Clases

Páginas: 7 (1670 palabras) Publicado: 29 de enero de 2012
En Perú:
http://www.monografias.com/trabajos65/delitos-informaticos-peru/delitos-informaticos-peru4.shtml#xcaso
http://translate.google.com.pe/translate?hl=es&langpair=en%7Ces&u=http://www.ibls.com/internet_law_news_portal_view.aspx%3Fs%3Dlatestnews%26id%3D2169

LEGISLACIÓN SOBRE DELITOS INFORMATICOS
LEY DE DELITOS INFORMATICOS

Artículo único.- Incorporase al Código Penal,promulgado por Decreto Legislativo N° 635, el Capítulo XI, Delitos Informáticos, los artículos 208a y 208b; con los siguientes textos:
Artículo 208 a.- El que indebidamente utilice o ingrese a una base de datos, sistema o red de computadoras o a cualquier parte de la misma, con el propósito de diseñar, ejecutar o alterar un esquema o artificio con el fin de defraudar, obtener dinero, bienes oinformación será reprimido con pena privativa de la libertad no mayor de dos años, o con prestación de servicios comunitario de cincuenta y dos a ciento cuatro jornadas.
Artículo 209 b.- El que indebidamente, interfiera, reciba, utilice, altere, dañe o destruya un soporte o programa de computadora o los datos contenidos en la misma, en la base, sistema o red será reprimido con pena privativa de la libertadno mayor de dos años.
Lima, 18 de agosto de 1999
JORGE MUÑIZ ZICHES

"a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself." Today a computer virus is a software program, script, or macro that has been designed to infect, destroy, modify, or cause other problems with a computer or software programs. Userscan protect themselves and remove any viruses on the computer by installing an antivirus protection program, which is designed to detect, protect, and clean any computer viruses.
How computer viruses are contracted
In the past the majority of computer viruses were contracted from users sharing data using floppy diskettes. However, with the increased popularity of the Internet most computerviruses are contracted today through e-mail and by downloading software over the Internet or P2P sharing.
Virus properties
Below is a listing of some of the different properties a computer virus is capable of having and what the particular property is capable of doing. Keep in mind that not all viruses will have every one of these abilities.
Your computer can be infected even if files are justcopied. Because some viruses are memory resident, as soon as a diskette or program is loaded into memory, the virus then attaches itself into memory and then is capable of infecting any file on the computer you have access to.
Can be Polymorphic. Some viruses have the capability of modifying their code, which means one virus could have various amounts of similar variants. This is also true with e-mailviruses that change the subject or body of the message to help from being detected.
Can be memory or non-memory resident. As mentioned earlier a virus is capable of being either memory resident where the virus first loads into memory and then infects a computer or non-memory resident where the virus code is only executed each time a file is opened.
Can be a stealth virus. Stealth viruses willfirst attach itself to files on the computer and then attack the computer; this causes the virus to spread more rapidly.
Viruses can carry other viruses. Because viruses are only software programs a virus may also carry other viruses making the virus more lethal and help the primary virus hide or assist the primary virus with infecting a particular section of the computer.
Can make the systemnever show outward signs. Some viruses can hide changes made, such as when a file was last modified making the virus more difficult to detect.
Can stay on the computer even if the computer is formatted. Some Viruses have the capability of infecting different portions of the computer such as the CMOS battery or master boot record. Finally, if a computer is completely erased and the virus is on a...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Clases
  • Clase
  • Clase
  • CLASES
  • Clase
  • clases
  • clases
  • clases

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS