Recently, with the development of informationa network through which corporations and public services forward important data to each other, it became necessary to implement measures to protect personal information. Another even more significant problem was money fraud in the network and other crimes in the field of computer information.
A couple of years ago there was an opinion that it is impossible to track fraudsters operating on the Internet. It is also impossible to protect the virtual purse from hacking and electronic signature from forgery.
But information technology does not stand still, and law enforcement agencies do not slumber.
It turned out that crimes in the field of computerinformation can be suppressed by following simple security measures (which, unfortunately, no one adheres to). If you are talking about a virtual wallet, you should follow the recommendations of the program's developers. If it's an e-mail - never open unknown links, notify the site administration about spam and do not enter your identity (login and password) on a familiar site whose address is not true (even if it differs from the real one by one letter only). Consumer rights realized through the network also need to be protected. The fact is that the Internet is full of low-quality goods and services. Beautiful slogans, spam messages and colorful banners attract customers in one way or another. Although you can find an unflattering feedback about the product on the same store sites, such foresight will save you from buying non-existent things (and if there are existing glasses, for example, with a video camera or pen with a built-in voice recorder, then definitely inaccessible to the public). As for copyrights, it is more difficult here. Protecting them on the network is almost impossible, but you can try. For example, store handwritten sketches. Send to a friend by e-mail your "manuscript" with such a text, from which it would be clear that this manuscript belongs to you. Even better, before you put something on the Internet, register your intellectual property in the manner prescribed in the copyright law.
Sometimes simple security measures are not enough,to protect themselves from crimes in the field of information technology. They are becoming more sophisticated and no longer look like an inoffensive joke in the form of a "death screen" or "trojan." These include actions that cause users significant harm: breaking passwords from a bank card, spreading slanderous information, distorting important information or deleting them. A good ground for scammers is creating online opportunities for playing in the stock market, auctions. Not to mention the dissemination of information containing pornographic materials and encouraging racial struggle, discrimination.
To protect Russian citizens from suchcriminal acts, the government had to introduce next amendments to the law. And today, among other known and qualified crimes, the Criminal Code contains the concept of "crimes in the field of computer information." Those found guilty are punished by the degree of damage inflicted - from a fine to imprisonment (up to 7 years). It is interesting, but was someone arrested for violating this article of the Criminal Code (28 chapters, articles: 272-274)?
Recently (in 1998) was createdSpecial department in the Ministry of Internal Affairs of Russia - Management "K". It employs IT specialists who not only register illegal activities, investigate crimes in the field of computer information, but also identify the perpetrators. As they succeed, it is better to keep this information secret, so that law enforcement agencies have the opportunity to be one step ahead of the intruders.
It is much more important to know the following. Every citizen can apply directly to the M Office of the Ministry of Interior directly or through the official website. There you can also download a very useful memo about elementary security rules concerning not only the Internet, but also the use of a phone, a bank card.
Disclosure of the crime in the field of computerinformation - the task is not easy: according to the results of the 2010 survey, hackers managed to appropriate $ 7 billion (worldwide). The study was conducted by experts of the largest companies specializing in security breaches in the network - Eset, Leta, Group-IB. Experts of the Office of "K" call to report on detected violations in the field of IT, otherwise intruders will go unpunished.