Hacking and computer crimes computer fraud - A comparative look at the new criminal code and the criminal code of the Republic of Moldova

AuthorAlin Teodorus Dragan
PositionFaculty of Juridical Sciences, 'Vasile Goldis' Western University of Arad
Pages29-34
AGORA International Journal of Juridical Sciences, www.juridicalj ournal.univagora.ro
ISSN 1843-570X, E-ISSN 2067-7677
No. 1 (2014), pp. 29-34
29
HACKING AND COMPUTER CRIMES
COMPUTER FRAUD – A COMPARATIVE LOOK
AT THE NEW CRIMINAL CODE AND THE CRIMINAL CODE OF
THE REPUBLIC OF MOLDOVA
A. T. Drgan
Alin Teodorus Drgan
Faculty of Juridical Sciences
“Vasile Goldi” Western University of Arad
E-mail: alinteodorus@yahoo.co.uk
Abstract
Hacking involves the attempt to compromise the security of a computer system in
order to gain unauthorized access. In the course of time it has turned out that the Internet is a
vulnerable system, and this has generated a framework for criminal activities, resulting in the
emergence of new crimes, among which computer fraud.
Keywords: computer system hacking, computer fraud
Introduction:
Cyber criminals elude the physical limitations that govern real-world crimes. The
classic police model based on the principle that law enforcement bodies must react effectively
and promptly to a crime, is less efficient against online crimes, because, in these cases, the
police response usually begins long after the cyber crime was successfully carried out.
Hacking
Hacking is a complex task that requires a high level of technical knowledge. Usually
it does not pay for a hacker to make the effort of penetrating a private home computer. Real
hacking is typically done on computers that are likely to include the personal data of a lot of
people, such as those of banks, databases of corporations, hospitals, schools, etc.
The term “hacking” is used very frequently, in fact, it is overused. Many individuals
call themselves hackers even if they are not. In the world of hacking, the word “hacker” only
refers to those who try to find vulnerabilities in different systems for research purposes.
“Cracker” is the person trying to exploit the vulnerable parts of a system for malicious
purposes. However, for the general public, as well as for most officials, the distinction has
been lost
1
.
Many in the hacking community object to the use of the term “hacker” in the media
in order to denote illegal computer intrusions. In the hacking community a hacker is the one
doing experiments on an information system in order to learn more about it.
Hackers are classified in a variety of groups, of which we will mention only a few.
The white hat hacker does not carry on illegal activities, he only learns about various
information systems and seeks their vulnerabilities in order to subsequently provide security
programs that protect the systems from illegal penetration.
The black hat hacker carries on illegal activities; these are the people who are usually
associated with computer crimes. This term is s ynonymous with the word “cracker”. Usually
when the media talk about hacking, the reference is actually to black hat hackers.
1
Chuck Easttom and Det. Jeff Taylor, Computer Crime, Investigation and the Law, Course
Technology, a part of Cengage Learning PTR, Boston, 2011, p. 10

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT