Electronic theft and reduce its impact on the bank's security

سال انتشار: 1394
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 313

متن کامل این مقاله منتشر نشده است و فقط به صورت چکیده یا چکیده مبسوط در پایگاه موجود می باشد.
توضیح: معمولا کلیه مقالاتی که کمتر از ۵ صفحه باشند در پایگاه سیویلیکا اصل مقاله (فول تکست) محسوب نمی شوند و فقط کاربران عضو بدون کسر اعتبار می توانند فایل آنها را دریافت نمایند.

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_UJSSHR-3-3_011

تاریخ نمایه سازی: 4 خرداد 1395

چکیده مقاله:

Information technology affected all aspects of social, economic, cultural and deeply, including criminal law. Any change in today's world because of the complexity of human activities will have consequences. There is always the possibility of abusing in such a way of invention of new tools, as well as correct and legitimate use.Cyberspace, the result of scientific and industrial progress in recent centuries is not an exception to the positive and negative effects on human life and the most important works was the emergence of cybercrimes. Computer crime of unauthorized use of computer technology to seize sensitive personal data and confidential information also applies to organizations. Advances in computer technology made it possible to create a new crime to forge compared to traditional methods, are much more technical.Although most electronic thieves are doing it to show off, but the theft is done for the purpose of access to information of the banks, has created a major problem. The purpose of this study was to investigate the electronic theft and its impact on the bank's security. In this study, using documents and legal opinions and legal analysis of the data obtained will be discussed. It is optimized for the opinions of respected professors were used.As we know, in the traditional banking as well as those with some threats faced these threats on electronic systems for others. To provide and enhance the security of electronic banking and the banks should reduce threats, while respecting security policies, including privacy, authenticity, integrity and ... Of security tools such as encryption, user code and password, digital certificates, digital signatures, software and security protocols to be used.

کلیدواژه ها:

نویسندگان

Abolfazl Azizi

Department of Law, Electronic Branch, Islamic Azad University, Tehran, Iran

Alireza Milanei

Department of Law, Electronic Branch, Islamic Azad University, Tehran, Iran