Page 42

A. Data collection or access codes: key numbers also includes credit card or debit card to certain services and misuse of them: A. Spyware removal of passwords without the knowledge of the victim. B. Phishing: is the victim who unwittingly conveys the data to the person who disappoints for a transfer. B. Dialers: fraudulent telephone connections. C. Fraud e-mail operations. D. Fraudulent emails. B. Distribution of child pornography over the Internet: In this crime is taken into account: a) distribution, b) pre-offense behavior, c) preparation of the crime. C. Computer sabotage that can threaten the freedom and dignity: A. Dissemination of computer viruses. B. Deletion of data. C. Alteration of data. D. Blocking data. E. Data destruction. D. Crimes against privacy on the Internet: A. Seizure of documents in email attachments. B. Interception of communications network. C. Injury free computer espionage by individuals. D. Disclosure to other people discovered data. E. Industrial espionage: disclosure of business secrets obtained through the Internet. F. Phreaking: enter illegally in telecommunication systems in order to obtain benefits or harm to others. G. Cyber - stalking: Pursuit of the victim show a mastery of it through acts that indicate their accessibility and control by the pursuer at any time, anywhere, limited only by his will. H. Cyber - bulying: Any form of psychological abuse, physical or verbal abuse between children who go to school repeatedly and over a certain time. (Http:// (Uploaded: superxalvarox2) I. Happy slapping: This is a type of cyber bullying is a behavior that is the recording for later broadcast via mobile phones, content platforms and social networks images or videos of attacks and abuse. (Http://

The Universal Declaration of the Human Rights  

A presentation by Rubén Fernández Vela, during the REactor conference.

Read more
Read more
Similar to
Popular now
Just for you