Theory of Social Security Assessment

Hosna Mohebbi1 MohammadJavadShahsavari2 Omid Nateghi3 Sima Houshmand4

1) Student of Software Engineering_Department of Computer Engineering_Iran, Kermanshah, Iran
2) Student of Electrical Engineering- Department of Electrical and Computer Engineering_Iran, Kermanshah, Iran
3) Student of Mathematics, Department of Basic Sciences, Iran, Kermanshah, Razi University
4) Student of Computer Engineering, Department of Basic Sciences, Iran, Kermanshah, Razi University

Publication : 3.rd International Congress of Science, Engineering and Technology - Hamburg(germanconf.com)
Abstract :
Some of the different types of cybercrime include: Internet fraud, abuse of phone lines, abuse of credit cards, hack into other computers, money laundering, cybercrime, cybercrime In this article, we will first look at the history of cybercrime, and then explain the concept and nature of cybercrime, the different types of cybercrime, and the strengths of existing laws. Finally, considering the sources of studies and rational analysis of existing laws in the country to provide appropriate solutions to prevent cybercrime We ll pay. In addition, the consequences of criminal behavior due to the absence of geographical restrictions or national boundaries in the permissible world are far greater than previously thought. The use of modern information technologies also has current legal implications in society It has created challenges. Adoption of the Convention on Cybercrime, adoption of anti-crime laws by lawmakers and the establishment of anti-crime units in most advanced and domestic police agencies and equipping them with the latest hardware and software to detect such crimes and employ the best experts. These units form part of these countermeasures.
Keywords : Theory of Security