If an e-mail - never open unknown links, site administration report as spam and not enter their credentials (username and password) on a familiar site, the address of which is untrue (even if different from the real only by one letter).Consumer rights sold through the network, also need protection.The fact that the Internet is full of low-quality goods and services.Beautiful slogans spam messages and colorful banners somehow attract buyers.While on the same sites, shops can be found unflattering review on this product, such prudence will save you from buying non-existent things (and if there is, for example, glasses with a video camera or a pen with built-in voice recorder, the exact reach of the public).As for copyright - is more complicated.Protect them online is almost impossible, but you can try.For example, keep sketches, handwritten.Send to a friend motivated his "manuscript" with text from which it would be clear that this manuscript belongs to you.Even better, before you put something on the Internet, to register your intellectual property in the manner prescribed by the law of copyright.
Sometimes simple safety measures are not enough to protect yourself from computer crime.They are becoming more sophisticated and no longer sound like a harmless joke as a "screen of death" or "Trojan".These include acts that cause substantial harm to users: hack passwords on credit card, spread slanderous information, misrepresentation of important information or delete them.Good ground for fraudsters to create an online opportunity to play in the stock market and auctions.Not to mention the dissemination of information containing pornography and encourages racial fight discrimination.
to protect Russian citizens from such criminal acts, the government had to make further amendments to the law.And today, in addition to other well-known and qualified crimes in the Criminal Code contains the notion of "crimes in the sphere of computer information."Found guilty are punished according to the degree of damage - from fines to imprisonment (up to 7 years).Interestingly, and whether someone is arrested for a violation of this article of the Criminal Code (chapter 28, article: 272-274)?
More recently (in 1998) set up a special department in the Ministry of Internal Affairs of Russia - of the "K".It employs experts in the field of IT, are not only recorded illegal actions are investigating crimes in the sphere of computer information, and identify the perpetrators of them.How they do it, better to let this information will not be shared, so that law enforcement agencies had the opportunity to be one step ahead.
much more important to know the following.Every citizen can apply to the Department "K" Interior Ministry directly or through the official website.There you can download a very useful reminder about the basic safety rules concerning not only the Internet but also use your phone, a bank card.
solving crimes in the sphere of computer information - not an easy task: the results of the study in 2010 hackers managed to assign the $ 7 billion (around the world).A study carried out by experts of the largest companies specializing in security breaches in the network - Eset, Leta, Group-IB.Experts of the "K" call to report violations detected the IT, otherwise attackers go unpunished.