جريمة الاختراق الإلكتروني وطرق مواجهتها في القانون اليمني
Abstract
Despite the great benefits produced by technological progress in
the field of communications and information in all aspects of life,
this has been accompanied by the emergence of many crimes of a
technological nature that do not require any physical effort; Among
these crimes are the crimes of electronic hackers.
In this crime, the perpetrator illegally enters the computer system
and networks and performs unauthorized activities; Such as
modifying the application software, stealing confidential data,
destroying files, software, or the system, or just for illegal use.
This study aimed to clarify the nature of the crime of electronic
penetration and its elements, and how to confront them, and to
suggest appropriate methods and means to reduce these crimes of
extreme danger.
This research dealt with the definition of the crime of electronic
hackers and its pillars, and this research also dealt with how to
confront the preventive and punitive crime of electronic hackers.
The research reached a number of results and recommendations,
which we hope from God Almighty to achieve the desired goal.
the field of communications and information in all aspects of life,
this has been accompanied by the emergence of many crimes of a
technological nature that do not require any physical effort; Among
these crimes are the crimes of electronic hackers.
In this crime, the perpetrator illegally enters the computer system
and networks and performs unauthorized activities; Such as
modifying the application software, stealing confidential data,
destroying files, software, or the system, or just for illegal use.
This study aimed to clarify the nature of the crime of electronic
penetration and its elements, and how to confront them, and to
suggest appropriate methods and means to reduce these crimes of
extreme danger.
This research dealt with the definition of the crime of electronic
hackers and its pillars, and this research also dealt with how to
confront the preventive and punitive crime of electronic hackers.
The research reached a number of results and recommendations,
which we hope from God Almighty to achieve the desired goal.
Refbacks
- There are currently no refbacks.