Cyber attacks and their criminal implications
Autor(a) principal: | |
---|---|
Data de Publicação: | 2024 |
Outros Autores: | |
Tipo de documento: | Artigo |
Idioma: | por |
Título da fonte: | Revista JRG de Estudos Acadêmicos |
Texto Completo: | http://revistajrg.com/index.php/jrg/article/view/988 |
Resumo: | This article aims to contribute to the understanding of cybercrimes. To achieve this goal, we sought to develop a timeline with the main legislations addressing the subject in the national legal system. Some of the main hacker attacks listed by Microsoft™ were addressed, including Malware, DDoS, phishing, SQL injection, botnets, and ransomware attacks. Next, virtual crimes defined in Brazilian legislation were presented, such as invasion of computer devices, interruption or disturbance of computer/telematic services, digital fraud, electronic fraud theft, insertion of false data into information systems, unauthorized modification or alteration of information systems, and credit card cloning/fraud. Additionally, some improper crimes were discussed. Following recent jurisprudential understandings, the crime of virtual rape of a vulnerable person was discussed, as well as the analysis of cyberbullying and the offenses resulting from its practice. Considering that the daily use of technologies requires caution in the face of potential risks and vulnerabilities, it is believed that this article can serve as a guiding instrument for further exploration of the proposed theme, emphasizing the importance of understanding cyber attacks and their legal implications, as well as highlighting the relevance of awareness and adoption of cybersecurity measures to mitigate the risks associated with the use of technologies. |
id |
JRG_16621066e44b8288ee561584de00abd2 |
---|---|
oai_identifier_str |
oai:ojs2.revistajrg.com:article/988 |
network_acronym_str |
JRG |
network_name_str |
Revista JRG de Estudos Acadêmicos |
repository_id_str |
|
spelling |
Cyber attacks and their criminal implicationsOs ataques cibernéticos e suas implicações penaisCrimes virtuaisAtaques cibernéticosDireito penalVulnerabilidadesTecnologia da informaçãoVirtual crimesCyber attacksCriminal lawVulnerabilitiesInformation technologyThis article aims to contribute to the understanding of cybercrimes. To achieve this goal, we sought to develop a timeline with the main legislations addressing the subject in the national legal system. Some of the main hacker attacks listed by Microsoft™ were addressed, including Malware, DDoS, phishing, SQL injection, botnets, and ransomware attacks. Next, virtual crimes defined in Brazilian legislation were presented, such as invasion of computer devices, interruption or disturbance of computer/telematic services, digital fraud, electronic fraud theft, insertion of false data into information systems, unauthorized modification or alteration of information systems, and credit card cloning/fraud. Additionally, some improper crimes were discussed. Following recent jurisprudential understandings, the crime of virtual rape of a vulnerable person was discussed, as well as the analysis of cyberbullying and the offenses resulting from its practice. Considering that the daily use of technologies requires caution in the face of potential risks and vulnerabilities, it is believed that this article can serve as a guiding instrument for further exploration of the proposed theme, emphasizing the importance of understanding cyber attacks and their legal implications, as well as highlighting the relevance of awareness and adoption of cybersecurity measures to mitigate the risks associated with the use of technologies.Este artigo visa contribuir para a compreensão dos crimes cibernéticos. Para alcançar tal objetivo, buscou-se elaborar uma linha do tempo com as principais legislações que abordam o conteúdo no ordenamento jurídico pátrio. Discutiu-se alguns dos principais ataques hackers elencados pelo site da Microsoft™, entre eles o do tipo Malware, o DDoS, o phishing, o tipo SQL injection, o botnets e o ataque ransomware. Em seguida, foram apresentados os crimes virtuais próprios, conforme descritos na legislação brasileira, tais como invasão de dispositivo informático, interrupção ou perturbação de serviço informático/telemático, estelionato digital, furto mediante fraude eletrônica, inserção de dados falsos em sistema de informações, modificação ou alteração não autorizada de sistema de informações, e clonagem/falsificação de cartão de crédito e débito. Adicionalmente, foram abordados alguns crimes impróprios. Seguindo entendimentos jurisprudenciais recentes, discutiu-se o crime de estupro por meio virtual de vulnerável, além de analisar a prática do ciberbullying e os delitos decorrentes de sua prática. Considerando que o uso cotidiano das tecnologias requer prudência diante dos potenciais riscos e vulnerabilidades, acredita-se que este artigo possa servir como um instrumento norteador para um aprofundamento na temática proposta, ressaltando a importância de compreender os ataques cibernéticos e suas implicações legais, bem como destacando a relevância da conscientização e adoção de medidas de segurança cibernética para mitigar os riscos associados ao uso das tecnologias.Editora JRG2024-03-27info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArtigo avaliado pelos Paresapplication/pdfhttp://revistajrg.com/index.php/jrg/article/view/98810.55892/jrg.v7i14.988ark:/57118/JRG.v7i14.988JRG Journal of Academic Studies; Vol. 7 No. 14 (2024): JRG Journal of Academic Studies; e14988JRG Journal of Academic Studies ; Vol. 7 Núm. 14 (2024): Revista JRG de Estudos Acadêmicos; e14988JRG Journal of Academic Studies; V. 7 N. 14 (2024): Revista JRG de Estudos Acadêmicos; e14988Revista JRG de Estudos Acadêmicos ; v. 7 n. 14 (2024): Revista JRG de Estudos Acadêmicos; e149882595-1661ark:/57118/jrg.v7i14reponame:Revista JRG de Estudos Acadêmicosinstname:Editora JRGinstacron:JRGporhttp://revistajrg.com/index.php/jrg/article/view/988/862https://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessMarinho, Marlon GlauberTeles, Danilo Ribeiro de Sá2024-03-27T21:37:12Zoai:ojs2.revistajrg.com:article/988Revistahttp://revistajrg.com/index.php/jrgPRIhttp://revistajrg.com/index.php/jrg/oaiprofessorjonas@gmail.com||2595-16612595-1661opendoar:2024-03-27T21:37:12Revista JRG de Estudos Acadêmicos - Editora JRGfalse |
dc.title.none.fl_str_mv |
Cyber attacks and their criminal implications Os ataques cibernéticos e suas implicações penais |
title |
Cyber attacks and their criminal implications |
spellingShingle |
Cyber attacks and their criminal implications Marinho, Marlon Glauber Crimes virtuais Ataques cibernéticos Direito penal Vulnerabilidades Tecnologia da informação Virtual crimes Cyber attacks Criminal law Vulnerabilities Information technology |
title_short |
Cyber attacks and their criminal implications |
title_full |
Cyber attacks and their criminal implications |
title_fullStr |
Cyber attacks and their criminal implications |
title_full_unstemmed |
Cyber attacks and their criminal implications |
title_sort |
Cyber attacks and their criminal implications |
author |
Marinho, Marlon Glauber |
author_facet |
Marinho, Marlon Glauber Teles, Danilo Ribeiro de Sá |
author_role |
author |
author2 |
Teles, Danilo Ribeiro de Sá |
author2_role |
author |
dc.contributor.author.fl_str_mv |
Marinho, Marlon Glauber Teles, Danilo Ribeiro de Sá |
dc.subject.por.fl_str_mv |
Crimes virtuais Ataques cibernéticos Direito penal Vulnerabilidades Tecnologia da informação Virtual crimes Cyber attacks Criminal law Vulnerabilities Information technology |
topic |
Crimes virtuais Ataques cibernéticos Direito penal Vulnerabilidades Tecnologia da informação Virtual crimes Cyber attacks Criminal law Vulnerabilities Information technology |
description |
This article aims to contribute to the understanding of cybercrimes. To achieve this goal, we sought to develop a timeline with the main legislations addressing the subject in the national legal system. Some of the main hacker attacks listed by Microsoft™ were addressed, including Malware, DDoS, phishing, SQL injection, botnets, and ransomware attacks. Next, virtual crimes defined in Brazilian legislation were presented, such as invasion of computer devices, interruption or disturbance of computer/telematic services, digital fraud, electronic fraud theft, insertion of false data into information systems, unauthorized modification or alteration of information systems, and credit card cloning/fraud. Additionally, some improper crimes were discussed. Following recent jurisprudential understandings, the crime of virtual rape of a vulnerable person was discussed, as well as the analysis of cyberbullying and the offenses resulting from its practice. Considering that the daily use of technologies requires caution in the face of potential risks and vulnerabilities, it is believed that this article can serve as a guiding instrument for further exploration of the proposed theme, emphasizing the importance of understanding cyber attacks and their legal implications, as well as highlighting the relevance of awareness and adoption of cybersecurity measures to mitigate the risks associated with the use of technologies. |
publishDate |
2024 |
dc.date.none.fl_str_mv |
2024-03-27 |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Artigo avaliado pelos Pares |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://revistajrg.com/index.php/jrg/article/view/988 10.55892/jrg.v7i14.988 ark:/57118/JRG.v7i14.988 |
url |
http://revistajrg.com/index.php/jrg/article/view/988 |
identifier_str_mv |
10.55892/jrg.v7i14.988 ark:/57118/JRG.v7i14.988 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.relation.none.fl_str_mv |
http://revistajrg.com/index.php/jrg/article/view/988/862 |
dc.rights.driver.fl_str_mv |
https://creativecommons.org/licenses/by/4.0 info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Editora JRG |
publisher.none.fl_str_mv |
Editora JRG |
dc.source.none.fl_str_mv |
JRG Journal of Academic Studies; Vol. 7 No. 14 (2024): JRG Journal of Academic Studies; e14988 JRG Journal of Academic Studies ; Vol. 7 Núm. 14 (2024): Revista JRG de Estudos Acadêmicos; e14988 JRG Journal of Academic Studies; V. 7 N. 14 (2024): Revista JRG de Estudos Acadêmicos; e14988 Revista JRG de Estudos Acadêmicos ; v. 7 n. 14 (2024): Revista JRG de Estudos Acadêmicos; e14988 2595-1661 ark:/57118/jrg.v7i14 reponame:Revista JRG de Estudos Acadêmicos instname:Editora JRG instacron:JRG |
instname_str |
Editora JRG |
instacron_str |
JRG |
institution |
JRG |
reponame_str |
Revista JRG de Estudos Acadêmicos |
collection |
Revista JRG de Estudos Acadêmicos |
repository.name.fl_str_mv |
Revista JRG de Estudos Acadêmicos - Editora JRG |
repository.mail.fl_str_mv |
professorjonas@gmail.com|| |
_version_ |
1797068983329882112 |