Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Libro PDF
Libro PDF
DELITOS
INFORMATICOS
Preparado
Presentacin
El Instituto Nacional de Estadstica e Informtica (INEI), rgano rector de los
Sistemas Nacionales de Estadstica e Informtica, pone a disposicin de las Instituciones
pblicas y privadas, el documento DELITOS INFORMATICOS, en el marco de la
coleccin Seguridad de Informacin.
La presente publicacin registra en ocho captulos, la evolucin histrica de los delitos
Presenta adems, los usos de las nuevas tecnologas, riesgos y oportunidades, que
surgen del comercio electrnico, como: delitos en Internet, responsabilidad del proveedor,
medios de prevencin y control en Internet y los conflictos jurisdiccionales.
En relacin a los Delitos Informticos, se precisan los conceptos de fraude y delito, se
estudia la diversa terminologa asociada al delitos informtico, se presenta las peculiaridades de
la criminalidad informtica. Tambin describe al tipo de delincuente informtico y los tipos de
delitos reconocidos por las Naciones Unidas, as como la estrategia internacional de represin.
Es importante destacar el estudio del impacto econmico y social de los delitos
informticos, las acciones de prevencin, as como las polticas y medidas de seguridad de
informacin, que incluyen las acciones antes y despus de una intromisin y la auditora de
Finalmente, a nombre del Instituto Nacional de Estadstica e Informtica, expreso mi
agradecimiento y reconocimiento a las entidades pblicas e investigadores nacionales, que
proporcionaron material y experiencias, para la presente publicacin.
Lima, Mayo del 2001
INDICE
Introduccin
1. HISTORIA DE LOS DELITOS INFORMATICOS . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1 Casos Identificados ................................................................................. 7
1.2 Casos Annimos Sonados de Crimen por Computadora ....................... 12
. Resumen de los actos de Cibervandalismo ms conocidos
en el ciberespacio .............................................................................. 16
2. EL USO DE LAS NUEVAS TECNOLOGAS, RIESGOS Y
OPORTUNIDADES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.1
2.2
2.3
2.4
2.5
2.6
3. DELITOS INFORMATICOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.1 Concepto de Fraude y Delito ................................................................ 28
3.2 Definicin de Delito Informtico ........................................................... 29
3.3 Terminologa sobre Delitos ................................................................... 33
3.4 Clasificacin de los Delitos Informticos ............................................... 33
3.5 Peculiaridades de la Criminalidad Informtica ...................................... 36
3.6 Tipos de Delincuente Informtico: Sujetos Activos Pasivos ..................... 37
3.7 Categora de Ataques ........................................................................... 38
3.8 Tipos de Delitos Informticos reconocidos por las Naciones Unidas...... 41
3.9 Fraude Informtico.............................................................................. 43
3.10 Comportamiento Delictivo Informtico................................................. 44
3.11 Delitos Informticos Tipificados en el Cdigo Penal Peruano ............. 45
3.12 Tratamiento Internacional................................................................... 50
3.12.1 Organismos Internacionales ................................................... 50
3.12.2 Legislacin en otros Pases ..................................................... 53
3.13 Estadsticas sobre los Delitos Informticos ........................................... 68
4. LOS DELITOS INFORMATICOS Y EL IMPACTO EN LA
SOCIEDAD Y ECONOMIA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.1
4.2
4.3
4.4
4.5
Delitos Informticos
!
!"
#$%& '()(*" $%+%!
" #$$ %
$$ &!$
#(
, -! . ( ! /
0) ) - !&121)
&34&53&#-#-6)#-7%!
'()*$+,*$ $$, ),
4, 8,
0
9 )
'
( *(
:' ;!&
)
0
! (
'" 3&43&<=!3&43&> &)
4 3?
)
9" ' ( ! @ *
* * (
'
*) 3&43&!
8 )
/ @! /' *
Delitos Informticos
@8, C D*4,(('
"1(.1)*'
6(
)*"* !B
(
(A ' *
0 1B $( % 1 4, E6
9"
9"
9 C ) C *"
*
' '!
&
6 9 C ) ' (
*" 9" 4)&4) !B
4,C(FGG---!,* ,! G ! ')
9 0 *! /
*
'* 1,(1 ) ' (*
7
6!
$
A ,
2' *
*
' C C
0C(17-H,% 1'*
"! / .
D* 4,
"I=J , C() !
! %-
0
J4) E9
1K1(''
= <C( =& ! %L# )
" !
/
0
" ) ) *
!/J4)M
9 ,(
1 K1 '
(' 9"
() )"
' ( *
( 9"')
' "*) (
!17
= "
$ )*
1/2'4)!1/*
)*1!B=
, ' )1! (
4) @&N
)O9
!
Delitos Informticos
:
; )
,(*F @2
* 9
= >(
*('$%%? ) '//!@@!
. - >2 ' ? )
' 1&--,1
( I
)$
0!K
9*$%+%)
!IE
0
'*@&N
M*(
* ' C
'9)
' * ( ! K
C ) @&N
! & K
E 9 ' ) @&N0
09 !
$$/!%/% )
0,
E)9* ( '
*( C ( ! P< Q ('
!
<!/ *!H
!BA*
R'&C
!*
"
* 2F %
(
' 5) ( (
("!<* ) (!
. *
00 4 '
( 1(19 *(
J
( )
) " ! B
2'2( '
" ) C
9
! / (
'*" "*
) '!&'/L%>/
( ?
! 4 ) 9
M* )@&N
(
)
! B
) (
4 9
!/(4
*!
&!$() '
D* < ( *
' 1, 1
' ! &
' <
'
'
)
9C!
Delitos Informticos
C J! B
C 1< + 8(1
* *( HT )
F 67 $ 8! $ 1 !$9
$ 1 .:8! ; < 8! !
.1. $+5 8! )= $ > )<
C 1! H 9" '
(C"*4,E69'
! B
' '
4,
"(!
& " ( " "
!%'
(A*
H 8 , C(
) ! % !!! P) "
Q!
()4 $')$4 L)D*
(
4,* ) %&
<C(
4 9
0
9! )
Delitos Informticos
( / @ ) 3,-! &
(A12,1
,'
*)" :<4;!
/* 8,(!/ )9
,11 )( (
(9)(
( @* )!
1 ) ( E 9 I=J ) )
*
141!/(
( 1
1 ) 19
C1!$
"
9C!
4
" ( C
) 4J A
.
/ , 7 )
%!
//9121 2 9 '
'**2
*!
B'*&
'I=J)
* * 2' J /
@$ 3B!
B ( $ 3 B
* *('
( * &
"
* ! $ C
* 4
"
(
!
I
4
(
' 13,
/21 131**!B
(
*
(
( C 4 131 ) C '
( *!@
* ) * ('
4! &
( ' & (
*)!
Delitos Informticos
9" C ( A
2
*"*4*!
5?! %%-$
E
!/*:
);
*('
( )*(
:* *-;"!<
'
J8 9 ! / *
*' !
/ *
) U %- J8
$ B
'!
'*$
*"("
J %'(! (
%-
9* !
/ * *V ( $
E
*
)
)
(
C!
@
+111!
ABB*,( *
. =9 B ! < * " '
) CL
!@*
9)
' 9 '! *
C &
H'**('
!
/ J*(' J C S 4) + #
('
)
(J#2('
(" '!/
.
)
*(' ) " C "
' "
( )
!
ABA (,(
"
9 ( ( ) -
' //@@! / '
D.=*!
AA3 9" (C I, *
* ) * J
C 6 ! 3
M (C
* '!
Delitos Informticos
B*<)=)(.(I
"
(
==&-
'!/
E)
M
<)=)'
==& C *!
%
A,,9!
AA2 C9
* 11 ( ( I &
@*)*C)*C(*
#-6
C * 4
A
!
, *" J 4
M! A
' //@@! @
*" !/(
M ' 9"
=$4J$%+%!
AAC ( 9 $ =, >
C? / H( >? ) *
=) >? J *
( ( 7 7*( ( ### C
! $ ( )
, * #( ) J
.
( *'6(!
AAD<
$7-,!(
/ @
C( C
##
#
' C!/
*
*" '
6(!
'
&
9J$
' ( 8, *
J ' J ' :=*
$( J(; :=* $( /!!!;!
/ 9#
*2
( J * I
, <)
)! B J$ 2 '
(*!
/ . $" - 7*
*"
:/ <;!
' <" K
7* (' , "
9"J (*
!'-
=&$>=
&- $?! &
!
Delitos Informticos
AAE 4) ( , C( " C
C
&
(F<,
0(
"!
B 8 ( 4 * , 9! /
, *
( #- 7 M!
*
#
4! 8)
1
(1 ( C (
!
<*,"( ')"
(" 4 / @!
B('* *"*(
! &
B ) " '
) C!7
'
"
,"*"J!/
( !/(
))2'
(
' *( ) *! I
)( C ,!
&
1%,-1 % & ) 4, /
<"5$( MM C(! /
A )
, 1J<5(1 A J<
C ) ! /
* 2 ( %
& ,*M)' 9
!B
'4,7-H,%
"
(!
4
('
( ( 5L34 )
*-
')*
CE '!
Delitos Informticos
Delitos Informticos
*
C
!B(*')
A*)
9* "!<*
/ E
* !/ C( *
@ < J
'
F
1XX8 . 7' TT XXB //!@@! C
TT XX3'( * %-C ) TT1! B
!
/ 7-, $ ( & W)
'*!W.*
('
5 !'
C( C C ) C
(!
&
(9'
)(A*"*
( !
B*/@*"!@
, C <=2'
'
E0 '
,! B
*%-C)4!
/7<'JJ 'I=J '
*
( ' *! B
I=J
*
2( 1B1
** !
1+
$
GEGG
1
!
0G0G
GG
(51
G G
@C
*
(,
*
*"C(*!
Delitos Informticos
&=5
1+
5
G G
.!
G G
/
C
,! :4
" ;! $ C
"!
EG G
/
(":B7$&$
,;!$ C"*")
))
C(!
EG G
EG G
0G G
GG
6GEG
" (
/@$! $ C
*
'D*4,)/ (!
GEG
BC()
,!
GMG
$ "J,!
GMG
/*
C,!
!
&'
G6G
&
G6G
"
6GG
6GG
'
0G0G
0$!
G G
&5
MG G
/ I
G G
"$
G MG
5!$!$
H)%
G G
H
1$%1
I'
!.$
%.
1
1%
$
))
Delitos Informticos
&=5
;
J
5!$!$
H)%
1+
0G G
/
,
6 ) ' * ( !
:B
D*4,;!
G G
E G G
'
G G0
$$5
G G0
<C(L(&&
.,BL&
J '/@$!
#/
G G0
H
G G0
/@7J/I,!:B
D*4,;!
0G G0
$
!
0G G0
$5$
G G0
GG0
GG0
<C(
2!
6GEG0
#
GEG0
/
7$4=B$!
H
1%
0GEG0
H)%
GEG0
(
5
$$5
MGMG0
GMG0
G0G0
4
)
I
H)
!
$
Delitos Informticos
&=5
1+
$
EG0G0
BC(
I
$I
, 2'
!
I
1
GG0
I
MGG0
G G0
'$
MG G0
BC(,,!
$5% &!.$
.%
6G G
B
A
,
'J!&
'!
"
G G
$
0G G
@FF5
GG
1&99
0GG
+
I'%
6GEG
&!%?&I
6GEG
EGEG
6GEG
MGMG
EGG
0
EGMG
;'
"5
!
K
#
&$%.%
;$$I5
%!
&
.L
Delitos Informticos
@
H
H0
"M
";& H
/"*("
(
*
'!&
A
J C
(
!
B (J
"B)'
C
) 2 )
2 !
$*
( (F
'
J
4)*'
L
*
<
C"
@ 1$+
/ ' J
*) ( )
*
(
"'
'
'!
B -
A
)
*(C)*
'! / * *
* (
$ )
<J!
Delitos Informticos
<
" >
/'/JJ?'C"
'') A'
!
B)'()(
!/- ) C*
* J
! $ *
' A 1-1 (
(!/'
C** *!
7
C
2*
'F (
(
A
)'(*(*
2(C '((!
B ( (
'
*
5
*!/ *
9"
J
*
C
!
Delitos Informticos
< ) 'J
*
(
F
<' < J J 9 (C -
"
>2(C(" !?)'(
>8%4B$W$.J!?
<' J
/
'
& '(()
''
(*
4*' C
C
&(
*"
@@
$
/
*
)
C
*! / (
( )
'
)'
)
'
!
$*)
( ) * C C
!
8)*)
J
( C
) (
*('(
)('!
B(')
J(
Delitos Informticos
" (
)' )
!
I ( * C
* !/ ( C
( )
2'!
.$$)
/2 *
'
J
! / 2
'* )
*('(!
B <* &* $ J ><&J?
(
!
< $ $ I L @ ) /9 ( C
()
* ' *(
!
< ( <&J
"
* '
C C*!
L
*
(
) ! &
Delitos Informticos
) *
2
C "
*
" ### I%< 7- ! <
'')**
*" " '
!
FO RO: es un espacio abierto a la expresin para intercam biar ideas donde cada persona
presenta su punto de vista sobre un te m a que se abre a discusin. E n el foro existe un m oderador
para cada te m a que da el punto de vista, se puede opinar libre m ente sobre cualquier tem a; este
servicio se rige por unas reglas, en caso de cualquier ano m ala la institucin que organiza el foro
se reserva el derecho de censurar cualquier m ensaje enviado.
/
*
)2
!
B
<&J'
"
2 " )
'!
@2
$%)+
B * J ) * *
9 *
J! &
( *
)*!<
92
"!
Delitos Informticos
$L!$
/C
(
(9(
J!
J ( ( 'F J
9
( *J C
!
B '
' )
'
- * "
*2
Delitos Informticos
' (
!
@D
&.$1=$ !
B '
*
' )
)
*C
'
2'!
<
J (
)
*C
!
@ * D' -
' * >FGG---!,! ?! /
""J
')'
!3
'
'-
)'(!
B*' C
!<
C
L(<J
) (
!
< )
J -! B (
) C*J
*(
C!
B
F
#
# > - 11
-
' )
J?
I%<#
JL#
.# !
Delitos Informticos
< C 2 1,1 9
( * ' '
'"!
< - C
J!B(
' (
C'"
* )
' L34
' C!
<
) ')
*
- ) -! /
* !/(C)
C
' )
'J.W C!
Delitos Informticos
3
3 !%$
I (9'*!B
' C )
'* )"!/
" 2'2*)")
()
" !
/ "
[ '( < 6 $ % $ $ !
1$!$$$%6
/ ' ) C
(!/ (F
B " ( (
( F
L
!
9!
% !
<*'(
!
/
!
/!
B*'!
B' !
B*'!
Delitos Informticos
3@
+$1=
/ J C *
"
( " C
!
(
('!
/ 2 ' )
2
C! $A 2 ' C *
"!
: C "
J C
;!
1 '(
*
' '(
"
1!
1$ ) C 21!
1B ''"
*
C C
)
'1!
1/ '( '
("') )
C"
) 9) 1!
1& " " )
1!
1&" 1!
1% "
C1!
1& "
< ) ' *
'1!
:$ C " ( C
"
' (" 'F
( '' '!;
Delitos Informticos
: (
CC'
(* A
'*
";
:B ' '
" *
C)G C*
C)--;!
:%"(A)*(
C ;!
: ( ' ("
C '*(')';
: C C "
**(A ;
:/ (
C)G ';
$(
:
;
*')
* 5' * !
;/ ( )
(" C ' *('
'
!
@' C(F
'G / C 9
* )G '
A
*! /
,(11!B18,1C
C ( '* '
' ( ('*
A
'
A
C ( ) '
' '
*
C*!
Delitos Informticos
( *- *
( !
& ' < ( '
' ' 9
'
'* *
' !
&
"
!
' C
9"
'!
/
'
!$
( )
'
'*! @
A
!
'!
& C
'
*9!
/ 9 )2" <, )
( *" $%+%! @ C
<<,C!
8(A ,(*
,V
"
,(
Delitos Informticos
3 *
A ' < <,
(
9"
'
*!
(9
A
*
*)'!
& 1=G / * (
( -
( C ( "
( "
' C )
' 9 ( !
$( ( '
I )
) ( ! $ C
C )
( '
>" ' ' '
* )G * V ) (A
( ( ?!
<2 *"'
( ' ) (' V
2 ' '
)* ' !
Delitos Informticos
33
1$5>.$
/2
F
1 '1 1
1
1"
1
: 1
: C; : C;
:
C;
:
;
: , \;!
32
$+$$1=
@' C
*(F
N 1!11/("
* > '
("? "
>
"
? '" F
?
?
?
?
?
?
(?
?
?
?
,?
Delitos Informticos
!
Fraude por m anipulaciones de una com putadora contra un siste m a de procedim iento
de datos;
Espionaje inform tico y robo de software;
S abotaje inform tico;
R obo de servicios;
Acceso no autorizado a sistem as de procesam iento de datos, y
O fensas tradicionales en los negocios asistidos por com putador.
3'(F
! ' * CF
Delitos Informticos
! 3 C * F
)*!V
E! $ C*F
L C )
* ) '
) ' ' "
( !
B ' ' F
1.
2.
3.
/ '
(F
!
!
E!
M!
6!
!
!
0!
!
!
Delitos Informticos
3C
&!$$1$1=
/"5 C**'
> ( C
? ' *
*(">* C
!?! < C
( *
*(!
(
( ' )
( C F
2(9
C)
* V
2C
' ( ) *
'!
< *'(
(" " )
!/
C
" C! < *' C
* )
'
'
('* !8)
9 ** ) ) !
*C)" ' !
C 9
)(!$
C
* 9 ( C )
(
1
1! *
9
"5 * "
* ' C! 8 ( 9 '
!/
C
<
J C ] < >J?
' *
F ] > '
C?V3]3> (
C?V ) 4*' ] 4 >
C?!
B "
* (
" *! < C * *"
*
! / ' A
)' (
**!
Delitos Informticos
3D
$!1=G!L
)%&)
!L
)" A
*
C ) ( '
(
( 'C
C
!
C
)*)" !
11 J C*
) ' *"
!
/ * " J C * )
(* C
C
* ) '( "
!
&
(")
1 C1 (
1
1 * '(
/-&9
ME!
/ '( 9 A
1
1A C
" )
1*))C
(
*'
'1!
$ '( ' 1
C1 1
1
( * *
! / " A
F * '
' 2
'
'
' (
!
/"
"
! B1(1 ) V
C
) ' '
9 ' " V 2 (
' A
9 V
((
*
" 1
1!3
Delitos Informticos
(
C * )
**
!
!L&)*"
'
' *)1 C1*"
* (
'( !
/ * )
" C
*
"
*! 1
* (
1 C1) )
1 ) )
*" V '
*() "
CV "
( )
' C "
(
1(1!
3E
5>
8!
@ ' ' >
C?"(
*'(>(
(" ?!
B"()C(
9 (
*) (!
B (
' *
(' *
!@ C ' !
B("( (F
!+
B ' (
!/
!/
'
- "
'!
Delitos Informticos
+
@ ' ' (
'!^
!@
"(( *!
+
@' ''
'
C! /
(! B "
**)( '
!
.+
J'
'!/
!@
"' !
Informacin
fuente
(b) Interrupcin
(d) Modificacin
Informacin
destino
(a) Flujo Normal
(c) Intercepcin
(e) Fabricacin
8!&)
B *
* *
'!B
' ' !
F
*' )
CC!
Delitos Informticos
/ " '
' *' '
'!
/ C C "
*'
(
') '(A
' * ! B *
"
' '
*!
8!
)
B*)( ' '
!8)*F
Trabajador de una
Empresa X
ingresa con el
Login de una
Empresa Y sin
autorizacin.
Login:
MACSA
Delitos Informticos
3B
$1=$H
$
>
!111!$+1!
!$+
/ C
'
$ J C A ) C
) "
! /
C ) (
' !
1!$+
51
!$+
&A
* C!
$ / C A
$
C '
' ! %
"
(
)(
' '
Delitos Informticos
$1=
1.L
!
1
!1
O1511!9
.L
1=
0!
/ * (
( (" ) ( ( C! @
*( (
'("
%)!
"!
&
C(* (
("
* (! /
"(
(
* (!$
( (* *F
( (
( C
C
"!
#1. $+5
$+5
!9
1
)
< * *F
C >8,?
C!
Delitos Informticos
3A
&
1=
'
!+
!9
51
1=
+
5$
!1=
C *
(((* F
Delitos Informticos
Delitos Informticos
.L1=
/&
J C
1
( C '
C 1
( * "
"
)
" 1 '1
' ' '*)
'*)( *
1+1=
' '
( ( (
'
' !
$"&
J C
J ' "V
'
C (
'
A ( (
(*!
3 $1=$+5&$&!
/ "B)E
C'(<F
>!$ @FEQ?
? / (
9
'C
C
**
) 9 ' *
'!
&('
' C
**
)9'*
!
Delitos Informticos
! /(
'*(
'(!
! /(((!
'(<('
C ) C (
CF
N $0$+$1
/"
6MC*'
F
:* *) )
*
(
( *
C **
) 9! B C ) )
* " ( *
*;!
/ "
6 F :
(
*(*"()
* C C
**
9 ) 9! & (
*A
) (C
9 )
';!
B
C
: * ( ; "
*' C ) C * *
' ) ' * ( *
*( !
.N $ ! 5)
$+
$1= 5$ % 1$
$)
/ "
06
F :
* ("
) (
C **
) 9! &
("
( ( )
( * ' "
(;!
/ "
0 ( C E 5
)E
5 C
Delitos Informticos
: C 9 )
' '
C(*' *;!
/ (* '
* C!
/
) C
)
! / '
'
! B * ) (
*("
*
:
; C
( - - )
( !
@ '
)
)A
*!: C
(; )
C)J
/' !:
* ; C ) *' - *
('(*!
N $$+!11=
/ B(* 0
B)
(
*
C )
) C! /
"
F : ' ) '
) (
'
A
'(<;!
/ '( < A
')' (F
? I' ! $" MF :/
* (
('*
'
C (A **
) 9!!!; %C
(')G' !
? I '(! $" M0F :/
A
' '
* C (A
Delitos Informticos
**
) 9!!;! B
( A
*
'( A
(!
? 3 ''
!$"MF:/
A
*
"
2( ' ')
(
('C **
) ;!< ( ( *
)( )!/
A
> ? (
' )
'
)
"((*!
N $ ! $ 1+ L!> $
1$!.1=
< C
>-? >- '
!? (
* C(A' "
0[
0'(<
F:C **
)9'
' *( (
"
(F0?@*
!/("
- ' C-
) "!
N $$ !I
L-
1!!!
")
- ) (! H
(' " *
) ' (' )
1!
' B(* 0 ' '( < )
('" F
? /"
F1C **
) 9 ) * "5
!!! (
' * ( (C
2 (
'*)!
? B !
Delitos Informticos
Delitos Informticos
!!!
Delitos Informticos
C '
) ' (
(!
B )"
' <" J '
) '
)
>B * *?
C ' '
( (
)
!
' 3/
/ '
) (*
"
(' )
"
(
*
*)'!
B " 3/ '
9
"'
('!/ _//2
/
2 ' ) '
' *"
*'
*(' ) '
Delitos Informticos
59+ $ H PHN / 3*
(
<*' ) <
8
C
) " )
Delitos Informticos
'
C2
!
*
(
C )
*9'( '
/ " )
)
('*('
1*1
' ) CV "
C
* (" ' ) *'
!
$ C 9
C
9
C
' *
(
'!
3@@
5$+&>
<"('
(
" '
(F
"
%@CF3DRAB& &
H
4" "
` M` ` ) 6
'"66
B)7`
!E!
G3
M
0%&1!$5G7*
0
#G
G
G0
$%=1!$+
5!
5!9
%G
>!$ S 5 4" "
` B)
!E C
( F
Delitos Informticos
$"
`F $ )
" )
" ) 2'
( ')
V
V
C C5 V
(C(C) " V
V )
V ) VC("(
)
( V'" " C
'!
B '
C 2'
' ) C
)"!
>!$ @S 5 J' ? " M` )
!E
(2F
$"M`F!!!
? B " " )
( '
( '
9
*'!
>!$3S5J' (C"`)
!E
(2F
$"`F!!!
S)
5
(
' C A
*( ( !
C
'
') ! B *( C
(
( ' ( * A
'!
Delitos Informticos
Delitos Informticos
? & C '
-
(
" (
'!
?&C
-
C
'A
()
'
A
( '
2'!
?&C
-
C
*
( '
!
/ $
C)
(
0'&(
B) /'
6 )
0 (F
/>?!
/ C>E?!
I'
>?
(9
C"
''(
>
E?!
$'>EE?" *
*
!
&
C>EE
?'
'
( ' ' '
' !%
*!
@ '
*>
?!
Delitos Informticos
Delitos Informticos
H
B) '(<
0!/
) (F
'>
?!/"
( '
)( !
/ C >
M0?! / "
)
' C*'(
'''
! $ C
'!
Delitos Informticos
J'7 FB/H5
E
&!.$+F!!
E
&1!$5+F0!6!
E
51F4@&%JJ$
B)A 005
6
00
C!
$
'>M5?!5/"
( ) '
' '
'
!
&
C >M5E?!5 / "
C!
' >M5M?!5 / "
) C
C
'!
I' >M56?!5 / "
'!
@ >M5?/"
(
"M56!
&
T
/!)+5&$O$>
B)53(C
G
6E7*
G
=3/A 0
M7*
!6?
) * " "
!
&(F
! "
#
Delitos Informticos
>!$AE
!5 /
*
'
'
(
' ' (
9 ' C ( '
9) * !
!5 B C
* C
(
C' C*
( A
*! J( C
)
!
E!5 & C'9*
C(
A ! &C (
'9) *
( " )
C!
M!5 &
)"
(
C' C * ( C
' 9 ) *
* C !
6!5 J(
C * (" ('
(*2*"
C* !
!5 & * C
* *
M"
!& C 6
C'9!
>!$AB
BA
B)
( ) * (
" C (
* * ) C
'
9!
Delitos Informticos
>!$AA
!5/*( '
C('
9) !
!5 /
(' ( *
*( C ( '
9 *
'
' 9!
>!$@FF
B"C
*
* "
*'(!
>!$@F
!5 < * " C
(* (!
*
C
4I!
!5 7 C 2(
"
0 '(
' (
!
E!5 / ' ( 2(
' (
CA M["
E!
>!$ @ >7F % " (
! P& $ J )
'QP& %
*Q?!
B )C
(
'
!
>!$@@
/"C
*
"" **
)( !
>!$@3B
&
((
Delitos Informticos
[!5/ !
[!5L *!
E[!5 I
*
(
!
M[!5@*!
6[!5J ' " (!
>!$@3A
&C*F
[!5B( A C(!
[!5B*("
)'!
E[!5
*!
$"* (
) !
>!$@2B
!5 C (9
'
!
!5 %
C )
*( ' C (
*
!
>!$@CC
&C (
' * ("
(( ("
( (F
[!5 W '!
[!5 $ !
E[!5 / !
Delitos Informticos
>!$@CD
/ '
C( !
>!$@D3
/ 9 %"
'( C ( *
' ' *" ) " 9
2 !
>!$@D2
!5&C('9)
* 92"
((F
[!5 S
*(
A
(
)
'
'B)(!
[!5S '((!
E[!5S **!
M[!5S
A
!
6[!5 S (* '
' !
!5 B C )
9(
' C!
>!$@EF
&C(' 9
* C )
(
) A
"" '''
" *
'
!
B C 2
'!
Delitos Informticos
&C(
'')
" '
' * )
(( !
>!$@EB
!5 /
' C
(
9
"
C(
'9) * !
!5 & C ' 9 )
* *
!
E!5 B " C
'
C!
>!$2FF
B
'A C
( " '
"(C9
!
>!$C3D
B A
(
' (
' ' (
9 ' *' ("
( C
'
(A
9!
& *( * '
C
' ) C
!
H
' / @
M
$ I $
>
0 @!&!!
&!
E? ' $ I ) $
0!
( )
*(
%))
* *
' ( '
Delitos Informticos
'( 9
C '( !>
0@!&!!F&!
E
>?>6?>$?!B*)C
'*!
/ $
M
* '
(! / * *
9
' * (
9 ' C
) ' '
A )9'!
/ ' ( * ) )
C
* C
" *
* '(
C ! *
*)(
*!
//
'B)<*
C (
)
*B)!
& &' 6 '( < *
C "
* ' N
) N6
!
/
*( (A
'*()((
9)
)
( !$ (
' (" " (
' C)
)
) ' (
) * '
*"
(
( (
)
( )
!
/ )
(' * > ? C
( C A *
( (
( (
'
C!
Delitos Informticos
"
#
T
,(
'
( " 1! !
>B)$
J C?!4)
2 C
9 '
!
/ ) "
' '!B*C("!
/
* 99
!
/
[ 4
E ' *(
%
$1=
,( ,( > ' *
*(
*? (" >
* ( ( '
("?)
'*!
B
'*C
9!
& *'C
'V
'
9(9'!
J
!)1.$G
>!$@#?
$ ' )
* ' C
((A ( C
9 ' )
E " ! $ '
' C(
(A ( CE 9')
6
6" !
>!$@#?@
$ ' ) * '
C / ( (A
Delitos Informticos
( C 9 M 9 ' )
" ! $ ' '
C / ( (A
( C 9 ' )
E" !
>!$@#?3
$ ) C
/
) * '
( C 0 9 ' ) E "
! $ )
C /
' (
CM9')
6M6" !
>!$@#?2
$ ' ) * '
C(
( (A (
C M9')
" !$
' '
C ( (
(A ( CE 9')
6E" !
>!$@#?C
$ ) C
(
)
* '( C
M 9 ' )
" ! $
) C (
' (
CE 9')6E" !B
*"
(
!
>!$@#?D
<"
=J&5M)
=J&56
( 9 " M
=J&'(!
>!$@#?E
B * " C
'
*!
>!$2@2
& C' 9)6 E "
* *" ( A
Delitos Informticos
'
(
*(
' J "! 1&
*
(
C"MM=J&'(1!
>!$@33#
& C9')
"
" ( *( I *
*" ( A
)
'
(
B)! 1& *
( C " EE ) M
B)1!
!
B ( '( <
I A)A
4
IC'(<I!
33 >.$$1=
9/@2'
&( J C ) " *
!
//J&( >&J? '
1/ &( ) J C1
EJ ()$(.
!
//&() J C (&J '
$(IJ*('>I=J?&I*' C!
/
* ** ("
) J C / @
7 !
B 9 ! B 1)
" 1)( '2)*!/
b ! $ C
9! B E (
N660M! )"(
C(" ((") C
) ( '
*)(
!
3"F
B 1" 1 J # I >J#I?
*'0
M!E J ( L! B
Delitos Informticos
) * 1" 1 > 06b?
("!3"
)("!
&(A &*& / @
6 '9
A ) !
A * (
(
(
B
'*
!
=
1$
F')
1
!
(9!
/ ' J ) C " &(
'
*( *
))*M '!
Delitos Informticos
2
B ( * )
) * *
(
** * * )
'!/
***'
) (
C
( (
C)A
'2(*
) " " ( )
)
* A!
2@
$$1=$
B ' ))'
' )
! B C * (" "
)C C
( 9
'"
((
A)
(
) C 2 " ( 2
!/
( ) (
)
( (* C!
& * C " *
( J C ) < &! B
' .
) )
( ) (" (
')
(""
( A'*)
!
/
) '
' '
* (" ' " *('
('*
(* ) (
C( ')!
Delitos Informticos
*'
C ( A *
"")
!
/ " 1
1
(
C *)**
!
/ * 2
)C )
2
) ( ( ) *" )
! $ C
' )
2'
(
C
!
B *' * ("
Delitos Informticos
3 ((
" *
' ' '(
(
( !
23
Delitos Informticos
C
( )*
(' * ) C
(A !
3 C
*
((!/(
!PC*
)
#
Q PC *
* ' 2 C(
-
* Q J PC *
' * 11
* 'Q/"
* * ' ' '
)
) ! $(
* !
@*')#
!
A J ( ( ! 3
C J '
*!
7' '
'
!
B C ** C (*
! B C C "(
! I C *
'(* !
P&"** '
' C Q
P& (9
Q PS
( * (Q! $ "
'
(
C *V C C
A
!
7(*!B(*"
")
) ! '
2 ( )
(
!B C )
'*' (A
C !
22
$1
/ ) ) (
"( F )
Delitos Informticos
>*)?
*
)
* *'*A
!
B* ) !/
* * )
! &
*! /
F)A
*
" C ) / ! /
*
)( C(!
B '
!B '
C ""(
'V
C' !!/
2)"* '" C
* *! 7 ' "
( *
( ) "! B (
(C'A
!
& *
C )
" )
*! /
( " ( )
C)(!$"
)' (
!
B ' )
(*( '
F
?
("('!
?
'!
? *C
(
F ' >
2 ? > ' ?
2>*'?
!
? *
'
" 9
' L'
" !
Delitos Informticos
/ C2B) &(7
'
( '()!
2C
$ $+
/ 1 C)*1
'
* >
(
) ?
'! B )
C
C()'
( !
B ' ' " *
(" ' ) ' ' "
*
! B '
* C!
/<A
' F
!+
!
!
$ 2' ' )
A
((!&
2A )
2 2) ) ( ! /
! $)*
) *
Delitos Informticos
C& 0
C &)+
C &>
<"
'(!
/ *
" CV
(
( C
C
-!
B" '
A
( " "
*!
/<AE
B(*7!0B)
$
( C! B ( ( L( 7
$J7/3<J((
!
/ . $ ' 7[! E6
F L( A
$ ) 2
E
"
) * ' ) C
( "
" ( 2' )
"!
B ( '
-!
C
2
!7'
A
* - ) ( '
' ) C
!
/-*F
Delitos Informticos
<
*
'! >4 *
!?
7("!
( !
&+
< -
(
F
I5$
I&
B (
(
)
) !
Delitos Informticos
Delitos Informticos
* C '
;!* C F-
V ' '-!!
* C F -
V ' '-!
B 2 J C ) ' /'
C A
)
* C ( ) '
V ' '
* C
'(A '!/
'
! < (
!
&
' '
C
'
) ' C
*!
. * C
'
> C * ? (C
)
' '!
4 * * C * )
*
2( * '
) *
' ) )
*
) (
!
( ") C
C * C ' *
*
!
< )(F
?
?
E?
M?
PS*Q
P'*Q
PC*Q
P' *Q
6? PS*Q
//Y
L
/9
J
C('F
8-
&-
&*J C
Delitos Informticos
C
1-1 1-1
)(*
C3 &+%+51
< * ( (
(
C ! 3
( ) A (
* )
(A !
B '
)
) ! / ' "
( C
C
*
!
B C C()
" A
( E
G
)
GV 9
(A 6
)GV
'( !
"( ,)
* ) '
*C!/ (
' " * ) A
( !
B ' C "
' (
'"!&
Delitos Informticos
"
()(
"!@'
()
CC9!
/ ( ( (
C *
!
B2
A ) *
( !/
A
9(*'
"
**( !
/ " A * ( C
) *
' *
(
'(
* C!3 (
'( A
( C * ) C
!
%
C' '(
)*
(
! C
C
**
!/(**
( (
C
C '! $
"
( ( ) ** V
C(
*
'!
3' C )
* > ?
*) 1 1!/ (
( ( ' C * ! /
*
<L34 '( (
)
"!/ C
C ! B *
* )"
9 ( **
)(
*
C
*( A C
* ! 7 ) (A
( *
!
Delitos Informticos
C2 &$!$
@ " J
(
'(
!J
C (
( 2 (
(!BJ
)
'(!
/ 'C
JA
!@ '(
( '
) A
1)(1!
/
(
2 *
' ) (
!
B C1 1
)
((( )
) C ) ' "
"( *
'
"
C " )
11 2 (
()'!
%' )J)
C * *
(
(
!
S J ' C
'*
'
*C(#
!
/ J)"'
((C "!
@ ( ) ( ' " (' )
" '
* * * C C C
"2!
/9C(#
((
) !&*"
C(#
Delitos Informticos
*
)
'(!
&9) 'C(#/=
)"" (
( *)
)(!BC(#
*
" ) C
!
BA *34<J!J '(!/
)(
'.
'3( '4<J>34<J
(#J<3?
* ('
J'))'!
B 34<J ' "
"(
)J
'
('/
) *' .
$
( " ) '
( '
'!
B**
C(
)
'
)2" " !
Delitos Informticos
!&( -
* (
V)*'!
/ - (
(' (
(!
!9+ 1$>
B '
"! /
2(
A
*"
( '
"
(!$*2
(
'
" *"
*!
&
*"'!
/
2 C( #
C
C 'C(
#
' "
C(
C( * #
C( 2!/
" " (
! @
(
( C(#
*(
"2
2
( ) ! / '
'C(#
C(!
&
(( ' " @&$
/! 4
' "
J
C!/
* C( C
)
C ' "!
B )"J'
' 2" ( * "
)2
(
(
) " ! <
) ' ' )
2"!
Delitos Informticos
/' '
* C C
) * C V
( (
" (A
" * ( ) *
' * C ( )
" -
(!
%
2
'
*"
' ) " *
*2(A
V"
)"
A"
2(A )!
CC
&+$I$&:
B ' &- ' "
)" )(B(*
7[0B)
$>*('B)7[
E
M
5B)$
?!
/ ) " ' 1-1 ( F
1/2'
'(
*
(
1!$ '
'(
>-? "
' )
!
/ " 9 ( (
2'
2'( * *)
'( '(
! B '
) 2 * * (
" ( *!
/ 9
-
>? C( ,
5 !
B'<"<A
E
('
!/"0?9(F
Delitos Informticos
>!$ E!5 & *
( )2*
' B)
'
*(' ( )
!
B *
' * *
( ( * 1!
" 6M C 2(
9
' '!
Delitos Informticos
/ '
*
' ( )
!
B 3 $ J7/3<J A
(
* ' 9
0
'
L'
5
0
(
(( !
$'
(-!
! - 2F )
2"
1"1-!
! % ' ' -
C
' *)G!
E! B * )
-
C (
)G (
-!
M! & "
' *
- (
(
!
6! &
L (
C C
L!
!&'J4<A
)"7
> A *? *
'! %' ( A
*> =&$?
!
Delitos Informticos
D"H
D $$!$>5!
/ ' " ) (
) ( ! / "
C
()
*!
$(('"
((F
! PS Q
! P$ - Q
E! PS
Q
M! PS )*
*Q
6! PS Q
/ ( '
*
"*!
D@ 15!!1
/2* ( ' C
!
& )
C!
B C()A
*F
)
9! $ C ( ( (
!
D@ 5!#
=8!
7 C( C
(
C! /
Delitos Informticos
( ( )
C( !
/ 9
( C(*
< (* ) (
( ( ( (
((!
$
*
2*
)
C!
D@@ 5!
B (
(
*
)
)
(! /
(
:(; -
'
)()
C (
* (
'!
D@3 5!)U$!
@ (*5!)U$!,/
( **((
C
" ) ( 2! B (
*
(!
% 9 * (
*) ''!
D3 &+$5!
C(
(2(
Delitos Informticos
' ' C )
** (
!
D35!5!1$$=8!
$ (F
-
$(A ( ( (! @
D3@ &$!.!&$>5!
/ C
' '(A
) !
<
,
)
'J'!
& (A
!
D2
5$$
D2 5!
B(*A
' ! B J '
* *
' "
&( J C )
,
) ' !
/
,
(
Delitos Informticos
' )
C
)
!
/
C
,
(
'()*
' 9
*
,
" !
3 *
(
(
C ) ) ) (
(
" '
!
D2@!5PI$$N
@- '
( ) (! @ - A
( 9 (
( ' * J! @ - *
1(C1 J ) >' * ' J?! B
' - ! &
2 '
-* " !< *(
' <
* ) < (
( ' <
C
-(( '
!&
J' <*
&* J >' J&< J &* <*? ) *
J< ' C
2' ( J ' (!
B -
( (
J*( '!
/- **
C
( '!
%
- C
'
- ) - (
)J!@( '"
)G!
Delitos Informticos
/I- 2'J
( )
(!
B- C
( ( J! < "
- ) )'
C *
C(!$ C-
'
#-7%)%<GJ<!
$$I$$
< (!
<
C!
<(C " C
!
$)*
"(F
< **(J!
< (C G
C!
< ( '
* )
2!
$"!
B - * 'F
*
C ( J
( C ' ( *
'
("*
J
' C
C!
' 2 * )
(!B*
-
*-!@-
11
- ! B - (
>
-?! & (
2* -! / ( *
C((2* !
1$I$$
B ''2*!
B
C > '
*!? A CC !
7 (2*!
7(*((!
Delitos Informticos
/ )
-( J
(! =C J
" !
D23 +
99*
:;
* * **" 2
(
!2 *
( 29 2 * ! B
1 5= 2 C *
(" ::
'!
&
( C*
!
#)
/(/(
(C)
(" C ) (
! /
2 M! 9 C )
(
( )
! < (( )
(C
2 9 6 !! /
(
:):"
!&
"
)"*
(! 7' )
"
2)
C
)A
!
!&
E
!
" (
)
) !/
(YJJ
(L(=
'* (C
( .
B* : *' 7 :
'
E ' '< WJJ!
B
C'!
Delitos Informticos
/
MB'=$
*' (C
) ( YWJJJ ! /
%
*'
&(.4 /@!<
" )
)
0
' ' ( *
M9!
B(( '* (C
) " ! B /(
(C)
2 (C! <
(C ! $"
'(/& '( (!
$( ) ("2 "
!/ /&
*
" ) ( "
9 " ' ) 8
*
! &
(!@9L*& )$
(C L&$! @
A
C ! 8
) '*'!
I (C J
<.< < K
! &
( ) (C
( A (C C
&&58 !<()"
4
.!
$1$.1$
/ 2 )
"
)
' ! /
Delitos Informticos
2
!&
E"V
Sustituir
ABCDEFGH I J KLMNOPQRSTUVWXYZ
Por
G HLW RV
LPIRUO DW LFRV
$1$."$
/
!/
( ! @
(F
Sustituir
:ABCDEFGHIJKLMNOPQRSTUVWXYZ
Por
:QW ERTYUIOPASDFGHJKLZXCVBNM
RTSOZH O FYHLDQ ZO EH
$1!!+&$$.U
/
'!/
*
) " (
(A
! $" *
A ! / ( C
) * "
!
$1)
/ C
*
! B
*!
Delitos Informticos
Delitos Informticos
(
C *
(
C(* !
" ('
( '
' ( (
(*
*
*!
/ ( )
! <
( ) C A
!B
!<
) " )
C '
/2 ( (
'
' )'
' * *
(' * *
''V
"
* * ! I
'( ) *
( (!
B '(
( ( >
* )
' (
( < W -
' ) C (
?! *
)
'C(
('
'!>) C
*
F ( !?!
1$1$+
B ( '
' ' ( C
'
C (
'
' ' *'
(! / C
' '
)*"
' * *C
!
Delitos Informticos
<
: ; F
/ * )
/ '(')
(
V
" * ! $ C
2(
"(*9)!
/ * )
(
*( (C
)(
* *
!
. ' '
(C
' * A
' V
((**
) C ( *
* ' *'
' ) (
" * ) '
!
DC
5!1=
&&(J C
C
( 9 ( )
!
" * !
B (& C-
-)!
I
"
C <@ *
> 5L34 ,
?!
Delitos Informticos
I
( '( -
* !
''( -)-!
Los Datos constituyen el principal elem ento de los tres a proteger, ya que es
el m s am enazado y a veces difcil de recuperarlo.
B ( )" *
' )
' !
/$ &( F
&$
B ( *
( ' V)( '
( ' C
(
(A
!
/
&( J ' ( '
& !
K?1$
< (
*
* ! .
( ' *
9 *( (A
!
!
B C
& !
' * ' 3( '
(*((& !
Delitos Informticos
19
+5
%( 9
-
-)(!
DC 5!$
5!>$1
B ( " C '
*
") *'
)* '!
B&(I"
( '
* (
** *'
" *!
< *
&(I" ) CC
*)
(!
,
( '!
&+$I
B J ( ( - C
&( I" ( '
@* ( J
A (' * !
>
B
" C
& 3* ("*
(
&&*
(
, ) *C
<@)*V*(
(' ( *
C '
*!
!$
/ * )
7)
(*!
Delitos Informticos
1
B )
<A
(
9' !
' *
" )
(
*'
' (**
)(!
!1!
B8 **
'
) )
" 2
'
2!
/ *
<c ) & &*
(2( *'!
&
) C
*
( !
/J)
C (
! H
( C
!
/* C
* *'V
(
&&*)( C
*! $ C
C
!
$
/ & / *
&
'
C
'
9' ) !
Delitos Informticos
@ ( &( ) '
V) *
' * 2
(*!
% !1
B(
) (
*(
(
(A !
@
*( '!
@ * 2
(* C !
$()(2
'
()'!
1!K1
B 2 ) 2* "
(* !/
)E(!
<
C!
1H!%&$
< 3( ' ( ) "
&( )
C $ @ )
/!
1
/ $ L 3( '
' ) 2! / $ (
&( '*
(
*!
E l A dm inistrador de la R ed debe seguir las reglas de S eguridad, indicadas en el
P lan de S eguridad establecido por la organizacin.
Delitos Informticos
H!%&$
/()"(
( &(J '/ C
C )
3( ' ( (
)
!
M uchas veces los usuarios y personal realizan acciones peligrosas para la
E ntidad, pero no son realizadas en form a intencional, catalogndose com o
accidentes, pero el que la am enaza no sea intencionada no im plica que no se
deba evitar.
DC@ 5!$
B
' **
* ( *
((& !
< * ) )
'
* ) ( C
( ) * (
"*
C * ( (
'!
89 (
'
'
* C*(!< '
9 J!
BLJB$7 B$7>B$7-,?5
*
5 !B
B$7 ("
!
'
* B$7
! *
! B -
B$7> "' 2
' !?
!
& (
(
* '!
Delitos Informticos
3(
*
(
9 *(
' '!
B$7
J7%/L7/%
2 )
2!&
(
2
B$7! <
(
( *
2
'
B$7!B ( '
=<'>I#?!
Los perm isos deben ser asignados solam ente por el A dm inistrador de la
R ed.
Delitos Informticos
Delitos Informticos
EVH
H
;&HH
& J' *" ' (
) 9
!
E 115!
/115!>
*((
*
!
/
) * (
C! )
(
"
('!
& (
!
!
&!11$5!
!&*" '
' !&*"
!/ C( 9)))
C
'!
&> C(A
* ( " C
C
( :d-; ( , >
- ? C!
&( C
! L
Delitos Informticos
E@$
5!L
&
C
(!
P or ejem plo, tal vez descubri varios accesos FTP, justo antes de que el intruso
entrase. D esabilite el servicio FT P e intente conseguir una versin actualizada.
* ( ) * C( (
*(!&(
**C! 7 C
!
E3)$!$O
/ *'9
' !
*( ' )
( ')!
E3 $!
(
"
!
C
!/2
*
J'
)*( '!
B :,; A
( C (
! J
"!
Delitos Informticos
B
H
"H
B
/ C $"&(J C )
** *')
*('C
') *
( * " ( ) * ( * )
( ( ( )
'
) *
*(" '!
B@
.L)$
!>
/
* $" &( J C
*
C 3( ' ( (
( ' ) ("
'('!!
B3
!
$ " &( J C
( ( )
'
!
$ )
) & 4
&(J C !
*
& J C)
& 4&()
'!
W
& 4&(
'& J C!
B2
8!$9$
!>
B$"&(J C
'()(
$ ' / )
A
) B) %("
J '
A
( (!
Delitos Informticos
BC
$ $9+$
!>$5!1=
&$+$
!>
/ C
(
)
*(!
$$$
!>
B$"&(J C** F
)5+&$1G
* ) '
"!
3
'
' >( '
' 2
)
?!
L *'" C)
( " (
) '
) *
!
* C
(2)C *( *(
" C *
*!
3
2' ) C
)2
)
( !
0+$5!1=
$
/ *' )
' )
( C!
Delitos Informticos
& C 8 $"&(J C
'(
!
1.+$1$11=
4
)$"&(J C
A*!&(A* (" C
)
"
* C!
< $ &( J C
)*
"!
/2 * ( " (
) ' C ( (
!49
!
B * ( "
*
C " *
C 2 ( ' *' "
(=!
/ *' )
' *
(
*'
* !
&
* C
' !
I *' )
'
'
!
& <A
C " (
".LA
!
B "
*
* ( *
! & *
* )
!
*
*' )
*
*!&(
*
(C !
/ C
')
* !
5!1
B ( *
*
*!
Delitos Informticos
A"
$P$NG
7
)C (
()"!
L1$G
Nombre
Alias
:
:
Fernando
Nando
%1!&P&+1NG
/ I%< ' J *
( ) * 2 *
'
) 9
>-?!@
) *
C ( ) C *
A
!
$P
$+NG
@ ( *
' ! ### I%<
')% C
J!
$5>G
/ (!/
*
2 (
!
5>G
&( : :
(
**
(* !
I$P#L5NG
/J '* '
!
%P+NG
/
2 ! 8)
)
(!
Delitos Informticos
LG
/
' ' '(
'!
$&$W&P&$ NG
< )
!I%<
(
*!
I$$P!5NG
& J! B (
C (
J "
(( '!
!1=G
/
C
" !
IPI
.NG
<( )
(A"
) ( >B2
"?!
&P+&NG
'E
<J&%6LI
!&
' !@ 'J<
E!
!00!EM6
&IPONG
'*!
.L1=G
/ *
'
C**
( A
!
0$+$ !G
/
2
'2' * *(A *
!
Delitos Informticos
Bibliografa
(Pginas Webs y Libros)
& &H
&
& #
X
J
FGG)!! 2GGGG*GJ7/Y!
@
& &
FGG---!(! G&W)G8 GMGdE! e
3
&
(G
#
0
FGG!
! !G(G(G
G2!
2
H
#
FGG---!!(
! 2G GGGd!
C
FGG---!! !G
!
FGG( !!!Gf*GG(G !
FGG
!
! G(G!
FGG---!!GGG(G(!
FGG---!!G!
FGG-
! ! ! 2GG G!
FGG---!5 ! G
FGG---!(!G
G)G!
D
H ;
FGG---!!,!GGGG
6!2
E
/
;"H
FGG---!E ! GG6
!
B
.G
!K!%/
D*I )*#,*
!!6$
A
Delitos Informticos
Delitos Informticos
J '7@/9
1!
6
H
H
/ 9
! 8)
"A (
()
6!
$ * J *
! B
*
'1" 1
CC9(C)!
B C * V
( ( !/
' )("
b (A 4 7 @
*') ' !
B
*
11 * (A !
<
*1"
C155")2(!
/ CC
( 7 @
<*' )
% W
! / (
J7@$)B3<*')
% >@7$I/J?%,)
7 @ <*' J >J<? C
' *()
!
1/ *
'
*('))
C"
( 2 )
1 L 3<*'>J C?
J<!
1+$+.L%1=
B ( *
( * C! @ *
( (A *
* '
)
!
Delitos Informticos
&(A &* & / @
6 '9
A ) ! A
*( (
(
)94
37@!
3 C
( *
' 9
2'! B )
1(11*1
!$(*( (
V (
11V
C ( A
'( 1(1!
/
* /'*
*(' * *"
) (
11!
B
'*
!
=
1$
F ' )
1
!(9!
$ &! * 9
' *
)2
'J*!
B
')1 1
J
*
!<
( 9)(2
!/ /@C(
J!
$ CC(L
* " ) *
( (')("!
B )
8( * ' *
* '* ' J! <
NE*
"'C(
L)(
**"*"*"
"!
J )
*
" C( '
* 9 (
*
!L
1*1!
Delitos Informticos
!$!.U
$ ' " ( )
( * C C )
*
( *!
&( ' B)
@ J
7/% &(! $ C * (
1 (1 55 C
(
) * A
)
(55 " ( ' '
'!
8) " ( (
!@ C(3J*(/I
$/@
0!3 J*( J
$ ( ) ) *
C!/((
)((
'('!
< ) A (*
C!/
*(' )(*
) "! $ C * (
2 ( (
55) *
(55( !
/
" !B
*('*
'55)
" "
55 ) ' '
(A / @!
" " ' ) " '
')'!
$
&*J*('<)$(IJ*('>I=J?
/ @ (' " ! /
C
* * ) (
*) * "*('
'("(!
B"
*)!&
(
"
" 2' C
C C ! I *' ' ' '
(
/@!
Delitos Informticos
!+!!$+!.
3 (*
C
C
C
C
C!&( C
(
V * C
(
!
% * ("
*(
" * ( )
! B '
J)(
A *
'!
B
'"
"
' (
'(! 1& (
* '( (
55(
55
) 1
(( 9" ("(!
+$)$1!$%11.$
B
' )
*('""))2'
!H( !
/47@
/)
)'
! / . %
/
(" C
4
) * " ) 2
*('(
)( '
(!
/J/J*('$*
*)
' ) 2 ( ) "
(
( ) ( ( (
* 1
%)1! %
')2'!
/
".3>.50?
(*
( 1(" 1! / . '
"
C *
*"*(*))
' ) ! %
' "
( ("
Delitos Informticos
'
()
!
/.3>.50?'
M
"" ( )!/)
*( / ' * )
" * ( '
'!
@
C )'(.3>.50?
* ( " 2 )
"(
A
'55
55(!
$$$+
L!$
B *
*
'
'
( '!
.L1
B 1
'1 *"
' ' "
(" ( ! /
) !$
C2 * (!
.L%)$1
B '
)
) A )
!
6&6!6$6$)
B(9*J
**()
* *! B 1
1 ( *
C*)
"
* !
51
B * 11
' ((A ( ()
!/ D*4,*'(
% & 2
()
J*A(!
Delitos Informticos
&5>$
B
'(" *JC
! 9 A '
' ("
M 9 "
! /
(* * ("
(" * (" ) C 1*1
*!
!59
/ ( '
) L! B
" ( 2( !
$ C( ( * )
9*'!
!
H '
) * * (
2 '!
#$8!
& '*('
"*(
!
< ) ' F
!
&)9$L!)
3 7 @ I ' ( ) <*'
<!3!=26
$5
MW$
%F>ME
?56
I2F>ME
?5606
5F!g!(
#$$
$1+&:.$
&')8
J '<A
7@
3&5
M
7@
7*H,7H
//!@@!
%F>
?E5E6E
I2F>
?E5
0
5Fg!(
Delitos Informticos
& 0
)!$GL)
&H4$7%/5
6(5J"F
&
@! ' * >
9"?! & * *( '
* ' ) 9 * (
(!
/*
(!/
* ' '>F
%<)J B 5% '
$ &)J&)<-
?!P8
C('*"'Q
4 C 2
' ) A ! /
9"
,( I
M6
'
*>F%<)J B5%
' $ &) J &)
<-
?!B("J *
'(!B
( 9" ( )
!
B ' C* C ')
C ) "
"
( '
*>)'*
?!$
C
*
((
" )*!
$ ( ( A
) 2 ) ' (" C C
!
&1+$G!15
&(A9I=J) &)
J '
) ) ( ( *! /
b
9" ! /
* '
' (! &
( " 2 (
*
'!
Delitos Informticos
&$5$+$8!1+
$
/ ' 2 (
*!
) 5! * "
)*(*
'!
%! $ L $
1+$)U
@ )( ''*
"!B(@
*
"!
& ' (
@(( ')
')
'!*
@ * '
),(( '!/
) 9"
* 2) > * ? (
*)- !/ '
( '(*
!
Delitos Informticos
B ( ' "
9
' * (
'
(!@ A
1" 1
$ ! ! $ ! ( )
'(
C ! / ' " (
'
' *
*!
$!G>K
/ * (
C
' '*"
" 2
',!B*
2 C *
'(
!
/ " 2 (
((F
! O/2*( 9
=3D)&$%$7)),
!B )" 9C
)
!B( 9
!&
" C "
!<2
2*
*F
90
'
9 E " )
9
!
! &! % .$$ % /
(
)
( '(
) ! 7= =, 3 ) =3D
*" ) *
' !
=3D C
' ! 7
*(#
*
(
(!
*
C '
!3 ((
"
( '' !
Delitos Informticos
E! $6$6
( *
* "
' ! B
' )
)*!
M!
5> $
' C
! / *
( *'!<
( * (
(
)!/
*"
! /
(
) *" C ! /
" * ! B
"
*
( 9 ( '
) ( '! B
* "
C
')
!$
("(
(
' (! B
' 9*)G
" ("!
+1 ! $ )!$.$ 8! ! $ !+
1+
/ *
" ( '
#
')*
J ) *( ! $
" '
C)*'"!(
( '"2*
'
* ) * ' ) 9
') C !
B
(F
/ C ' ) J
' * ! /
J ) #
(
'! / '
' ' * '
''(!
Delitos Informticos
B ' )C
' ('!/ )
( @!
* )
! /
C( C
*!/ )
('!
%!$
1+$L!$$L
/ / /( $ >$ ' ?
)
"*)
!& '('
' ' ! B
*
' )
69'!
*(
//!@@!(
* ) ( * C
)) ' * C '!
$ C ' ) *(
$ ' (
( A
) ! $
"*(!
' )C C"!
$ , *
( '
(!
/ * '
! 4 2 C
A
(J)("
' ( " =! B ' (
( (
! $
'
" ' '!