the staff

Huda M.Salih
10/04/2016255 View
Nada M.Hindi
10/04/2016240 View
Maha F.Mohammed
10/04/2016284 View
Dr.emad M.Jassim
10/04/2016362 View
Dr.Shaker A. Fadel
10/04/2016267 View
HussamEldeen
10/04/2016266 View
Adnan D.Abid
29/03/2016263 View
Allaadeen M.Hamdan
29/03/2016246 View
Abd Albasit A.Abdalraheem
29/03/2016269 View
Safaa H.Nssaif
29/03/2016243 View
Rafal R.Gazy
10/04/2016370 View
Dr.Talal H.Kalil
29/03/2016245 View
Fadia M.Esmail
29/03/2016264 View
Dr.Jalal A.Kalaf
29/03/2016264 View
Dr.Ahmed F.Hussain
10/04/2016275 View
Dr.Qaid H.Dahash
21/06/2016247 View
Dr.Baker.A.Ali
10/04/2016272 View
Dr.Balasim A.Abdolla
29/03/2016263 View
Montaser A.Kareem
10/04/2016251 View
Dr.Kalifa A.Aouda
10/04/2016321 View

scientific outputs

The Use of Technology Tools in the Fight against the Information Forgery Crime

   
255 View   |   0 Rating
Updated   21/06/2016 10:25 AM

 

World Journal of Applied and Life Sciences

The Use of Technology Tools in the Fight against the Information Forgery Crime

Dr. Moshtaq Talib Wahaib

(College of Law and Political sciences - University of Diyala)

Moshtaqalnaeimey@yahoo.com

Dr. Hab. Prof. US Pasquale Policastro

Faculty of Law and Administration / University of Szczecin

Pasquale.Policastro@mac.com

Abstract

A law is not enough lonely for protecting an information, and regulatory strategies are insufficient as well. Technical means aren’t lonely enough in preventing risks threating information whatever their effectiveness is. Thus, the protection is a compound consists of the law, regulation strategy and technology.

Although the technical environment is the place (object) where criminals commit their anti-social activities or the tool to carry out this crime, it can at the same time create the methods reducing occurrence of forgery or at least put obstacles which make accomplishment of that crime a hard work. It is a first line of defense in the confrontation strategy of the information forgery crime. Namely, it is a weapon is used in the protective stages of preventing the crime perpetration.

This matter requires looking for means are uncomplicated which contribute in creating a safe environment regulated in the light of laws providing a kind of the protection to the information circulated within the technology society through taking advantage of the cyber environment itself.

So, we find a lot of institutions and individuals, these they give the security measures and protection a great mount of significance, use the technical mechanisms and programs produced by the specialized companies in enhancing this aspect of the problem. This represents in adopting a firewall and encryption technology which are techniques used in protection of the data and information stored and transmitted in the cyber space.   

 




College of Law and Political Sciences University of Diyala
3:45