Page 28 - ISCI’2017
P. 28

2. Data leakage is a possibility for the collecting of any kind of information (for example,

            medical data or records), which is needed for receiving of main data about some technologies, which
            are using in the system (Linde, 1975).

                   3.  Scavenging  is a data search, which was used by  some users after their working on a
            computer. It is dividing on the physical and electronic searching.

                   4. Pigg-backing is a method, which characterizes unauthorized penetration into space and
            electronic close zones (places, hospital’s network or database, etc.).

                   5. “Between the lines entry” is a method based on an illegal connection to the communication

            link (or line) of a system user or computer network. The connection is done in the time moment when
            the user has finished its communication session, but he hadn’t had enough time to disconnect from

            the network yet.
                   6. Browsing is a method of an unauthorized access to a database or some files of legal users,

            is realized based on finding some weaknesses in the protection system or computer network. If an
            offender were able to find at least one weakness, then he/she would be able to use this weakness each

            time for further reading and analyzing of any information into system. Hi/she can also copy and use

            this information for his/her personal purposes.
                   7. A trapdoor entry is a method of an unauthorized access that happens during a detection of

            some errors or mistakes in the logical structure of a code. These detected errors or mistakes can be

            used repeatedly.
                   8. A trapdoor is some development of the previous method, which differs in that some special

            control commands are included in the detected place of a code for their further use for their own
            purposes. It is also known as “the code backing”.

                   9. Masquerading is a method when the offender is penetrating into a computer system with
            the use of necessary means to pretend to be a legal user.

                   10. Spoofing or mystification  is a  method used at a random connection of an unfamiliar

            computer system to the system of a victim. The offender is forming some “credible” requests from
            the victim’s system. After that, this offender can support a delusion from that user (victim) during

            some period of time and receive information (confidential, secret, personal, medical, etc.), which will
            be useful for this offender.

                   We, similar to other specialists and professionals in this area (e.g., United Nations Crime and
            Justice Information Network; Centre  for International Crime Prevention, 2000), think that this

            classification has a significant flaw. The point is that this classification may lead to a chaotic (from a

            point of criminalistics) mixing of criminal and law principles, and the technical features of automated
            data processing.


            28
   23   24   25   26   27   28   29   30   31   32   33