Page 28 - ISCI’2017
P. 28
2. Data leakage is a possibility for the collecting of any kind of information (for example,
medical data or records), which is needed for receiving of main data about some technologies, which
are using in the system (Linde, 1975).
3. Scavenging is a data search, which was used by some users after their working on a
computer. It is dividing on the physical and electronic searching.
4. Pigg-backing is a method, which characterizes unauthorized penetration into space and
electronic close zones (places, hospital’s network or database, etc.).
5. “Between the lines entry” is a method based on an illegal connection to the communication
link (or line) of a system user or computer network. The connection is done in the time moment when
the user has finished its communication session, but he hadn’t had enough time to disconnect from
the network yet.
6. Browsing is a method of an unauthorized access to a database or some files of legal users,
is realized based on finding some weaknesses in the protection system or computer network. If an
offender were able to find at least one weakness, then he/she would be able to use this weakness each
time for further reading and analyzing of any information into system. Hi/she can also copy and use
this information for his/her personal purposes.
7. A trapdoor entry is a method of an unauthorized access that happens during a detection of
some errors or mistakes in the logical structure of a code. These detected errors or mistakes can be
used repeatedly.
8. A trapdoor is some development of the previous method, which differs in that some special
control commands are included in the detected place of a code for their further use for their own
purposes. It is also known as “the code backing”.
9. Masquerading is a method when the offender is penetrating into a computer system with
the use of necessary means to pretend to be a legal user.
10. Spoofing or mystification is a method used at a random connection of an unfamiliar
computer system to the system of a victim. The offender is forming some “credible” requests from
the victim’s system. After that, this offender can support a delusion from that user (victim) during
some period of time and receive information (confidential, secret, personal, medical, etc.), which will
be useful for this offender.
We, similar to other specialists and professionals in this area (e.g., United Nations Crime and
Justice Information Network; Centre for International Crime Prevention, 2000), think that this
classification has a significant flaw. The point is that this classification may lead to a chaotic (from a
point of criminalistics) mixing of criminal and law principles, and the technical features of automated
data processing.
28