Está en la página 1de 125

Coleccin Seguridad de la Informacin

DELITOS
INFORMATICOS

Lima, Mayo del 2001

Preparado

: Direccin Tcnica de Normatividad y Promocin


Impreso en los Talleres de la Oficina Tcnica de
Administracin (OTA)
del Instituto Nacional de Estadstica e Informtica (INEI)
Diagramacin : Centro de Edicin de la OTD
Edicin
: 300 Ejemplares
Domicilio
: Av. Gral. Garzn N 654 Jess Mara - Lima 11
Orden
: N 228 - OI - OTA - INEI
Depsito Legal : N 1501132001-0899

Presentacin
El Instituto Nacional de Estadstica e Informtica (INEI), rgano rector de los
Sistemas Nacionales de Estadstica e Informtica, pone a disposicin de las Instituciones
pblicas y privadas, el documento DELITOS INFORMATICOS, en el marco de la
coleccin Seguridad de Informacin.
La presente publicacin registra en ocho captulos, la evolucin histrica de los delitos

informticos, los casos mas sonados de crmenes utilizando la computadora.

Presenta adems, los usos de las nuevas tecnologas, riesgos y oportunidades, que
surgen del comercio electrnico, como: delitos en Internet, responsabilidad del proveedor,
medios de prevencin y control en Internet y los conflictos jurisdiccionales.
En relacin a los Delitos Informticos, se precisan los conceptos de fraude y delito, se
estudia la diversa terminologa asociada al delitos informtico, se presenta las peculiaridades de
la criminalidad informtica. Tambin describe al tipo de delincuente informtico y los tipos de
delitos reconocidos por las Naciones Unidas, as como la estrategia internacional de represin.
Es importante destacar el estudio del impacto econmico y social de los delitos
informticos, las acciones de prevencin, as como las polticas y medidas de seguridad de
informacin, que incluyen las acciones antes y despus de una intromisin y la auditora de
Finalmente, a nombre del Instituto Nacional de Estadstica e Informtica, expreso mi
agradecimiento y reconocimiento a las entidades pblicas e investigadores nacionales, que
proporcionaron material y experiencias, para la presente publicacin.
Lima, Mayo del 2001

Gilberto Moncada Vigo


Jefe
Instituto Nacional de Estadstica e Informtica

INDICE
Introduccin
1. HISTORIA DE LOS DELITOS INFORMATICOS . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1 Casos Identificados ................................................................................. 7
1.2 Casos Annimos Sonados de Crimen por Computadora ....................... 12
. Resumen de los actos de Cibervandalismo ms conocidos
en el ciberespacio .............................................................................. 16
2. EL USO DE LAS NUEVAS TECNOLOGAS, RIESGOS Y
OPORTUNIDADES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.1
2.2
2.3
2.4
2.5
2.6

Comercio Electrnico ........................................................................... 20


Delitos en Internet................................................................................. 22
Responsabilidad del proveedor ............................................................. 23
Medios de control y prevencin en Internet ........................................... 24
Conflictos jurisdiccionales ..................................................................... 25
Problemtica de los derechos de autor ................................................. 26

3. DELITOS INFORMATICOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.1 Concepto de Fraude y Delito ................................................................ 28
3.2 Definicin de Delito Informtico ........................................................... 29
3.3 Terminologa sobre Delitos ................................................................... 33
3.4 Clasificacin de los Delitos Informticos ............................................... 33
3.5 Peculiaridades de la Criminalidad Informtica ...................................... 36
3.6 Tipos de Delincuente Informtico: Sujetos Activos Pasivos ..................... 37
3.7 Categora de Ataques ........................................................................... 38
3.8 Tipos de Delitos Informticos reconocidos por las Naciones Unidas...... 41
3.9 Fraude Informtico.............................................................................. 43
3.10 Comportamiento Delictivo Informtico................................................. 44
3.11 Delitos Informticos Tipificados en el Cdigo Penal Peruano ............. 45
3.12 Tratamiento Internacional................................................................... 50
3.12.1 Organismos Internacionales ................................................... 50
3.12.2 Legislacin en otros Pases ..................................................... 53
3.13 Estadsticas sobre los Delitos Informticos ........................................... 68
4. LOS DELITOS INFORMATICOS Y EL IMPACTO EN LA
SOCIEDAD Y ECONOMIA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.1
4.2
4.3
4.4
4.5

Concepto de Sociedad .......................................................................... 70


Efectos de los Delitos Informticos en la Sociedad.................................. 70
Efectos de los Delitos Informticos en la Economa ................................ 72
Derecho a la Intimidad .......................................................................... 73
El derecho a la proteccin de datos ....................................................... 75

5. PREVENCION FRENTE A LOS DELITOS INFORMATICOS . . . . . . . . . . . . 76


5.1 Prevencin ........................................................................................... 76
5.1.1 Piratera.......................................................................................76
5.1.2 Contratos Informticos ................................................................78
5.1.3 Proteccin y desproteccin de programas ....................................80
5.1.4 Propiedad Intelectual en Internet..................................................82
5.1.5 La Proteccin del Software en el Per ..........................................85
6. SEGURIDAD DE SISTEMAS INFORMATICOS . . . . . . . . . . . . . . . . . . . . . . . . . . 88
6.1 Desarrollando una poltica de seguridad .................................................88
6.2 Formas de asegurar su sistema ...............................................................88
6.2.1 Seguridad basada en la mquina .................................................88
6.2.2 Seguridad de red ..........................................................................89
6.2.3 Seguridad a travs de la oscuridad ...............................................89
6.3 Preparacin de la Seguridad ...................................................................89
6.3.1 Haga una copia de Seguridad Completa de la Mquina ..............90
6.3.2 Planificando una buena Poltica de Copias de Seguridad .............90
6.4 Contingencias Frente al Delito..................................................................90
6.4.1 Copias de seguridad ...................................................................90
6.4.2 Cortafuegos (Firewall)...................................................................91
6.4.3 Encriptacin .................................................................................93
6.4.4 Firma Electrnica..........................................................................96
6.5 Seguridad Informtica.............................................................................98
6.5.1 Seguridad del Entorno de Operaciones .....................................100
6.5.2 Seguridad de la red ...................................................................103
7. QUE HACER DURANTE Y DESPUES DE UNA INTROMISION . . . . . . 106
7.1 Compromisos de Seguridad ................................................................106
7.2 Cerrar el Agujero .................................................................................107
7.3 Evaluando los daos ............................................................................107
7.3.1 Rastreando al intruso.................................................................107
8. AUDITORIA A LA SEGURIDAD INFORMATICA . . . . . . . . . . . . . . . . . . . . . . 108
8.1 Concepto............................................................................................108
8.2 Objetivo de la Auditora ......................................................................108
8.3 Funciones ...........................................................................................108
8.4 A quienes se realiza la Auditora..........................................................108
8.5 Etapas para la Realizacin de la Auditora para la Seguridad
.........................................................................................109
9. GLOSARIO DE TERMINOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
PAGINAS WEB VISITADAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
ANEXOS................................................................................... 115

Delitos Informticos

 
    

 
    !   
       

    

    
        ! " 
#$%&     '( )( *"  $%+%!
" #$$ %
$$ &!$           
 
#(   
  ,  - ! .    (    ! /    
0)   )    -     !&121)
&34&53&# -# -6)# -7%!
'()* $+,* $ $$,  ) , 
         4,   8,      0  
 
  9 ) 
             ' 
(       * (     
:'    ;!&
     ) 0 !  (
 '"  3&43& <=!3&43&>  &)
  4   3 ?   
         )     
 9" '           (     ! @ *
     
*     *  (     
'  
   *  )   3&43&!
8   )      
   /  @ ! / ' *    

   ) ('    ! A   


    !
$ (      " 1(  . 1
4,             
        7  $   
  & (!
<      ( . 4,  '   ) 
)   (  *( 
   )  
 (! B  9" ( /   '      4, 
  C      '         '  
 *)        *  
 *!



 



Delitos Informticos
@ 8,  C    D*4, ( (' 
"1( . 1)* '   6(  
)*"   *     !B 
        (       
    (A  '  * 0 1B $( % 1 4,  E6
9 "  
     9 " 
    
9 C   )  C  * "  
*    
'       '!
&
  
     6 9       C ) ' ( 
 * "   9" 4 )&4 ) !B    
4,C(FGG---!,* ,! G ! ')
9 0        *! /   
    *  
 ' *   1,(1 ) '   (*     
  7  6!
$        
 A    ,         
       2 '     *   
 *   
  '     C  C         

  0 C( 17-H ,% 1 ' *  
    "! /      .
        D* 4,

"     I=J ,  C( )      !
! %-  0 J4 )   E9
  
1K1('     ' 
  =  <C( =&  ! %L# ) 
     
 " !
/ 0   
" ) )      *  
              

!/J4 ) M
9            ,(
  1 K1  '      
    ('     9"  
   ()    )"
'    (  *  
 (  9" ')
'    " *)   (
 !17  
=    " 
 $ )   *  
 1/2'4 )!1/*   
 ) *  1!B= 
 ,       '   )1!   (  
 
   4 )   @&N ) O9  
!

! %()&!$ 0 ,  $(L$)D*


<            
   $   <C( 
       J ! B     '     *   "
   *   
 *     ! B (      
      @=     @*        = ,)!
$             @= 9   
  
1 1   *(     1  4 1! & 1
 1  '  




 



Delitos Informticos
     :
;          )    

 ,   (  *F  @2
    *   9     
   = > (  
*(' $%%? )   ' //!@@!
. - >2     '     ? )   

 
 '   1& --,1        
   (  I  
 )$
 0!K 9 *$%+%)
     !I E    0 
 ' *@&N M *  (  

*    '   C
' 9)  
'  *   (         ! K     
  C  )      @&N ! &    K 
    
      E 9   ' )     @&N0  
 
  09     !
$$/!%/%  )  0 ,  
E)9 * (    '    
*(   C (     ! P<     Q  ('
      !
< !/    * !H   
    
  !BA* 
R  '&C
     !  *     
"  
 *   2F %   
       (     
      '  5)  (       ( 
("!< * )  (!
 .  *
  00 4   ' 
 (  1(1 9     *( 
J 
  
       (    )
       )     " ! B
2'2  (  ' 
    "    ) C 
     9       
   ! /    (      
'*"   "   *    
)   ' !& '/L%>/  
  ( ? 
  
 
      ! 4      )      9  
 
 M   *  )@&N   
 ( 
     ) 
! B         
    
) (    
       4     9
 !/(    4 
    *  !
&!$() '   
   D* <  ( *
 '    1 , 1              

'                 ! &
'  <  
   ' 
  '   
  )  9C !


 



Delitos Informticos

&('   D*4,  C  


   
      '  < =! J ('  1( 1  <   
   '    )"!<
 ,' 
   
  "     !
/     *'      C  6 9  
    
 1   1!S   )   
C    , !
  ) M* B4  9  (
) 4J%>4J%()?   
 J 
    (    C 
    )   *    ' 
' ! <       
  '    ==& >= =  &)  5
      * *     "
 )  *?! %  
C  '
  "'*  !
) 0$1   C   M 9  ' *" J    &
< 
 (      C   
 )
,  # & 
( '          //!@@! L I  $  J 
8 )&   *      ' (AI=J! 
L @      6 B*      

C 
 
    2  '  //!@@!
 $2"3 
    (' , !@
(       (         8M. E ('
  ' ( (    7$&$!
&45    '     , 
    
         

   C     J ! B   
 C     1< + 8(1    
 *    *(   HT )    
  F 67 $ 8! $ 1  !$9
$ 1  .:8! ; <  8! !
.1. $+5 8!  )= $ >  )<

           C  1! H 9 "  '
 ( C"  * 4,  E69  ' 


  ! B

  '                 '

4,
"( !
&  "      (   "        "
   
 !%  '
 (A *  
H  8  ,       C(        
 )      ! %      !!!   P) " 
   
 Q!
()4 $')$4 L )D*
 ( 
4,* ) %&    
          <C( 
4   9 0        9!     )   

C C      4 )  






 



Delitos Informticos
       (  /  @  ) 3,-! &  
    (A12 , 1 
  ,'   

* )"  :< 4 ;!
/*    8,(!/ ) 9  
  , 1 1      )  (  (    
     ( 9)(
(     @*       ) !
1  )  (      E 9      I=J )       )
 
 * 
     141!/  (
     (    1
     
1 )  1 9
  C1!$      
 "
     9 C !
4 
" (      C          
 )    4 J   A

       .
   /   ,  7  ) 
   % !
//9121     2 9  '
 ' **    2 
* !
B ' * &   
 '  I=J)
         *     *  2'  J    / 
@ $  3B!
B (   $   3 B 
   *    *(' 

      (   *  & 

"             
  *  ! $  C    
 *       4 
"
      
  
 (         
 !
I          
4          
    (     
     ' 13,
/2 1    131*     * !B
(                         
* 
      (              
  (    C  4  131 )   C   ' 
     (    *    !@
*            )     *  ('
         4! & 
 (  '  &   (  
* )    !



 





Delitos Informticos
 9"  C (     A         
2            
      
 *"  *   4 * !
5?! %%-$
E  !/  * : 
); 
*(   '
(     )*(  
 : *    *  - ; " !< 
  '    
  J8   9        ! / * 
*'             !
/ *   
) U    %-    J8        
  $   B
 '   !
 '* $
  *"   ( " 
 J %'(!    (   
     %- 
9  *  !
/  *   *V  (           $
    E
*          
)   
        
   ) 
 ( 
       C!
@ 
+111!
ABB* , (       *    
.  = 9   B   ! <  *       " ' 
)    CL
 !@*   
 
    9)      

   '   9   '!   *  
  C &
H   '  *     *(' 
!
/    J*('   J C     S 4 ) + #
( '   )
( J# 2 ('
("  '   !/ 
  .
 )
     *(' )   "         C "
           '       "  
(  )
   !
ABA  (   , ( 
" 
  9    (      ( ) -       
       '  //@@! /      '   
D.=*!
AA3   9" ( C I ,     *       
  *  )   *    J         
   
C  6          ! 3  M ( C 
   *    '!





 



Delitos Informticos
B *<)=)( . (I 
"  
 ( 
==&      -
 
'!/ E) M
<)=) ' ==& C    *!
%           
 A , ,   9!
AA2  C    9 
*  1 1 (           (      I   &
@* )*C )*C (*   
 # -6
  C     *  4        
  A
!
 ,       *" J    4   M! A   
     '  //@@! @          
*" !/  ( M   '     9" 
=$4J$%+%!
AAC  (   9 $   =, >
C? /  H( > ? ) *
=)  >?     J      *      
(    (     7 7*(    (      ### C
    ! $  (  )
 ,    *  #(  ) J
.
 (    * '6( !
AAD<
$7- , ! (    
            /  @  
 C(  C    #  # 
#
 '       C!/
*          
 *"      '      
6 ( !
    '  &
 9 J$
 '     (   8,         *   
J '  J         ' :=*   
$(    J(;   :=*    $(    / !!!;!
/   9   #
 
* 2  
  (   J      * I
,  <)
)! B J$ 2  '
( *  !
/ .  $  "       -  7*
 
    *   "
 :/ < ;!   
 '   <"  K 
7* ('       ,    "   
 9"  J   ( *
! ' -      
 =&$>=
&-  $?! &    
         
      !



 





Delitos Informticos
AAE  4)  (   ,    C(       " C
  C
&
 (F < ,
    0 (
     "!

B 8 (  4       *  ,      9! /
,        *  
(  # - 7 M!     
 *  
    
  #
  4 ! 8)     

     1  
  (1   (  C ( 
 !
< *,  "(   ')  "
("          4      /  @ !
B('  *     *  "*(  
 ! &     
      B  )   " '   
)    C   !7 

  
'
   
"
 ,   "*"J !/
(          !/( 
     ) )2'   
(
 '    *( )        * ! I   
   )   ( C  , !
&
  
 1%, -1  %  &    )  4 ,      /
<"5$(   MM C(! /    
A  )        
,         1J<5(1         A   J<
          C   )        ! / 
  *              2   (    % 
&     , *   M)  '  9
  !B 
'4 ,   7-H ,% 
"
( !
4  
 ('      (   (    5L34 )
* -       
' )*  
C E   ' !





 



Delitos Informticos

@FF / )    A


     8,   ) 
/   8,   
 "         J 
         9  ! 1B ,   5  
)  M    C     ()M
C
 1 4,    * ( /I/7&/
    ()*'  ( I 2W (!
1<      ,   5   C      1 !
18    M        )   (
   
  1 ,77!
     /I/7&/A      " 
   ()
  (
   
(   (  *   'A
!
@   *         ,   '  2 
           1     C
( 1)   9   !
B  C      <C(  ' '
J '55    C55   
 

     !
/            (
 
//!@@!)   (   E6
" 9)A     ) C!
/I=J
" *    

    
 
 2      *      )   " 
% 
  !
@2 (    C      
 A!  1B  '    J    "       *
" )   *      2
    "1  L
 ) 
 (" &)   *  (   !1/
*         
        
 9"1 ! 1  "      E ) 6       
 2   1!
@       2  C(    ()
         =    4  )   J
7  & ! %
           % 
! / 
C( 
' 
   #(#
( "!1% "C 1 2!>#(  
 
*'"  !&    )    ?!
    % 
 'C( )
 '( C( !17
 9  1  L)!1& 
 '    *         C 9   1! /  


 



Delitos Informticos
  * 
    C
   
 !B(     * ')
A  * )

9* "!<    * 
/ E  
      *  !/ C(     *
  @  <  J   
' 
      F
1XX8    .  7' TT XXB //!@@!  C   
   
 TT XX3'(   *     %-C  )     TT1! B
       !
/    7- , $     (     & W) 

' *      !W.*    

   (   ' 
5    !'
         C(    C C ) C  
    (    !
&
 (9'
 ) (A*  "* 
   (   !
B*  / @   *  "!@ 
,  C   <=2  ' 
  '
 E0           '        
       ,! B         
*  %-C)4!
/ 7 < ' J    J ' I=J '
 *  
 
       (  ' *! B
  I=J
 * 
2 (  1B1
         * *  !

!1  $   *.)$1, 1=   $


.G
&=5

 

1+

$

GEGG

B  9" C (      


J   ,    (  *     
"   (       
 
   * (   !< 
 '
D*4,!

1
!

0G0G

8,          ' 


   J  )   (      ( "
  !



GG

/ I & = &,     '   


    6     , ! 4   
C( )  F :=*    $(  
/ !!;

(51

G G

@C
* 
( , 
   *        
 *"C(*  !



 



Delitos Informticos
&=5

 

1+

 5

G G

7(   C(  ' )   


(   6    ,   
"'    !

.!

G G

/   
C   
  , ! :4 
"    ;! $  C   
  "!




EG G

/
   ( ":B7$&$ 
, ;!$  C  "*")
))
 C(!




EG G

 *    ! :7  


2  ( !;

EG G

/ "   C(  :=*    *  ;


  C     "    (
  
 C( !

0G G

&      (


  )  C( 
*  !

GG

BC( ! $/2   J 


 , ! /          
' J /%  !

6GEG

 "  (
  /@$! $  C     
*  
 ' D*4,)/  (!

GEG

BC( )
   , !

GMG

$ "J , !

GMG

/   *  
C, !

!
&'

G6G

B C( 1/ 4  <  ;  ,  M "


      "  '    
(   !


&

G6G

:=* C( B$<  ' 


 ; 
    ( 
L )D(!

"

6GG

BC(  ., !



6GG

XX/ *  (   , TT

'

0G0G

:.   , C(;!

0$!

G G

:XW     *  T;!

&5

MG G

/   $    J( $   /@$ 


, !

/ I

G G

/ C(  *     


 
:'  ;, !

"$

G MG

B C(    & .   ,  )


   "   
      
   ( !

 

5!$!$
H)%

G G

/ C(  ,    "     


'  %
   ! H     
 
   !

H




1$%1
I'
!.$




%.
1

1%
$
))





 





Delitos Informticos
&=5
; 
J
 

5!$!$
H)%

1+

0G G

/ 
  ,      
 6  ) '  *   (  !
:B
 D*4,;!

G G

/ %WI3Y, !>&A


/2 Y@&$?!

E G G

/   *  , !:P< /@$


   )
Q&
( %
;!


'

G G0

B C(    ,! 4   


  C(
 !

$$5


G G0

<C( L(&&
. ,BL   &  
J ' /@$!

#/

G G0

BC(  '* , !

H 

G G0

/@7J/I, !:B
 D*4,;!



0G G0

:=*      * )  ;!   


6 C(  J    ,    
 !/    9 & 
>   ?!

$
 ! 

 

0G G0

<C(   J( J    


        ! :W    

        ;!

$5$

 G G0

:=  ;>---!(! ?!

GG0

&+&         *


 '!

GG0

<C( 

2!

6GEG0

/    !!


#

GEG0

/ 
  7$4=B$!

H
1%

0GEG0

H * E C(     *     /@$


, !

H)%

GEG0

B C(      / 7* 


, ! "(
 !

(
5
$$5

MGMG0

B C(  :% D  8 ( (  7 


$  ;, !




GMG0

B C(     B   Z 


'          ( " 
!

 G0G0

4 , *   "!@


 *'    ) C(
  4 !/ '   
:8,    ;!

 4
 

)
I
H)
!

$



 



 



Delitos Informticos
&=5

 

1+

$

EG0G0

BC( 
 I
$ I

 ,        2' 
   !

I
1

GG0

3 ( :8,    ;!/ 


           '
D*4,!

I

MGG0

  &- Z  , ! B C(    


 *! <   * 
   
 !



G G0

&3>&    ?  *  


,     ! &3Z  42
FGG---!! ! 2!

' $

MG G0

BC( ,, !

$5% &!.$
.%

6G G

B

 A
  ,       
   '  J  !&
'!

"

G G

B C(   '   . 


, !B
 D*4,!

$

0G G

/    I   1I  71 


, !

@FF5

GG

<" 8)- , !

1&99

0GG

 < , !:H  ;!

+
I'%

6GEG

4' B-,)!   , ! H    


C(!

&!%?&I

6GEG

4  4'B-,)!

EGEG

<C(  4    2    . !


I,     
       (
    C 
  !

6GEG

8= 6     


A 
,      
   "   )   
/@!

MGMG

4 C(    ,  )    


     C(  '! %
  C(
 =
 &   3 )!  @ ! 
 ) 
! !)  !

EGG

$  ,  >   C?   



      (!

0
EGMG

8,   )      C(


#
    
"!

;'


"5

!
K
#
&$%.%

;$$I5
%!
& 



.L





 





Delitos Informticos

@ H 
H 0
  "M

 ";& H

/ " *("
(
 *    
'!&

                   
A  
    J     C     
           
    
    
            
   (
!
B ( J    
  " B) ' 
               C
  
  )       2    ) 
   2  !
$  *        

(  (F
   '
J 
4   ) *'
L
    *    
  
< 
 C"    
@ 1$+
/         '  J 
*)  (          ) 
   *
( 
 "   '
      '        
'!
B                -
   A  
  )   
 * ( C)* 
       '! / *     *  
 
*  (       
     $  ) 
<   J  !





 



Delitos Informticos
<      
           " >   
/ '/JJ ? ' C  "
 ' ') A ' 
          !
B   )'() (      
     !/-   )   C*  
 *  J            
    ! $  *  
 '        A  1 - 1   (    
         ( !/  '
   
 C   * *   *!
7 
        C
  2*    
 'F (  
   (  
     
 A
) ' (  * (  *
 2( C '( (  !
B ( (     
   '
         
     * 
   
5  
 * !/  *
       9" 
J    
     * 
         
 C       
 
 
   

  !

B    


    *  
   ' 
(   (  
    A      
  *C !
%

 
   

 '    ' 
     
*   
  !



 





Delitos Informticos
<       )    'J 
 *     
           (
F
< '   <    J  J    9 ( C  -
 "
   >2( C( " !?)' (
>8%4B$W$.J!?
< '   J 
/
        
         ' 
 
&   '(      (   )
  '  '
    ( * 
4   *'   C
C 
 
&(   
  *"

@@

$
/
   * 
      ) 
C
      
         
*  ! /     (

(         )
   '       
)  '  
 ) 
   '     
  !
$  *  ) 
  (  ) *  C C
     !
8)    * )  
  J    
(        C

      )       (  
  *  (' ( 
  )     ('!
B     (') 
     J (  





 



Delitos Informticos
 
         "   (  
     
    ) '         )
    !
I     (    *         C   

  *   !/    (  C   
(      )
   2 '!

Cuando la autoridad sobrepasa la confidencialidad


E l program a utilizado por el FB I, "Carnivore," usado para asociar e-m a ils con posibles crim inales,
est causando m alestar en cuanto a la privacidad, pues el FBI tiene una autoridad ilegal en cuanto
a acceso de e-m ails de cualquier ciudadano, tanto com o al de cualquier crim inal.
http://abcne ws.go.com /sections/tech/DailyN e ws/carnivore000712.htm l

<   ) ('"J 2' (


 >? )   C (        

    (  C          *! /

       )
        *   ) ' (  
 (      !
@3

.$$)
/2 *   
   
'  
       
     J     
   ! /    2  
 
  '  *    )
    
      
  *('  (  !
B < *    & *  $  J  ><&J? 
 
    
 
(  
!
<    $  $  I  L @  ) /9  (   C
(    )   
  
 
*            '      *(   
  !
<       (       <&J       
 " 
   
      *   '
C C    *  !
L    
             *   
 (
    
  )     ! &         



 





Delitos Informticos
         
   )    *         
2 
C  "    
 * 
         
"        ### I%< 7- ! <      
  '   ') *  *   
      *   "    "       ' 
 !

FO RO: es un espacio abierto a la expresin para intercam biar ideas donde cada persona
presenta su punto de vista sobre un te m a que se abre a discusin. E n el foro existe un m oderador
para cada te m a que da el punto de vista, se puede opinar libre m ente sobre cualquier tem a; este
servicio se rige por unas reglas, en caso de cualquier ano m ala la institucin que organiza el foro
se reserva el derecho de censurar cualquier m ensaje enviado.

/    
              *   
 
 )2   
   !

B 
   <&J' 
 "       
    2     "    )    
  
   '!
@2

$%)+
B  *      J  )   *     *   
   9   *           
   J ! & 
 (     *     
 
      
 ) *    !<
   
9 2    
   
  
    "   !





 



Delitos Informticos

$( "       (' )    


    
   J    *    *          '  
2(  *  1 2)1C( (   ( 
  (   1( 1   !
B   <J& ><    J   &    ' 
  J ? ' #  # #
   )
  )    
            
  ! <J&     1     J    1 C ) 
     '  
    )  (    C
 *      *     "    )  *   
 !$ )   "  A ( ' 
*(  >
- ? J  4 /2  )7)

)     (     !
B     (           *      J 
 " (F
/
    * )C  
  *
  ( * )(!
(   '     
     
    *   )               A
 )
 *   *  >###I%<7-!?!
J     A
 *     
2  "         !
<  *            <J&    
  
 *!
/
     )       )  
  ( )  !
    (   
   *    2     " 

         *   
 !
@C

$L!$
/C
(
   (   9     (  
J !
J (   ( 'F     J 
9     
     (     *  J C
 !
B   ' 
     '  )     
' 
       -       *       "
  *      2



 



Delitos Informticos
    '        (         
!
@D

&.$1=$ !
B  '    
 *   
      
 ' )   
)

    
    
 * C
       
   '  
   2'!
<      
   
 
J    ( 
         )
  * C

 
      
      !
@      *        D '   -
   
  ' *        >FGG---!, ! ?! /
     
"   "  J 


    ')  ' 
    !3  
  ' 

' -
)' (!
B*'  C 
 
     !<
  C
   L(  <   J
   )       ( 
  
!
<     )                
   J         - ! B  (       
)   C*   J 
  *( 

 C !
B    
F

#
 #   >        -  1 1    
  -  
       '   )  
       
J ?

I%<# 

 JL# 

.  #  !


 



Delitos Informticos

<       C 2          1 ,1    9
 (     *       '    '     
'"!
<     -  C
 J !B(  
            '  (    
  
  C   ' "    
      *     )  
'   L34    
'    C !
<         
)   ')
  
        *             
-  )  - ! /                  
*      !/(  C) 
     C
 
   '      )  
  ' J.W      C!



 





Delitos Informticos

3  

3 !% $
I       (9'  *    !B
'    C   )           
'   *   ) "!/ 

  " 2'2 * ) "     )
 ()
 "  !
/  " [  ' ( <   6 $ % $ $  !
1$!$$$%6
/ '        )   C    
( !/  ( F

/  '>' '?!


    "    '    
 "  
  (   "   ( !

   (>(   ?   )  
"!
/  
 
 >'?>((?)
' 
    (     !
B' '  
  !

B  "         (     (    
(  F

L

     !
9   !
%   !
< *'( 
  !
/
  !
/  !
B*'   !
B'   !
B *'  !

 '      *' 


"  C!





 



Delitos Informticos
3@

+ $1=
/  J C   *       
       "         
(  "   C        

         

!
 ( 
   
  
        
('     !
/     2  '      )    
        2          
 C! $A    2  '   C  *   
          "!
:  C       "     
   
 J C
      ;!
1        '(           
*          
   '   '(     
"
1!
1$      )     C    21!
1B  ' '    "  
 * 
    C C 
 )
       '1!
1/            '(         '
 (" ')     ) 
   C "   
)  9)    1!
1&    "  "  ) 
          
   1!
1& "      1!
1%     " 
           
 
      C1!
1&      " 
          
< )     '  *               
 '1!
:$  C "   (     C   
  "  
'         ("    'F 
 (     '   ' '!;



 





Delitos Informticos
:      (    
          
     
   CC '
(*     A 
' *  
 " ;
:B  '   '    
  "         *   
    
  C)G C*        
 C) - - ;!
:%  " (A)*(     
 C     ;!
:   (  '         ("
 C   '*(') ';
:  C C     "         
    **  (A     ;
:/    (      
   C  )G  '  ;
$(      

        :  
;
  
*' )   
* 5'        *    !
;/    (              )
       ("  C     ' *(' 
 '   
 !
@'     C(F



'G /          C   9 
       *     )G     '    
              A
   * ! /
  , (1   1!B18, 1C 
 C (   '*   '         
'  (  ('    *  
A
   '          
A
 C         (    )    '  
           '       ' 
 
* 
     C  *  !

'G< *2 C 2 '1 , 1


1    1        
   
 '   
   ' 
     *  V   
  *   C) 
 '
           )        (     



 



Delitos Informticos
 (   *  -     * 
 (       !

& ' <   (     '      
 '    '          9      
       
        '    
 ' *      *
      
' !
&      
"  
!     
  '  C  
      9"
'!
/   
        
      '
  !$   
   (   )
       
 '
 '*! @        
 A   
  !
     
     
 ' !
&  C       
 '       
 * 9!
/ 9  )2"  < ,  ) 
(  *"    $%+%! @   C
 << ,     C !
8(A   ,(*    
   
    , V 
"     
        ,(  

* ()   2 '  


 
 * 
A!
B    '            ,     
  
 A   ( 
"C  
 (A  A
 )       A        
 
    ! @ *  
   A   )  *   '  
            (         
        (     
 !



 





Delitos Informticos
3   *  
A    '   < < ,   
 (    
   
         9"
'
    * !

   (   9   
           A
   * 
 * )  '!

0!'G / 


  *   '     W  ) 8,  ) 
      (        
'   )  9   ' 
 (   )  * " !

& 1=G /         *   ( 
 (   -     
 (  C   (      "
  (     "                
' C     )           
 ' 9   (  !

B    C2   ( 


  *    ! /      C C *    
    )    !
<         
) 9" ( C
C2    C!
B   2      *  F

B  )   ( !


B  C "   !

$  (       ( '   
I   ) 
     )       ( ! $  C
C    )
     ( ' 
  >  "   '    '  ' 
     
       * )G  *  V )   (A  
 (    ( ?!
< 2   *     " ' 

               
     
 ( ' )       ( '      V
    2   '       '  
  )  *     '  !





 



Delitos Informticos
33

1$5>. $
/2                   
 F
1   '1 1     
   1
1 " 
 
   1
:          1
:   C; :      C;
:

 C;
:  
  ;
:  ,  \;!

32

$+$ $1=
@'   C
      
   
*(F
N 1!11/( "   
  *           >     '  
(   "?  "
>       
"
? ' "  F
?

?
?
?
?
?
(?
?
?
?
,?

I'   *"    >    !?!


W ' *)*'
   !
<' '  *> 
    !?!
:L
;      !
B  '   ' !
4 '      !
$ *   
   *'   ' (         
         >          
  :
 % );?!
W '  9     

 '     :  ;!


@     (   ' !
J  '     : ;   '(    
 (   
 
   
  !
$ '           *     *  C
 
*  C!

@N 1!.L)/( "        


*  (               (      
"!$( (F
!

4'    * 


" CV



 





Delitos Informticos
!

$ ) '    C    


V
E! @ '       )G   (        
  ' 
 
 )   V
M! J  '   (               
 '  (  V
6! @ '      )V
! $( '    *       ' )      
     !
! < (  '    
 !
0!  '  (      !
! 9   !
! $  "    C     >    
!?!
! &
"     )     
  C(    !
! &    ((  '*
>(  !?!
3  '     (      C  
(F
1.
2.
3.
4.
5.
6.

Fraude por m anipulaciones de una com putadora contra un siste m a de procedim iento
de datos;
Espionaje inform tico y robo de software;
S abotaje inform tico;
R obo de servicios;
Acceso no autorizado a sistem as de procesam iento de datos, y
O fensas tradicionales en los negocios asistidos por com putador.

/*     / @     


    C:  5  ; F
1.
2.
3.

Introduccin de los datos falsos en el sistem a y m anipulacin de datos;


U so no autorizado de instalaciones y ele m entos fsicos de los sistem as inform ticos,
y
A tentados contra el patrim onio m ediante com putadoras

3 '(F
! ' *  CF



I            


/J C) 
> ? - V
 CV
$ '  *
$     CV
I   CV



 



Delitos Informticos
! 3      C       *     F
     ) *  !V
E! $     C    * F

$  (   V


$     (         
    C )
    
$     ( '   C       
*    !

L         C     )  
    *   )         '  
          
  )  '     ' "         
   (      !
B '   '       F

1.
2.

3.

A lm acenam iento de los datos o entrada, que es el m o m ento en que se introduce la


inform acin, en lenguaje electrnico, a la com putadora,
P rocesam iento de datos o program acin, que se refiere a las operaciones
secuenciales que debe seguir la co m putadora para dar solucin o respuesta a una
orden especfica.
Transm isin de los datos del proceso o salida, que se refiere a la inform acin ya
procesada, y se presenta por m edio de co m unicaciones o accesos a perifricos en
los que se archiva.

/     '            
(F
!
!
E!
M!
6!
!
!
0!
!
!

/  > (?


/
 % )>% 8 ?V
%& >& L ( -?V
@     (  1*1>& (?
%  >%  ?V
=
'(>B(=
?V
$" >$) $,?
B  'L(   '  >&*(?V
I(  'I '  >B,(?V
&
 ()&''% (  ><(()
,(
J  ?V
! J ''<  "># %(?
! & ')     >&  4 (?!



 



Delitos Informticos

3C

&!$$1$1=
/ " 5     C  ** '
     >             (   C
 ?    '  *   
   
   
*(">*  C 
      
      !?! <          C 
(  *  
 * (     !
 ( 
        (     ' )     
(        C  F
 
2  (9  
 C)

   
  *       V
        2C     
 '  (       )     *        
'!
<       *'(
( "  "  )
!/       
       C    
 "   C! <          *'  C    
    * )
'  
       '            
( ' *    !8)   
          
 9    **   )  )  !      
  * C)   "  '      !
            C             9

  
 ) ( !$    
   C
*  9        (      C ) 
    (       

     1
1! * 
 9     
     "5        *   "  
 

   *  '    C! 8 ( 9   '
              !/
 C  
 
  < 

       J C ] < >J? 
'    * 
F    ]  >    '   
  C?V3   ]3>     (   
  C?V ) 4*' ] 4 >         

        C?!

B        "     
    *         (     
 "  * ! <    C   *  *"        
       *           
     ! / '        A   
   )'      (  
 **!



 



Delitos Informticos

3D

 $!1=G!L
)%&)
!L
)   "      A 
      *  
        
   C ) (      ' 
      ( 
 (    '  C 

C

     !
           
          C 
) * )   "      !
  1 1 J C *
 )         '    *"    
 !
/ * "      J C      *  ) 
 ( *      C 
    
   C       
*  )       '(   "    
           !
&
 (   ")    
   1   C1         (   
1   
1             *       '(
   / -&  9 ME!
/     '( 9  A           
1  
1A    C 
     "     )      
   
1*) )C
        ( 
 
        *'     
   
 '    1!
$      '(        '   1 
 C1      1   
1        
 (         *       *
   ! /     "   A   
   
F   *           '  
 '    2    
      
'      
 '   
  '     (    
 
 !
/ "
   "

  ! B1 ( 1  ) V
  C 
  )     '     '    
     9 '   " V 2  (      
' A
 
  9       V     
             ( (  
  *          
  "  1 
1!3    



 





Delitos Informticos
 (    
         C    * ) 
 ** 
  !
!L&)*"   
   '
 '  *) 1  C1*" 
     *      (
       
     '(    !
/  *          )       
     "       C  
 
 *       
        

  "               
*!       1    
    *    (   
1  C1) )     
 
        
1 )          ) 
    *"    V      '      
        *( )    "   
 
 CV           " 
 (             )     
'    C   "

  (
  1  ( 1!
3E

5>
8!
@       '         ' > 
C ?      "  (   
*' (   >   (    
  (" ?!
B" (   )C  (    
        9       (      
 *)   (    !
B      (                    
      '             *  
('                    *  
 !@ C  '   !
B ( "(    (F
!+
B  '         (  
 
!/
 
  !/
          '  
  -       "
 '!





 



Delitos Informticos
+
@  '   '               (  
 '!^  
     !@    
 " (  (   *!
+
@ '  ' '  
 '   
  C ! /   

  (   ! B      "   

 *  *) (    ' 
     !
.+
J  '  
       
  '!/
  !@ 
 "  '    !

Informacin
fuente

(b) Interrupcin

(d) Modificacin

Informacin
destino
(a) Flujo Normal

(c) Intercepcin

(e) Fabricacin

/( "  (     *)


*F

8!&)
B  *     
 *    *    
  '!B    
'  '   ! 
       F  
 *'      ) 
C  C!



 





Delitos Informticos
/    "           '
   '      * ' '   
 '!
/ C   C  "  
 *'        
  (  
 '  )    ' (A
        '  *   ! B  * 
"  
         '    ' 


  * !

8!
)
B*)(  '   '  
!8)*  F

1. $  $


1  G 3 
        
    !



Trabajador de una
Empresa X
ingresa con el
Login de una
Empresa Y sin
autorizacin.

!$+  G $ '


 ' J '!

+G      '


(      ) **   * 
      '!

Login:
MACSA



 



Delitos Informticos

3B

5+  )G J      ' 


     !

11 G $      


  C (   !

 $1=$H
$

>

!111!$+1!
!$+
/       C   
    ' 
$      J C   A )   C 

   ) "  
 ! /       
   C )           (
       
 '   !

1!$+
51

/ ) "  


 )   *   
 
 
          C!
/     (  2  
         *  (    * ! @
   A            
     (  '  C      

% )         

     (    C         
'      ' !

!$+
&A   
*        C!
$ /   C  A          
    
$
 C    '      
         '  ! %    
  "    
  
 
 (
    ) (      
         '  '    

  (  


 )     !
!
!
1!$+
1=

$ *    C      ' ! /


    1 '1
1   )1 
   
*     )   !



 





Delitos Informticos

$1=
1.L

               
    !

1
!1

B          


     
       !     '    
       
  )C  ('
* ( '        ! /
      '   
               
   ()        
'2        !

O1511!9



.L
1=

/   


              '  
       '  
     
   !

0!

/     *  (            
 (   ("  )  (      (    C! @
*  (       (  
 '(   "     

 % )!

"!

&
  C(*      (  
("              
      *       (  ! /  
  "  (  
(  
*    (!$ 
  
 (      ( *        * F 
  (  (
(     C  
         C  
   
     "!

#1. $+5
$+5

/2(   )   (  ' 


 '   '           !
$ 
  *   *    ( 

 '( 
"       2V       
*  C    

 '(   
 C2   9!& '  (   
  C2   9) ((   
 )    !B

'( 
   
       2 ' )       

    (   

!


!9
1
)

<  * * F               
    C >8, ?   
  
 C!



 



Delitos Informticos

3A

&
1=
'

/A    ( 2    


        *     
  '! /     *    
(      (    
   

   *( (      
  ! $       C     
  ("              
      9 
 9   C  !

!+
!9
51
1=
+
5$

/    9      '     


   (" ! $(         
   *   )        ! /
 
             C 
           *     
    ! $       
  '        (    C    
 C 
    
  "         
!

!1=
        C             * 
(  (  (  *     F

1. Fraude inform tico propia m ente dicho.


2. P roteccin del derecho a la intim idad.
3. P ropiedad intelectual inform tica.
4. A cciones fsicas contra la integridad de las com putadoras.
5. Las acciones de los "hackers".
6. Los virus inform ticos y progra m as anlogos.
7. La sustraccin de tiem po de co m putadora.

 $ 5!   A    


      " ) ' C      
 ('    )    (    '!
B      (
  (  ( 
CF

J *'     !

J  '       (  !

4 '    '   !

J *'"   '  !

L5!@%3     ) '  (  !



 





Delitos Informticos

$5!2 ("       


)

!/ 
       - C 
  
  F       !) 
(      ! / 
     ) *   F   
*        C* 

 
<@

 C  * !3
*  
2*    C) 
    !
$5!C    1, 1      * 
  
1 91)(        !
<     ) F
B  '        ' 
  * 
      
 C  *  !
B *      (            (  
      9 )  
!
$
   (   *             
    ) (    )  
   (      
  
 C  " ! /    (           * 
  
 "!
$5!D* *  C>* 
("(
         (  A  *
 )  
     

 (  
   ?! /2    * F=( > 
   9? 4( >  )  '      
 ?! & 
            C ) (     (   
          *   
    (  
     !
$ 5! E   *            
   !     '    '  
             
 * 
C      *! <  (   
   ' !
3F 11 $)1=
L1=P!$1$N
//J C>    ? 
   1
'
C     )    '   C  *      C '   
      1          '     C
  '     (   C ( !





 



Delitos Informticos

.L1=
/&
J C 
      1     
       (    C   '  
   
       C    1     
   (         *            "
 "
      )      
  "  1 '1
     '  ' '  *) 
     
' * ) (   *
1+1=
         '      ' 
     (      (        (   
                   ' 
  '       !
$"     &
J C
J  '     "V  

 '  
           C   ( 
'   
A (    ( 
          ( *!
3 $1=$+5&$&!
/   "  B)E  
          
 C' (<F

>!$ @FEQ?
? /     ( 
 
    
        
              
9               
    ' C     
    C     
  **  
    )    9    '   *
    '   !
&(' 
 
'  C    
 ** 
   )   9 '  *  
     !

>!$@FEQ?#?/ (    


  
  
      (                    
   9     C     ** 
   
  )  9)* " !

>!$@FEQ??/ $ "[5$)[5= C **



      )  9 F


 



Delitos Informticos
! /( 
          
 ' *( 
 ' (!
! /(( (   !
  ' (<( '  
    C )       C     (   
 CF
N $0$+$1
/ " 6MC  *'   
F
:*    *  )  )
 *  
 (     
     ( *     
         C        **  
   
)    9! B   C       )     )    
 * "    ( *           
 *;!
/  " 6  F :   
    (       
  *(   *" ()
     *       C    C      
 **  
        9  )     9! &  ( 
  *  A
)     ( C
   9 )  
';!
B
             C      
:   *  ( ;    "     
*'            C )   C   *   *
  ' )   '   *  (   *   
*(  !
.N $  ! 5) 
 $+  
$1=  5$ % 1$ 
$)
/  " 06 
F :   

   *     ("  
 
      
 )   (      
 C        **  
 
      )     9! &
 
 
 (" 
(  ( )       
( *  '  "     
  (;!
/  " 0 (  C     E 5
   )E 5   C




 



Delitos Informticos
:   C       9  )           
    '         '     
 C( *'   * ;!
/     ( *        '      
  *   C!
/                   
 )  C
     )     

    ! /          ' 
       '        
  ! B *     ) (         
  
     * ("

* 
   
 :
  ;   C 
   (      -  -  )       
 (    !
@       '       
        )              
     )A
 * ! : C
 ( ;  )          
 
        C) J 
   / '    !   :  
*  ;  C )   * '  -   * 
(    ' (* !
N $$+ !11=
/   B(* 0        B)        ( 
*   
      C )     
   )                C! /
 "      
 F : ' )   ' 
      )      ( 
'
                 A
   
   ' (<;!
/  ' ( <         A
   
  
')  '     (F
? I'   ! $ " MF :/          
        *          (    

(' *   
  '     
 C             (A      ** 

         )     9!!!; % C     
(')G  '   !
? I    '(! $ " M0F :/            
A
         
  
   
  '      '  
 *    C            (A    


 





Delitos Informticos
 **  
          )    9!!;! B   
(     A
     *         
      '(     A
      
(!
? 3 '   ' 
   !$ "MF:/
      A
   *     
 "   
2   ( '    ') 
  (
(' C     ** 
 
     )   ;!<      ( ( *
 
 )(    )!/ 
     
            A

>         ?       ( 
' )  
    
     ' 
  ) 
  "(  (  *!
N $  !  $ 1+   L!>  $
1$!.1=
<           C   
  
> - ?      >-   '
   !?  ( 
*    C(A  '   " 0[
0 ' (<
F: C     ** 
  
   )   9 '     

          '     *( ( 
          "       
    (F0?@  *   
    !/(  "    
 
  -  '  C -  

)     " !
N $$ !I
L       -  
 
1!!!
   " )    

-  )   ( ! H           
   
          ( '  "     * 
 )  '  ( '          )  
    
    

    
1!
  '    B(* 0   '  ' ( < )  
   ('   " F
? / " 
F1 C     ** 
   
   )    9 )     * "5    
   
!!!  ( 
'  *    ( ( C
2              (   
  ' *)       !
? B    !




 



Delitos Informticos

? B             !


? B  
)  *   A
!
? B      A
          
     *    *  !
? B      
)  ) A     
 !
? / $ "  0 F 1   C  **  
        
)  9)* "5  F
?&    
  *( )

                (  

   !

? B   '  


'   ' A
      
   '     
 '   
       !
?  ("    '  
)A

        " !
? & (          ' *  
  )   *     
 (    '    
   
       
   V            '  
 (                     A

     !
?& 
L(    $  
   
     *       !
/  )    '
     V 2  )  
 )  " !
? /$ " 
F1 C     ** 
   
   )    9 )     "5    
   
               C  
    2               
  
)  
)   "   1!
B  '   "      
       
 
-  CA'( 
) '  *  C ) 
  J !
*?/$ " F1 C     ** 
     
  )  9)*  "5 F
? S   
)           (    *  
       (    ('       )
  2 )    
   
' 
(     


 





Delitos Informticos

!!!

        '   '   


' 
 
   '   '  '        

 ( !

?&(     *!!!   


  *  A
!
@       -  (  

L( 7   $  J7/3<J  
  (    (             
 !     '  (
    
    "   ) " 
 
 ** 
  9!
N $O$.$$ I
/$ "6 ' (<
F: 9  ) 


 
   C     ** 

   )   9)  "5 ;!
3@ 1$
3@51$
 A 9   C
  
* "5 "   
   *   
              (     (
    ("!
59+  + % $$ +1 P N /
0E '      
      )       
 )    
   
 
 (   !
B
 '    C C
  )  *    )  (      
 '  " 5             
 '         
   ) 
  '!
     3/  0 
'      : 
J CFC  * " ;   9
 
(**()     * / 4
)
  
   "        
    "
 " 
 ) )>B4" ?   
   )  '  C   '   )  (   




 



Delitos Informticos
    
  C        ' 
    )    '         (       
 ( !
B ) "   
    ' <"  J '
    )     ' 
   )
         
  >B *  *?
  C  '             '
        (         (     
 
     )              
   !
 
          '      3/ 
  /  '      
       
 
    )      (*       
  
"  
    ('  )      
"
( 
*  
    
 
  *)    '!
B  "         3/   '   
 
9    
 
  "'
('!/ _/ /2 
  
       /   
  
  2 '   )  ' 
      
 '        *"   
     *'
         *(' ) '   

  ) ' *(')  ' 


 C!
@ *           
 '      *
 /  
'   'L>0?
 
 C1   (
  /  

 (     *  ('      * 
  
           !!!! ) 
      (  1!/   '
     4   /  E 

 0!
B       (    )   "  
   (    _         
 
       )  
        "  
*  
)    
 ( /           (   *"  
 *  '!
$      3/ 
 '        
(       ''   
 
/ )  *    (    (    
  C  9!


 



Delitos Informticos

59+  $  H PHN /     3*
(  
 < *'   )  < 
     
8
 
           C  
  )            " )

    ") 


"    ' 
 *!
$  C         
" 
"  "   '      ! <   * 
 
 
    5    5     ' )  ' 
      (    C )    
     
 C  
"          C   
        ** *  !
/( 
"( A      C
 (  !
<  *   C ' *)

            '
      "   !$
   (    '   
    )   

  (             )       
      !
<        *             *
     
 C 
9  
 
    '          C ) 
    
 F     
     
 C   '  "      *  
      )   
 C        '   *(  
  C! $        '  
  !  2  '!
/    
   *     
   C     (   "      

  (  
  )'  !
 
 '   (  
 C      
*    '(        
  
    !

+ $    &$ /    


 
   #
 (  ' *      
   C! /     
      
            
 C   *  
 '   '    2    '   
*  
    '      ! $  C  *
 
 C   )   * 2*




 



Delitos Informticos
' 
 C   2 
                       

     
        
     
  !
     *   
 (
    C ) 

   *  9  '(   '
  /                 "  ) 
 )  
   ('*('
  
    1*1 
 '      )   CV "   
           C 
*         ("    ' )   *' 
  !
$  C  9  
 C

 9
 C 
  
 
  

 
'  *   
 (      
 
    
  

  '!
3@@ 5$+&>
<"  ('     
 
 
  
 (
  
            "  '    
(  F

" 

%@CF3DRAB& &
 H

4 "   " ` M` ` ) 6 
 '  "66
B)7` !E!
G3
 M  0%&1!$5G7*
  0
#G G G0
$%=1 !$+
5!
5!9 %G

>!$ S 5 4 "   " `   B) !E     C
   (  F



 



Delitos Informticos
$ " `F $       )  
 "    )
 "              ) 2'    
 (    ')
V     
 V  
  C     C5 V
 ( C ( C) " V
  
 
   V  )
     
  V  ) VC( "( 
 )
(  V   '"    "   C 
        '!
B  '       
  C  2 '   
        ' )   C    
      )"!

>!$ @S 5 J '     ?   " M`   ) !E 
(2F
$ "M`F!!!
? B   "   "  )        
 
 (    '
    (    '
  9 
 *'  !

>!$3S5J '  ( C   "` ) !E
(2F
$ "`F!!!
S) 
      5
   (  
  '        C      A  
*(     (   !
 
 C  
     '  
  ')   ! B   *(    C
                        ( 
 (     '      (     * A
  '!

>!$ 2S 5 J '     " 66


   ) !E  (
2F
$ "66
FB2'    
 (   
 '  C                
  '!

>!$CS5J '   "6 ) !E(


2F
$ "6F<  (    ' C ' 
 )     ( '!



 



Delitos Informticos

>!$DS5 "<  /*!


$$ /7 B$ &$B$ / &/&J37/& /B 37.L/&3 $L./7%J73 /7 =@/73&
$JL/& $ B3& $%3L/ J$& /B 4/& / 3%@=L/ /B $a3 4JB
73W/J/7%3&73W/7%$H383!
5L/.J&%L$3=$3/B7`6!E5
$B=/L%3L! <J/LLJ! 5$LB3& I!L@D$@I!5/  8! < )  $  "  < 
< !54 B!< !
S3FERAB
=!$!G G0
& 
G
%(   B)   7' 7` 6!E A   " 
"
 '7 L( 3) "*!54/7/4!5 ($!
L "( !5LA/!. 3 !
DCRA2&$!$?I%.?
&+?1!
IFE
  M
<
'F=!3!0GGM
(F)7[ !EF 5 MMME!

>!$Q?$ '    )   C


 **(  F
?&  C 
 - "  
  " [
)7[ !E  "  *  
(2 F
! B 9(     '(  
   'V
! B  (     '    * ' 11
              * ' 1
1
          V
! B  '       2'   
        - !

? &   C   


 
   "    ( "  

        "       (   
              
  )  '  )  C!



 



Delitos Informticos
? &    C      '      
  -  

        (         
 
        "     (    
        
 
    '!
?&   C
 -  
   C

    ' A
( )
      ' 
 A     
 
          (        ' 
 2'!
?&   C
 -  
   C
      
   *
 (  '             
    !

>!$ @Q? <       (   


 
   
 
) 2'        '     C
  2      ) '        )
 ( '"     "   )
(  *    
)  ' C

  !

>!$3Q?<     (  


 -  
  
 (   C        C
 
    )
      2    
   ( * ) 
    ')(     *  ' !

>!$2Q? "!54 R4 



 / $         
   C)
     (  0 '&( 
B)     /'   6  ) 
0 ( F
/  >?!
/ C>E?!
I'    
 >?    
           (9
 C "   
 '     '( 
 > E?!
$ '  >EE?"      *
*
!
&
 C>EE
?  ' 
 '   
(        '     '  ' 
 '    !%

*!
@ '
*     >
?!



 



Delitos Informticos

<    C ' *


*           * C(    
'(9'   ) '  (9
   " (   
     *
2 ' (       '         
     
 '     
   '     (     *    '  
         '         
 *  *'"!
&
     
     '      

* 
  <"/ *)$ !
/ '         (    C      
A   *    *       (  
 / @ !  '  
    '               
 (         
((    !
/    $    9            *
       '            C 
(
  *  2     '   
  *   
     '            
9     9       '   
 '   "      
  "      
 ' 
" !
I   
'     
     '           '
 *C
'    
*  '    ')*  
    
  '    !
<       
 (   '  (      

 "   *   (  
     *(   *    ( '     
 '
*  C!
/         *      '      
 C   C ' * 
 " 
                
   '
                  9   
 C!



 



Delitos Informticos

H 
B)    ' (<   
  0!/
) ( F
 '  > ?!/ "
(  '     

 ) (  !
/  C > M0?! /   " 
       
          )       

 '   C * '  (  
  '' '    
 
     ! $  C      
    '!
 

>!$ Q? /     ) 


      '
    

     C 
    (     C2 !
&        
         C  9  
  (   C2 !

>!$@Q?/C        


  
   '               
     C(     (  
"   !

>!$3Q?/    9  )  


      ' C(      
(    !

>!$2Q?/   *    


   '  C     (    !&
   
    '
  C(  !1!
H  
 
 ) V   A()
* B) LA
!
&(0 4)  E!5/7LJS@/DL$@&&L@&S@/W   
LA
!5I     4  !
B  
@ !  !5
&  @ !4 #  %&
   !



 



Delitos Informticos
J ' 7 FB/H5 E
 &!.$+F!! E
 &1!$5+F0!6! E
51F4@&%JJ$


B)A  005  6   
00
   C!
$        

 '  >M5?!5/ "
  
  (   )    '
          '   '  
           '    
 !
&
  C >M5E?!5 /   "        
       C  !
 '   >M5M?!5 /   "    
   )           C
         C    
                 
  '!
I'        >M56?!5 /   " 
         
'    !
@      >M5?/ "
    (         
 "M56!
&
T

/!)+5&$O$> 
 
 B)53 (C G 6 E 7*
G
=3/A  0  M 7*
  !6?
) *   " "     
    !
&(F

          
             
         !             " 
    #



 



Delitos Informticos

>!$AE
!5 /    
      *            
              
 '      
            '
( 
'    '        (      
9   '  C (       '   
 9)   *  !
!5 B       C             
             *    C
            (        
 C ' C    *
(  A
   * ! J(     C    
          )   
        !
E!5 &  C  '  9   *
     
  C( 
     A     ! & C (     
 '  9)   *  
     ( " )  
        

       C   !
M!5 &     )  "  
    (   
      
 C ' C  *  (     C 
   '      9 )        * 
  *   C    !
6!5 J(        
   C     *   (" ('  
  ( * 2*"       
   C *    !
!5 &         *    C  
*  *   M  " 
  !&  C      6
   C  '  9!

>!$AB
B    A
     B)
     (    )  *     (   
           "     C (  
 *  *      )  C
 
'
    9!



 



Delitos Informticos

>!$AA
!5/ *   (    ' 
 
  C(   ' 
 9)    !
!5 /          
('  (   *
*(          C (       ' 
    9     *    
' 
   '    9!

>!$@FF
B " C
 
  *   
  *      "       
 *    ' (!

>!$@F
!5 <           *   "  C  
     ( *       (!  
        * 
 C
 4 I!
!5 7  C     2(              
         " 0   ' (    
 '        (         
 !
E!5 /  '          (    2( 
'    ( 
C  A  M[  " E!

>!$ @ >7F %   "    (   


! P&               $  J  ) 
   '  QP& %      
       *  Q?!
B )   C
    (
         '      
 !

>!$@@
/   "   C 
*  
 " "       * * 
) (   !

>!$@3B
&     
           
  (  (



 



Delitos Informticos
[!5/ !
[!5L         *!
E[!5 I              
  
    
             
    *  
   (   
    !
M[!5@ *!
6[!5J '  "  ( !

>!$@3A
&   C*F
[!5B( A   C(!
[!5B*("      
    
) '!
E[!5        
 
   *   !
$   "  *  (
   )        !

>!$@2B
!5  C     (9
 
                    ' 
  !
!5 %
           C     )
*  ( ' C  (
     *    
  !

>!$@CC
& C (                 
  '   *             ("
 ((    (" 
 (   (F
[!5 W               '!
[!5 $             !
E[!5 /       !



 



Delitos Informticos

>!$@CD
/             ' 
       
 C(       !

>!$@D3
/    9                %" 
 ' (  C (          *  
     ' '    *"  )  "  9  
2    !

>!$@D2
!5& C(   '  9)   
*    92   "  
  ( (F
[!5 S          
          
*(     
        
  A

         (  
    ) 
   
 '
' B) ( !
[!5S    '( ( !
E[!5S * *!
M[!5S
   A
 !
6[!5 S             ( * '
' !
!5   B       C          )  
      9  (    
 '      C!

>!$@EF
& C(   '   9   
 *     C     )       
   (  
) A
   

   ""  '  ''
 "               *  
      '            
     !
B       C         2  
     
     
  '!


 



Delitos Informticos
& C( 
  
' ')
    "     '
        '    *    )
    (  (      !

>!$@EB
!5   /    
                
          '    C 
 
          (     
  9      "  C( 
  '   9)   *  !
!5  &   C     '      9 )    
*         *          
  
 !
E!5  B       "    C      
                 '  
  C!

>!$2FF
B
' A     C
 (       "    ' 
   "  ( C9 
   !

>!$C3D
B       A
  (        
              
   ' ( 
'    '       (  
    9   '  *'   ( "
  (   C     
'   
  (A
  9!
& *(   *    ' 
     C   

'         )   C      
 !

 H        
    '   /  @   M
 $ I    $
   > 0 @!&!!
&! E?   '  $  I   ) $

   0!
      (    )
* (
 %) )    
*   *    
    '    (    '



 



Delitos Informticos
' (       9         
 C   '  (  !> 0@!&!!F&! E
>?>6?>$?!B*)  C     
   ' * !
/ $  M                
    *          '  
 (! /    *           * 

          9   
  '   *   (    9   '    C 
)   '      '
A  )9 '!
/ '   (       * ) ) 
   C 
     
    *   C
"       *    
      

        *     '(    
 C        !     * 
*) (   
   
*!
//     'B) < *  
     C      (     
    )
*  B)!
&         &' 6  ' ( < *  
 C      "   
 
*          '      N 
         )  N6        

   !
/
* (       (A  
   ' * ()((
  
   9)   
  ) 
      ( !$  (     
   '   ("        "  ( 
  '   C)      
        ) 
   )    ' ( 
    )    *     '        
 * "  
    (
( (
   )            
(      )
  !
/        ) 
('   *  >    ?  C   
 (    C A   * 
(    (    
(    (   
              
   '        
 C!


 



Delitos Informticos
"
# 
T


    ,(      '
 (    "  1! !

>B) $
J C?!4 )
2     C
      9   ' 
!
/ )       " 
 '    '!B* C ( "!
/
  *    9     9
!



/ [  4   E  '  *(  %
 $1=     
 ,(   ,( > '   * 
 * ( 
   *?  ( "  >  
*    (   (   ' 
   ( "?)  
' * !
B  
' * C        
 
     9!
&   * '     C  
 'V       
    
     '  
9 (  9  '!
 J
!)1.$G

>!$@#?
$     '    ) 
 *    '    C
 (  (A   (     C  
9   ' )    E " ! $     '   
 '    C ( 
(A   (     C E 9  ')
6 6 " !

>!$@#?@
$     '    )   *      '
        C  /   (    (A



 



Delitos Informticos
   (        C   9  M 9   ' ) 
   " ! $     '      '
        C  /   (    (A
   (        C      9   ' ) 
E " !

>!$@#?3
$             )   C 
/   
      )   *      '
 (     C    0 9   ' )  E   "
! $                )  
 C  /   
     '  (  
  C M9  ')  6M6 " !

>!$@#?2
$     '    )   *      '
    C ( 
     (    (A    (     
  C  M9  ')   " !$
  '      '        
 C     (        (  
(A   (     C E 9  ')
6E " !

>!$@#?C
$       )  C 
(    
      )
 *    '(  C  
M 9   ' )     " ! $         
      )    C     (  
     
     '  (  
  C E 9  ') 6E " !B
 * "      
               (  
  !

>!$@#?D
<   " =J&5M) =J&56   
  (        9     " M
=J& ' (!

>!$@#?E
B   *   "    C       
 '
  * !

>!$2@2
&  C '  9) 6 E  " 
*           *"   (  A
   


 



Delitos Informticos
    '     
 (  
* (    
       ' J  "  ! 1& 
*     
          (   
  C  "MM=J& ' (1!

>!$@33#
&  C 9  ')      "  
"  (  *(     I     *   
      *"   (  A
     )   
'  
    ( 
   B)! 1&  *     
        
 (        C      " EE ) M 
B)1!
!
B           (  ' ( <   
 I       A)   A
4 
 I    C' (<I  !
33 >.$ $1=
 9/ @ 2'   
 
  &(    J C )   "       *  
   !
/  /J &(       >&J?  ' 
    1/   &(    )  J C1       
EJ  (    )$( .
 !
//  &(   )  J C   (  &J  '
$(I   J*('>I=J? &I *'   C!
/
*  * *     (   "  
)            J C   /  @  
7   !
B            9   ! B 1)

 " 1)   (     '2  ) *  !/
b        ! $  C        
  9! B E  (              
 N660M!   ) "  (
 C("  ( (" ) C  
       )       (      '  
  * )(
 !
3  "F

B 1" 1   J  # I  >J#I? 
   
 
 
    *   '0  

 M!E    J      (       L ! B


 



Delitos Informticos
)        *    1" 1 > 06b?     
 ( "!3  "       
) ( "  !

&(A    & *&    /  @    
    6   ' 9 
  
 
      A          )    !
A    *     (         
   (         
  (   

 )   94 37@!

B 
 
  ' *
     ! 
 =
 
1$
 F   ') 
     
1 
        !    
( 9!

/ &(   A     


             
 
    )0  
9 " &(  * 9 
J  E0b  !

/ '  J  )   C  "  &(  
' 

       *(   *     
   ))   *  M   ' !

//&*  2 C 6b    


      (   >- ?   ! /   '   
  ( J    
 =&$>=&- $?!



 



Delitos Informticos

2   


; &



; 

2 
B     (       *    )    
  
         )   *       *  
( 
  ** *   *   )    
 '!/
 **     *'
)             (        

                      
   C  
(         (    
 C)A 
   ' 2(*
)  "     "          ( ) 

)
*  A!
2@

$ $1=$
B  '  )  )  '   
       '             ) 
 ! B C *  ( "       " 
 ) C      C 
 (           9
' "
 (  (
A )
(

    )  C 2 "  (   2 
       !/       

   (            ) (   
     
)         
(   ( * C!
&   *    C   "  *
    
 (       J C  )     <   &! B
      '  .
  )         ) 
(      )  (" (         
') 
   (""     
  (  A '*)   
  !
/            
   )       '         
          '       '  
* ("   ' "    *('      
( ' *
 
 
 (*         )  (       
 C(  ' )  !





 



Delitos Informticos

    *'            
 C (     A     *        
  " ")
   !
/                "   1 
1  
          (    
 
    C   *) ** 
  !
/ *          2              
 ) C      )
2  
   ) (      (   )  *"     )
  ! $  C 
      '   ) 
    2  '
       (    
    C
    !
B *'         *   ("  

              


        '" - 
     )    '  *  9 
   C        

       )     )   
  '( 
 * 
!
/    ( "J  C "  ' 
9    *              !
            *            
)   
'   '!
B ( "  *2     )   C
   *  ' * 
 (  2
        )  2       (     
 
2   1 '    ;!
B  C(    
     J                 
 !     '   
  !
$
     '     
    '   * 2  
 *   !
B ,   ,  !    (           
 
 2 )   (  
* *  C 
!
B  C
      
 
-           *
  (          '     '   
 !



 





Delitos Informticos
3   ( (    
 
               "   *  
 '    '     '(    
       (         
 
   
    
 (  !
23

$ $1=$ 1>


B / "     (   
      
2 
 '         C     
            *    
'   
  J C* " *  !
/ '    (
 '    (    )    
 C8 -  &- "(   ' 
)
 )       !
/   (    9)*     
)
  '   "  
    *"C  "   ")
       ! H              )
  (      
 (    "!
/6 ( J #  *   
'   
J  
'   
 *  / 2 ) "
     .  
"    )     "  * *'  
(    9"! J  #            
*   () !W (    ) C(-

   '  ' ')*     )' b


>  E@&NME@&N? ' 
!
/    *  !$    M  * 

  
    
  *        
!6M   '    '      !  
'     "  C 9)  C "  
)  !
/         "F       

 )    '! J    '    
! B    
        
    ! B       
    
   !4  " " ' 
   
   ) 
'!
        (            '  
 CF     '(  *       )   !
/       
*  * 
      (  





 



Delitos Informticos
 C 
 (      )* 
   
('   * )   C          
(    A   !
3            C     
* 
 ((  !/   ( 
   !PC*      
 
)
      #
Q PC *        
  
   *       ' 2         C(
-

    * Q J     PC * 
      '  *      11     
  *        'Q/"
  * *      '   '  '     
    ) 
  )    ! $(  
 *     !
@ *     ')#
!    

   A  J         (  ( ! 3 
     C  J      '  

 *!
7' '


 ' 
    !
B   C  **  C ( *      
   ! B    C   C "(     
     ! I            C *  
                 
  
'(* !
P& "   * *     '
  '           C  Q
P&   (9             
      Q PS     
( *     (Q! $  " 
     '  
   (       

 C *  V   C C 
     
A  
   
 !
7( *!B( *"      
 ") 
)   !     '
 
         2   (   )     
  (
    !B   C   )
 ' * '  ( A    
 C !
22

 $1
/     )   )  (
     "   (   F )



 





Delitos Informticos
> *)?
  *      

               )         
 *     * ' * A
!
B *         ) !/  
   *     *       )       
  ! &        
    *  ! /   
 
 F   ) A
  *
 
  
 
   "    C )  /    ! /   
   * 

)(  C (  !
B  ' 
                
    !B '
 

                          
     C  " "  ( 
  'V 
 C ' !!/
   2 )" * '"   C
  
     *   * ! 7 '     "  

  (           *  
       ( ) "! B    (  
 
  (  C ' A
!
&      *       
C       )
       
 "          ) 
    
     * ! /              
      (    "    (       )
   C   )(!$"
   
) '       (    

   !
B  '          )        
(   *(   '   
       F
? 
     ("     ('!

?                 
 
  '!
?   *   C
(     
            F ' >   
2       ?       >  '    ?

  2>*'?  
 !
?   *       
      '       
 " 9      
 '    L' 
    
"      !





 



Delitos Informticos
/  C2  B)   &(   7
        '
  (  ' ()  !
2C

$ $+
/    1 C) *  1   
 
        ' 
  *  >  
   (
   )       ?       
   
    
  '! B )  
  

   C   
     C     ( )  '
     (  !
B  '     ' "      *   
("    ' )     '   '    "
 *  
    ! B  '          
      *   C!
/< A
 '   F
!+

>!$@?%    F


6!

!
!

$    2 '     '    )  
  
   A
 ((  !&
2A             )  
2    2)   )       (    ! /  

 )  * 


  *      I 
7'  '*(   (  () )   
  *( !
$    *  C        A
   *  
       )  !
$ )
 '    )  " *
)    (  ! %          2 
( *         '        
    (     )        

   )!

! $ )*
    )   * 

>!$AE!/(   *(


   
A
! / 
(                ( 
*(
    
 *   
 !<         
 '         *    
  )   
 *  
 V 2   '  V       ! &

(' (  !
5$+
B)7!E   4)  M$' 8
!L(
  8
 



 



Delitos Informticos

C& 0   
   

C &)+
C &>
<  "               
  ' (    !
/    *  
     "  CV 

 (
   

  (     C
        C    
 - !
B  "     '     
        

 A       
   
  (         "   "
 *     !
/< AE 
    B(*7!0B)

    $    
           
 (    C! B  (    (    L(  7 
  $  J7/3<J   (  (  
!
/ .  $    ' 7[! E6 F L(   A 
   
$  )  2      
  E   
 " 
     ) *  '     )  C
    

 (    "
"      (      2 ' )      
    " !
B  (       ' 
   - !
 C
2             
       !7'  
    A          
            
   *    -  )   ( '
      
    
   '  ) C
 !
/-      * F




<  *     


$2'   (


 



Delitos Informticos





<
   
  

 * 
    '! >4   *  
 !?
7    ( "!
 (  !

/ '-  ( (*F









<  *  


   '
& 
. "  
<
    

$
 >   2!?

&+
<       -     
      (
  F

I5$

I&

W          


         
      , Z  
(    '!

<   (       


  )     *   (A
,((      ' 
  !

W        


    '
 !

<   (      


 )   
  !

B (   )G  


  
    
   !

B  ( 
   (
      ) 
  )  !

BG  G


G !

   G   G


G  - !

3   *(     


 *       C   F
 $      (     
-    C      
          
   !
 /   
  -   C   

(' *    !


 





Delitos Informticos

 $ *    *)    *   


    '   " 
 ( 
    )        ( - 
C    !
 <  *  
    
 (      
('      !
C@ 1=
    '  " 
      1  *   
  
(            (    
(A *1!/(
C )  C
       )        -  )G  - 
  (     ("      (    
  * (  ) *!
B     1
*1          *
 '
 - ) -       > C"
' * (     ?!
" (     
 )  

   "                
 (  ! /       C        
   * (        '
  ") (  !&      
    C(     (  
    -  - !
B   J C         "   
       * (   *)
         "       
   ("  C        
 ) 
 ("   '    )
/ !
$      J C     (    
      
 * C   *
)           :$  .
;!  &   
 ' C)  
 * C


 "      (
 

 * C!
B  *  C   *    )    
      ) *    C )   ! 4( $(
C*  L "(  2   
  C     
         '       - 
>  "?    -      '(  (
! $  
    *  C  :     *  ) )




 



Delitos Informticos
     *    C   '       
;!   * C F   - 
   V   ' ' - !!
     *  C  F     -   
   V   ' ' - !
B    2     J C )  ' / '
        C    A  
 )
 *  C    ( )       ' 
  V      '  '     
  
 
 * C   
 ' (A     '!/    

        '       
     ! <        (    
  

   !
& 
         '      ' 

            
    
 
  C   
     
 '    
  )      '  C   
 *!
.     *    C 
     ' 
   > C     *    ?   ( C 
       )         

 '  ' !
4 *   *     C  *   )  
    *
2(   *   ' 
       )   *  
      ' )        )   
*    
     )   (      
 
                !
(    ") C     
      C *  C  '   *  
 
  * 
!
<        ) (F
?
?
E?
M?

PS* Q
P' * Q
PC * Q
P' * Q

6? PS* Q
// Y
 L
 /9
 J    
 C  ('F

 
8 - 
 
&- 
 
& *J C



 





Delitos Informticos

 
 
     C 
    
   1 - 1 1- 1
)( *   

/J7 / "J C 


   
  ( 4     J C       
   <C(#
J!FGG---!!(
!G

G

    < (  J C


  $ ' / <  $ C 
   $     /  <   $ C 

   4   /  <   $ C 

  B @ < (  J C

C3 &+%+51
<  *    (    (        
                (    
   
   C               ! 3 
       ( )  A   (      
         *          ) 
   (A  !
B    '              
                
)   
  )      ! /  '  "
 (            C    
  C        
 
     
        *  

       
!
B  C   C()
"           A   
  (    E G
) 
          GV   9
 (A      6 
)G V    
'(         !     
 "   (   ,) 
   *           )   '
   * C  !/ ( 

 '         "  * )  A
    (           !
B  '     C  "          
   '          (     
  

    '  "  !&




 



Delitos Informticos
  "     
   () (  
  "!@ '         
()  
  CC   9 !
/ (      (     (  
 C *     
      !
B     2   
A           )   *     
 (  !/   
    A   
  9(  * '
"
**     (  !
/       " A   *     (   C
            )   *        
'   *
      (         
  '       (  
   *  C !3   ( 
  
 '(       A  
  (    C   *     )       C 
 !
%
C'      '  (  
  ) *   
 ( 
 !                   C
 C  
**    
  !/ ( ** 
  (        (       

    C 
    
 C   '! $    
" 
  (  (   ) **    V     
 
     C  (   

* 
 '!
3   ' C )   
  
 *          >    ?
  *)  1 1!/  ( 
  (    (  '   C         * ! / 
              *     
  <L34  ' (   ( 

 ) 
  "!/    C 
        C  ! B *  

   * ) " 
9   (            **     
 
 )      (     
 *  
      C 
   *(  A   C
    * ! 7 ) (A  
         
 (    *
 
 !



 





Delitos Informticos

C2 &$!$
@     "  J     
    (   
'         (
!J 
C (
     (        2  (     
    (!B  J    
)
 
   ' ( !
/   '   C
 J A
    !@     '    (
    (  '     
)          A

        
      1) (1!
/     
  (            

   2    *      
   '          )      ( 
    !
B   C1     1
    )
  ( ( (      )
 
) C  )  '          "
   " (  * 
 '       
  "    
   C   "          )  
      1  1   2   (   
 () '!
%'  )    J )  
 C     *            * 
    ( 
     (  
 !
S   J    '        C
    '  *  
'
    *C(#
!
/   J ) "'  
  
     (( C   "!
@  ( ) ( '  "         (' ) 
 
  "     '          

    *     *    *   C  C C  
    
 "2  !
/ 9 C(#

 (  (      
   ) !&*  "   
  C(#
    




 



Delitos Informticos
          *
                )      
  
  ' ( !
&  9) ' C(#/=     
    ) "  "   (    
 (      *)   
) (!B C(#
*   
 "  )              C  
!
BA * 34<J!J     '(!/
) (
     '.

'  3 ( '4  <   J>34<J
(#J<3?  
*   ('

    J   '))'!
B 34<J            '  "   
 "        (

   )J 
'
('/ 
 )    *'  .
 
    $  

(    "   )      '      
(                   ' 
 '!
B *    * 
C ( 
)     

   '    
  )2" " !

!9+K$>B  '   


  
 ( 
  *   
       
  C(   *  ! ' 
 ('               J  
    )        *   ( *
   
  '      !/   
 C      *   *     >       
     '   ' 
(
)        '       
  
   ?!   '     )
'     
 "!
L  "       ) 
 J !B  '2" C      
( (    (  *    
"  >        ?            
 
!
/2      '  -   
  F  -  )
 - ! /  -         
   (    
           (   -  )  
    (A


 





Delitos Informticos
 !&  (   -  
 *   ( 
 V )*'      !
/     -     ( 
(' ( 
( !

!9+ 1$>
B   ' 

     "! / 
2 (  
 A     
 *"    
(     '
 "      
   
 
( !$* 2
(
  '
 "     *"
      *!
&   
       
   

*"   '!
/   
      2   C( #
 C
 C        ' C(
#
      '  "             
C(
     C(   *    #
 
  

    C(      2!/
     "  " (    
 ! @  
  ( 
   ( C(#
*     (
 "      2
    
2           
( )   ! /    '           
  '  C(#
    C(!
&
 ( (   ' "  @&$
  / ! 4                
          '  " 
    J  
  C   !/     
 * C ( C
      )
C   ' "!
B ) "   J ' 
  ' 2"    (    * "    
 )  2    
  
      (      
(   

         )     "    ! < 
)         '     '   )
2"!





 



Delitos Informticos
/  '  '    
   *  C C   
) *    C   V          
      (    (    
" (A  
    
 " *    (           )    *
  '    *        C     (   ) 
  
 "  - 
 ( !
%
 2  
         '   
 *"  
 ' )          "   *   
*2 (A
V "      
    ) "
 A "   
2 (A  )   !
CC &+$I$&:
B  '  &-          '   "
)"     ) (  B(*
7[0B)
  $ > *  ('B)7[ E M
5B)   $    ?!
/ )     "  '    1- 1   (  F
1/2 '         
 ' (  
                 *   
          
(
  1!$   '
  '  (   
    >- ?    " 
   ' ) 
 !
/  "  9    (           (  
  
  2   ' 
  2 ' (   * *)
    ' (   ' ( 
! B  ' 
   
  )  2       *  *   (  
"  (    * !
/   9            
   
 -       
   >   ?      C(  ,
 5  !
B'<" < A  E
   (  '
    !/  "0?9(F

>!$@%    F


0!$
    ' ")"" 
    
    )     ! / /    
 )   ) '1!


 



Delitos Informticos

 B('   $  ' - ( 


      )  
!
/  "     B('            
  
 
 (
  
     
  *  
        
) "  '(!
      
  (' "
9(F
! /    *(' >           *(  
 '?!

! /      >        1   


 '1?!
! /   (   >    

        ?!
! /     '* '>       
 '?!
! /      
   !
! /   !
$              
 (

 
   
  
     


           !
/    )         "      B(*
       (           
         ' 
    '    
  (           
       *     F

>!$ E!5 &    *          
 (              )2*
    '       B)
      '     
  *('  (   )  
      

!
B   *                
      '     *  * 
 (    (    *    1!
     " 6M         C 2(   
9    
'   '!

>!$ C2!5 /  


 *   (         

 *    2(9    

'   '!



 



Delitos Informticos
/ '         
 
  *     
'     ( ) 
      
 !
B 3     $   J7/3<J    A
  (  
*      '          9  0 
' 
L'   5 0           
  
 ( 
(  (      !
$'       
( - !
!    -   2  F      )      
2      "        
1"1 - !
! %    '   '  -          
   C
 '  *)G !
E! B         *      )      
-      
 C  (           
   )G    ( 
- !
M! &    "   
' *    
-        (    
         (    
      !
6! &            
  L      (  
    
 C       C
   L !
!&'J    4 <A
)"7
> A      *?   *      
                   
   '! %'     (      A
 
 * >  =&$?  
  !



 





Delitos Informticos

D "H 
  
 

D $$!$>5!
/     '    "   ) (       
           ) (     ! / " 
 C
 (  )
 *    !
$( (    ' "
(   (F
! PS Q
! P$   -  Q
E! PS 
  Q
M! PS        ) * 
  * Q
6! PS        Q

U na poltica de seguridad generalm ente aceptada se resum e con la frase:


Todo lo que no esta expresam ente permitido esta prohibido.

/ (      '          
 *  
 "    *!
D@ 15!!1
/2 *     (  ' C
   !
&      )  

       C!
B C(  ) A
*F    
       )     
         
 9! $  C      (   (          (
  !
D@ 5!# =8!
7  C  (     C
     (   
    C! /     




 



Delitos Informticos
(         (  )        
      C   (  !
/          9        
 (     C(   *    
<   (  *    )   (  
( (   (      (   
   
     (  (   !
$   
      *      
2* 
        )    
  C!
D@@ 5!
B (        
     (  
   
  
 *      
     )
       
  )     
   ( !  /
  (    
       
        
: (;   -
      '
)(   )
C (   
 *         (      
'!
D@3 5!)U$!
@  (   *5!)U$!,/
(   *  *(  (    
 C     
 
  " )   (   2 ! B (   
 *    
( !
%     9  *      (  
 *)    ' '!
D3 &+$5!
         C( 

     
 (2(
                      



 





Delitos Informticos
  '      '   C        )
**     (  
   !
D35!5!1$$=8!
$ (F
-

&  64=    ' 5


L34 
  (    "   )
(           !

B  ( )     ( 



 
  (   
             (    ) 
 *  
 (      !

$(A         (      (  ( ! @

 (     


     
        !

.     (  


,      

 (    
 (      (      (
     "  !

D3@ &$!.!&$>5!
/       C          
'  '(A     

 
        )   !
<                   
 
,             
         
)   
 ' J'!
& (A     
          
       
!

D2

5$ $
D2 5!
B (     *A      
 '           !  B      J '
     *  *             
      '            " 
&(    J C      )    
,    
 ) '  !
/            
,  

 (   
   
 





 



Delitos Informticos
    
       '    )   
             C  
       )              
   !
/       
C       
, 
     (        
     
 '(         )*
       
   '      9 
   
  * 
,
   "     !
3             * 
            
(         
 (
C )   )    )   (
(       
"     '
   !
D2@!5PI$$N
@ -    '      
      (  )   ( ! @  -     A
     ( 9     (      
 ( '          *  J ! @  -  * 
1( C1   J  )      >'   * ' J ?! B
  '    -           ! & 
  2   '                   
 -*   " !<  * (   
 '   <      
* )  <             (   
 ( '   <
C 
 - (     ( '   
!& 
 J    '  < * 
 & * J  >' J&< J  & * < *  ?    )  * 
J   <      '  C 
 
 2'  (   J       '   (!
B  - 
          (  (     
J   *  ( '!
/ -    *      *   
C              
   ( '!
%
   - C          
' 
 -  ) -         (     
  )J !@ ( '" 
   )G     !



 





Delitos Informticos
/I -   2'   J 
         
   (    ) 
     
      (   !
B -  C       
(     (           J ! <    "  
 - )  ) '  
     C   *
C  (!$  C  -  
          '      
 # -7%) %<GJ<!

$$I$$
 <          (   !
 < 
  C  !
 <   (  C       " C

!
 $) * 
" (   F
 <  *  *  (   J !
 <   ( C    G   
C!
 <   (    ' 
  *          ) 
2  !
 $"      !
B  -    *     'F      
* 
       C  (   J   
(     C   '  (      *    
 ' 
  ("     * 
             J      
' C 
      C  !   
      ' 2       * )
(   !B  *
    -   
      * -!@ - 
1  1    
  
  -            ! B  -     ( 
                 >     
    -?! & (               
2   *    -! /    (  *
C (    ( 2*   !
1$I$$
 B ' ' 2   *   !
 B  
  
 C >        '
* !?    A CC      !
 7     ( 2 * !
 7  (  * (( !




 



Delitos Informticos
 / )  
   -  ( J 
      ( ! =C       J    
 "    !
D23 +
 9 9* 
       :  ;
    *        *  **"  2
(
!  2 *  
( 2 9  2           *  ! B
1 5=   2   C   *   
      ( "   :  :    
 '!
&
 (        C *   
    !
#)
/(/( 
  ( C) 
 
  ("           C   ) ( 
! /
   2    M! 9  C )    

  ( 
(  ) 
 
   
 
 ! <       ( ( )  
    ( C
 2      9 6 !! /  
     (
  :):"       

   !& 
" 
 )    "*
           (! 7'  )  
        "

  


 2)  
     C
)A 
    !
 
         !& 


         E
  !      
"  (
 )   
 )       !/
(YJJ
(L( =  
' *    ( C
(  .
  B*  : *'    7    : 

' E '  ' < WJJ!
B      
 

  
C '!



 





Delitos Informticos

/ MB'=$
 *'     ( C

)     ( YWJJJ      ! /  %   
*'                 
&( . 4     / @ !<  
  "  )  

     
 )  0  

'      ' (      *     

 M9 !
B(  (    ' *  ( C 
 ) "    ! B  /(       
       (  C) 

     2      ( C! <    
       ( C      ! $"   
' (/&  '(        (!
$   (  )   ( "2   " 
 
!/ /&         
 *    
"    ) (      "   
        9 "   '    ) 8 
              
   * 
! & 
 ( !@9 L* &  )$      
 ( C     L&$! @  
  
  A     
  C   ! 8            
   )   '  *'!
I   ( C     J   
 
      <.<  < K        ! &

 ( )         ( C     
 (   A  ( C C      
&& 58 !< ( )"


   ( !


1
    C    *   
('F

   4


& !

  4
. !

   &'<


!

  J* !

$1$.1$
/    2       )           
      "  
    )      
  '       ! /         





 



Delitos Informticos
          2           
  !&
  
  E"V

Sustituir

ABCDEFGH I J KLMNOPQRSTUVWXYZ

Por

DEFGH IJ KLMNOPQRSTUVW XYZABC

Por ejem plo el m ensaje: Delitos Inform ticos, quedara de la siguiente


form a:

G HLW RV

LPIRUO DW LFRV

$1$."$
/ 
        !/
  (                   ! @
  (F

Sustituir

:ABCDEFGHIJKLMNOPQRSTUVWXYZ

Por

:QW ERTYUIOPASDFGHJKLZXCVBNM

Por ejem plo el m ensaje: Delitos Inform ticos, quedara de la siguiente


form a:

RTSOZH O FYHLDQ ZO EH

$1!!+&$$.U
/     
 '!/ 
*     
   )     "    (
 
  (A   
 ! $"   *
 
   A  ! /    ( C    
   )  *  "           
   
 !
$1)
/     C     
  *
               ! B      
   
   *!


 



Delitos Informticos

Por ejem plo el m ensaje: Delitos Inform ticos, quedara de la siguiente


form a:

SO CITMRO FNI SO TILED

(      ( *    '


  
  ) ( !$(  

   *  
) ' C  

 !
D22 1 $+
&     I  / '       *     ) 
   ' C(     
   ( 
       
        (       
  
' ) * 'V  (      (        
     
    '  '    C )  
 C( !
B*' %("  (    (  

     
 V         ' *
 C  C   (     * )   
        (   
 ' '!
/2  ' -  
 


   > -      ' "? 

   >-  *?      (
   
  '    
'       
(          '   '      
 V 
       '  
         *   C
  '  )
  ) *     (     
    
("   ' "!
/       '         (   
             "     
 *   (' 
  
 '( !&      *( 
 
     
  (    
 *       ' )  '  
   
   *"  '  '         
 
 
 C    !

     )  (       '    
     (      )        
     *        * 
 )  




 



Delitos Informticos
  (  
 C    *  
 
 (  
 C  ( *  !
 "        (' 
 (       '
 ' (            (
    (*  
 *
  
 *   !
/                 ( ) 
! <                 
  (   )     C  A  
           !B
 !<     
    )     "        )
 
 C     ' 
 
/2       (      (
 '  
  '  )   '  
 '      *     *       
(' *            *  
 ' 'V 
  "
 *    * ! I      
  '( )     * 
(        ( !
B  '(
     
  (      ( >      
*          )    
   '         (     
   ( <   W     -      
          ' )      C  (
      ?!     *   
   ) 
   'C(
 (    '
 '!> )  C   
   
  *
 F (  !?!
1$1 $+
B   (         ' 
        '  '   (    C   
      '   
     C    (    

              '   
'         '     * ' 
   (   ! /            C 
          '     '     
    )    *"
 '  *      * C     
  !



 





Delitos Informticos
<                   
      :  ;    F
/     *                   ) 
          
/    '(   ')

           
     
   (                
   
  V              
    "   *        ! $  C 
    2(    
   " ( * 9  )   !
/         *  )        
    (        
* (      ( C  
    
)(  
  *    *           
!
.       '     '     
 ( C        
     '          *    A 
        '       V  
 (  ( **   
 )    C  (        *  
    *        '    * ' 
       ' )     (    
"   *  )             ' 
     !
DC

5!1=
&  &(   J C    
C 
    (  9  ( )        
! 
  "   *      !
B    (  &  C- 
 - ) !
I
           "     
 C   <@  *    
 
         > 5L34 ,
  ?    !





 



Delitos Informticos

I
   (   '(       - 
  * !


  ''( - ) - !

Los Datos constituyen el principal elem ento de los tres a proteger, ya que es
el m s am enazado y a veces difcil de recuperarlo.
B (  ) "        *      
                 ' )
' !
/ $   &(      F
&$
B      (         *       
 ( '  V) ( '
                     
     ( '             C
         (       
(A 
 !
/   
   &(      J '    ( ' 
 
  
   & !
K?1$
<        (
   
    *  
  *        ! .   
        ( '     *  
  
     9  *(  (A
  !
!
B      C 
    &    ! 
   '     *    '   3 ( '   
(  *( (  &    !


 





Delitos Informticos

19 +5
%   (        9       
      -    
- )( !
DC 5!$ 
5!>$1
B (    "      C    ' 
* 
  ")           *'
)  *    '!
B&(   I"       
 
 
  (       '        
     *      ( 
 *   *   * '  
"   *  !
<              *   
&(   I"   )   CC   
 *  ) 
  (!
,   
 (   '   !
&+$I
B J      (  (     -   C 
          &(    I"    ( '  
    @*    ( J        
A ( '      * !


>
B 
       "    C    
& 3 *  (  "* 
 (   
  & & *  
   (  
, ) *C    
       
  
 <@)*    V    *(
          ( '   (  * 
         C      '   
   *    !

!$
/   *      )          
    
  7 )
       ( *!





 



Delitos Informticos
 1
B       ) 
  < A      
      (
    9 ' !

     '             * 
" )  

    
 (

           *'          
 ' (  ** 
 )   (!
 !1!
B8   **   
  '    
)    )      
     "   2  
  '      
2     !
/       *        
   
   <c )    &  & *    
   
(  2(       *'!
& 
             )    C

               *    
  (      !
/ J ) 
  C     (
      
      ! H     
         (   C  
   
 !
/*            C
*     *'V     
   (        
& & *  )(  C  
      *! $  C    
      C      
 !
 
 $
/ &  /      *   
    &  
'     
  C  
        '      
9 ' )   !



 





Delitos Informticos
@       (   &(       )   ' 
     V)   *  
  

'  *   2          
    ( *!
 % !1
B (     

       )  (    
 *(   
      
 (   

 ( A       !
@      
 *       ( '!
@   *        2     
 (* C     !
$  () (   2   
    '   
 ()'!
 1!K1
B     2   )     2*    " 
  ( *  !/   

   )E(  !
<          
         
     C !

1H!%&$
<    3 ( '      ( ) " 
&(         )        
 C    $     @  )        
/  !

1
/ $       L    3 ( '        
  ' ) 2 !  / $       (       
&(        '*   
       
      (        
     *  !
E l A dm inistrador de la R ed debe seguir las reglas de S eguridad, indicadas en el
P lan de S eguridad establecido por la organizacin.





 



Delitos Informticos

H!%&$
/   ()" (       
 (   &(    J '/    C  
  C     )  
 3 ( '     (  (   
 )   
  !
M uchas veces los usuarios y personal realizan acciones peligrosas para la
E ntidad, pero no son realizadas en form a intencional, catalogndose com o
accidentes, pero el que la am enaza no sea intencionada no im plica que no se
deba evitar.

DC@ 5!$
B   
  ' **
*     (     *     
( (    & !
<     *    )         )  
       '     
* ) (      C  
 ( ) *  (  
  "*        
 C *       (   (     
 '!
89  (
     '  
               '   
 *  C*    (!<   '      
   9     J!
BL J B$7 B$7>B$ 7- ,?   5
*  
 5    !B 
     B$7     ("       
      !
    '           
*   B$7      

    !       *  
 ! B  -       
B$7>  " '   2
 ' !? 
         
 !
&    (
         (    
 *   '!



 





Delitos Informticos
3  (       
       *      
 (     
9        *( 
      '  '!
     B$7
 J7%/L7/%   

    
  2  ) 
     
2  !&
 (


  2  
     B$7! <  
    
    (   
 (      *  
   2   
     '
   
B$7!B  (      '
  =   < '>I #?!

Los perm isos deben ser asignados solam ente por el A dm inistrador de la
R ed.

@   C  #$7># $ 7- ,?2 


C 
(( C2*"VA  *  
         (      >  '?! B 
C  
 !/ 
 
     
 !
/    #$7  
      F  " 
  ' )      '! B "    ' > 
 ? *
  C !
B     '          
  C "    '!     (    " 
        ' 
 (   "     
* ! $  2   (" C     (  
                 
   )     '  ! %
  
   
     !





 



Delitos Informticos

/     #$7        


  " '
             ! &       
    
     
 C       
       ! *"    
    *    C           

        "  
   C 
 )  '  *"! @ 
 
   
             ) *    
  !        C    >2   
?  
      ) * !     
9) 9       !



 





Delitos Informticos

EVH 
  H
 ; &H  H
 
&      J'    *"      '         (
     )            9    
 !
E 115!
/ 115!>
   
*(   ( 
  
    
             *       
  !
/  
      ) *  (   
       
   C!             )    
   
(     
 "    
(    '!
&              (           
 
      
                  !
  
     !
&  !11$5!    

 
     !&   *" '  

  '  !&*"   
   
 !/   C (  9 ))) 
  C  
     '!
&      >    C (A
 *         (  "   C  
 C
     (    :d-  ;    (  ,  >
- ?       C !
&  (     C  
     
          ! L  

       C!  


       *  
I%<)   
   !
     (         >       (  
      )G 
   ?  C   
: ;    !

 C        () )

** *       
  'J< !





 



Delitos Informticos

E@$
5!L
&             
 C
   ( !

P or ejem plo, tal vez descubri varios accesos FTP, justo antes de que el intruso
entrase. D esabilite el servicio FT P e intente conseguir una versin actualizada.

  
     *  (  ) *    C(  (    
  *(   !&(  
   

  ** C! 7        C  
     !
E3 )$!$O
/     *'  9   
 
   '  !
 
 * (        '   )    
(    ')    !
E3 $!
        (     
    
 "    
  ! 
 C
           
   !/2    
     *          
J'              
 )* (    '!
B : , ;         A
       (   C (
 
    
! J              
"!



 





Delitos Informticos

B
H  


 "H 
 


B 
/ C   $  "&(   J C )  
    **   * ')   
*('C  
')         *
 ( * "  ( )  *  (    *    )
      (  (      (    )

      '      
     )  * 
 * ("  '!
B@

.L)$
!>
/ 
*   $  "   &(    J C       
* 
      C   3 ( '  (  ( 
(       ' )   ("         
 
 
 '  ('!!

B3

!
 $    "  &(    J C          
(         (    ) 
      '  
 !
 $   )   
     )   &   4   
&(   J C    !
   * 
  & J C)
&  4   &(      )  
 '  !
 W  
   &  4   &(     
   ' & J C!

B2

8!$9$
!>
B$  "&(   J C 
    ' () ( 
 $  '  /  )            
A
   )     B)   %("  
J '
    A
    
(      (!





 



Delitos Informticos

BC

$ $9+$
!>$5!1=
&$+$
!>
/     C   
     
     (   
    )
*(  !
$$$
!>
B$  "&(   J C * *  F
)5+&$1G


   
* )        ' 
   
  
   "!

3
    '   
     ' > ( '   
    ' 2 
  
     )  
    ?!

L       *'      " C) 
(           "  (        
  
  )  '   


     
          )  * 

    !

/      '  ' '



  '( 
(    C   !

  


 C C       

!

' *'   ) 


  
   *'  '  '!

  
           *  C 
(2)  C   * ( *(
"  C  * 
   *!

3
     2' )          C  
 ) 2         
) 
   (      !

0+ $5!1=
$
/     *' )   
'         )
    (    C   !



 





Delitos Informticos
&  C  8   $  "&(   J C
 
  '( 
 !
1.+$ 1$11=
4  
 )  $  "&(   J C 
A * !&(A* (" C

 )
        "           
 *  C !
<         $     &(    J C 
           )*
  "  !
/2    *      (       "   (    
)     '       C    (   (   

!4   9         
       !
B *     (      "     
  *  

 C          "   * 
 C 2    (     ' *' "
 (    = !
/        * ' )   
'  *   
   (       
      
 *'  
     
        
 *  !
&
 *           C
 
 '  !
I      * ' )   
'       
 ' 
  !                  
&  <A
 C           "  (
     
  ".  LA
!
B          "   
 *    

 * (    *             
    ! &   *     
 *  )
  !
    *  
         *' )
*  
 *!&(  
 
 *
   (  C !
/  C    
 ')  
 *    !
5!1
B   (         *    
*
    
 *!





 



Delitos Informticos

A" 
  
$P$NG
7
  )C     (   

  () "    !
L1$G
Nombre
Alias

:
:

Fernando
Nando

%1!&P&+1NG
/ I%< '         J         *
 (   )         * 2      *   
 '          
    )   9
>- ?!@  
  ) * 
     C         (    )  C      *

A
    !

$P
$+NG
@  (    *  
  '        ! ### I%<
  ')%  C
 J !
$5>G
/         (!/  

  * 
 2  (
    !
5>G
&(    :    :            
 (
         
    **   
  ( *       !
I$P#L 5NG
/J       '   *    ' 
   !
%P +NG
/        
        2           ! 8) 
     )
 (      !



 





Delitos Informticos

LG
/ 
  '     '  ' (
       ' !
$&$W&P&$ NG
<                 )        
    !I%<

 
  (   
*   !
I$$P!5NG
&            J ! B (
C  (   
      J   " 
(     ( '!
!1=G
/    
       C          
      
   "  !
IPI .NG
< (     )  
 (A"      
   
     
     
  )      (   >B2  
  "?!
&P +&NG
 ' E
   < J &%6LI !&  
   '     !@    'J<
 E! !00!EM6
&IPONG
                  
     '  *  !
.L1=G
/   *       
'         
    C   *      * 
        ( A
!
0$+$ !G
/    
           
      2  
    '2'    *    *(A *
 
  !





 



Delitos Informticos

Bibliografa
(Pginas Webs y Libros)


& &H 
&

 

  
& # X

 J
FGG)!! 2G GG  G*GJ7/Y!

@

 
&  & 
 


FGG---!(! G&W)G8  GMG dE! e  

3

& (G

#
   0
FGG!
!  ! G(G (G
 G 2! 

2

  
   H 
#  
 


FGG---! !(
! 2G G GGd !

C

 

FGG---! ! ! G
!
FGG( ! ! !Gf *G G(   G  !
FGG 
 !
! G(G !
FGG---! !G G G(G( !
FGG---! !G !
FGG-
! ! ! 2GG  G! 
FGG---!  5 ! G
FGG---!( !G

G)G !

D


    
  H ;
FGG---!!,!G G G G  6!2

E

 /
; "H 
   
FGG---!E ! GG6 ! 

B

.G !K!%/
D*I )*# ,* !!6$
 

A

!$  1=


C* L ( 4($(!!/  $   !< ! 

F .G+ $+5!


%  1=
I /  
=
( "
)1+$ H
GGF---!!



 





Delitos Informticos





 



Delitos Informticos
  J ' 7@  /9
1!

6 
 

H


 H 
   
/  9                 
! 8) 
"A       (  
()       
 6!
$      *     J     *      
   
 ! B     
             * 
      '1  " 1  

 C  C  9 ( C)!
B     C   *     V      
   (     (  !/      
   
  ' ) ( "      
  
  b    (A  4   7 @  

 *') '       !
B  
       
    *       
  
 11     *     (A     !
<          
 *1 "
 C155"  )2  ( !
/         C  C
     (    7 @  
 < *'   ) 
%      W      
! /    (     
J 7@  $)B3  < *' )
%   >@7$I/J? %,)
   
7 @     < *' J    >J<?    C  
 '   *( )  
 !
1/    *     
  '  
  *('))
  C "
 (  2    )   

 
 1   L 3 < *' >J C? 
J<!
1+$+.L%1= 
B     (        *
 
      (      *           C! @ *
(              (A *      

   *      ' 
       )    
  !


 





Delitos Informticos

&(A    & * &    /  @     
    6   ' 9 
   

     A          )    !  A   
 *   (        (  
   
  (  
 )   94 
37@!
3      C   
         (  *
'              9          
2 '! B          )     
   1(11* 1       

        !$(*   (     ( 
  V   (                  
1 1V 
  C  (  A          
    ' (  1  ( 1   !
/     * /  '*  
      *('  *   *  "
 )   (
  1 1!
B 
 
  ' *  
        !     
  =
   1$

 F   ' ) 
         1 
  
! ( 9!
$   & !             *  9   
   
  '     * 
)2
   ' J   * !
B 
    ')1  1  
J  
  * 
!<    
(   9)(    2 
  !/    / @  C (  
     J !
$  C   C(   L   

           *    " )  *  
   
  (     (') ( "!
B )
  8 (    *       '   * 

       *   '*   '   J ! <  
  NE *
 "  '  C( 
L )(  
 ** "  *"* "  
 "!
J  )
   *     
"     C(  '  
*          9         (     
 *   
   ! L  
1 *1   !




 



Delitos Informticos

!$!.U
$          '    "    (  )
   ( *  C        C      )

               *     
 
  (  * !
&(        '    B) 
  @ J 
   
         7/%  &( ! $   C *   (
           1     ( 1 55     C
    (     
    )   * A
 ) 
 (55 "      (         '    ' 
        '!
8) "    (      (      

 !@  C(3 J*(/ I 
$  / @     0!3     J*(     J  
$  (        ) )    *     
 C!/(   ( 
)((
   
 '     (' !
<   )          A   ( *  
     
 C!/        
*(' )   (  *    
 
   )  " ! $  C  *         (   
2         (     (         
 55)  * 
(55(      !
/   "         !B
*('*
    
'55  )
      "   "
     55 )    '   '
 (A           /  @ !     
"  "       '  )          "  ' 
 '  ) '!
$   & * J*('<)$(I   J*('>I=J?
  /  @   ('          "    ! /  
 C 
 
   *  * )     (      
 *  )   *   "*('

  '( " (!
B "          
     
* )!&
 ( 
"
"    2  '    C   
 C  C   ! I   *'  ' '       ' 
(     
/ @ !



 





Delitos Informticos

!+!!$+!.
3  ( * 
C       
       
      C    
 
C 
 C  
  C !&(    C   
(    
V       *  C
    (                   
   !
% *    ( " 
   *(        
 "   *      (         )        
! B     '               
           J )(    
           A       * 
   '!
B  
  ' "    
 "   
    '   (
       
' (! 1&  (
    *         ' (  (
    55 (
 55 
 )  1 
( (     9"    ( " (   !
+$)$1!$%11.$
B                    
         '           )  
 *(' " " )) 2  '     
!H (  !
/4 7@   /  )
) '  
 ! / .   % 
 /  
   
("    C  
   4 
          
      )     *  " )  2  
*('(  
 )(     ' 
(   !
/J/  J*('$* 
 *     )
    ' )  2    (    )    "   
(
  (    )  (   (    (         

   *         1
  % )1! %
    
    ')2'   !
/ " .  3>.50? 
  (*  
(      1("  1! / .   '  
 "   
   C     *               
   *"   * ( *   ))  
   ' ) ! %
  '    "      
             (    ("     




 



Delitos Informticos
       '          
     
 (   ) 
  
!
/.  3>.50?     '
 M 
" "   (     )!/ )
 *(    /          ' *  )  
  "      *  (  '   
  
 '!
@
C )  '  ( .  3>.50?
 *     ( "    2     ) 
  "(    
A   
 '55
  55   (      !
$$$+
 L!$
B       *      
   *         
     ' 

   '
 (    '!
 .L1
B     1

   '1    *"  
     '      '     "    
("  (   ! /          
  
    
)     !$
 C2      *  (!
 .L%)$1
B           ' 
   )
   

          )     A )   
      !
 6&6!6$6$)
B (9  * J  
**    ( )   
 *     *! B 1
1    (        * 
  C      *      ) 
  "            
 *      !
 51
B      *             1 1
 '   (  (A (    ( )
   !/  D*4,*'  (   
              %  &    2  
(   )  
 J *A  (   !


 





Delitos Informticos

 &5>$
B  
'  ( "     * J C
 !       9  A          ' 
'   ( "         M  9   "
   ! /  
   ( *     * ("   
 ( "   *       ( " )  C   1*1  
   *!
 !59
/ (  '                   
 
       )         L ! B  
    
"    (           2( !
$  C (   (     *  )
   9 *'!
 !
H                   ' 

 ) *    *         (  
2   '!
 #$8!
&    '*(     ' 
 "   * (  
  
  !
<  )  '  F
!
&)9$  L!)
3   7 @   I '   ( )  < *' 

<!3!=26
$5 MW$ 
%F>ME ?56
I2F>ME ?5606
 5F !g ! (
#$$
$1+&:.$
&'  ) 8 
   J '<A
 7@ 
3&5 M
7@ 
7*H ,7H  //!@@!
%F> ?E5E6E
I2F> ?E5 0
 5Fg! (





 



Delitos Informticos
& 0   
)!$G L)
&H4$7%/5 6 ( 5J  "F
&    
   @ !  ' *  >      
 
     9"?! &   *       * (  ' 

*    ' ) 9    *  (      

(   !
/  *
(  !/   
  *      '   '>F
%  <   )J  B 5%       '  
$  &) J  & ) < -   ?!P8
C (   ' *   " 'Q
4       C 2          
 ' )  A       ! /    9" 
,( I         M6
  '      
  
  *>F%  <   )J B5%   
  '   $   &)   J   & ) 
< -   ?!B(" J     *
  
  '  ( !B      
  
    (     9"       (            )

  !
B ' C* C     ')  
    C      )  "  
       " 
      (             '    
*   >) ' *    
?!$
 C 

    *    
         ( (       
"  )   *!
$       (  (     A           
      ) 2  ) '    ("  C C
 !
&1+$G!15
&(A      9 I=J)   & )
J                    '
  )  )  (     (      *! /  b  
 9"                  ! /
     *   '
  '  ( ! & 
 ( "    2  (     
 
* 
        ' !



 





Delitos Informticos

&$5$+$8!1+
$
/ '        2       ( 
    *!

. / 


      
      ( 
(             C  
 
 '  ( !

5>$B '           


     >)        '
     ?  *( '    '
   '  ' 
 
 '  !

)  5!   *      "     
 ) *(* 
  '!

/      


  )
  *(
                 '  (  
 ! <               "    ( '
                  
      
 C        !B *' "  )
 '      (       
   "! B
"      ( '       '       
  ) 
    *   *       '   ' 
    
 " ! 3    ( "       

  '  ' 9 *     
             '   
'         ( '!

%!  $ L    $    
1+$)U
@  ) (     '   '*   
 "!B(  @
 * 
  "!
&           '        (  
@( (    ')    

 ')
 
  ' !  *
       @ *  '       
  )  , ((  '!/ 
    
     
        )  9"
    *    2) >      *       ?    ( 
  *)-  !/ ' 
      ( ' (      *
   !





 



Delitos Informticos
B (   '           "   
  9
     '     *     (  
   '
  ( !@ A
  1"    1
 $  ! ! $  !   (       )     
 '  (        
  C   ! /  '  "         ( 
 '    
  ' *    
   
  * !

$!G >K
/    *             (  
 C
'     '*  "   
               " 2       
  ' , !B* 
      
      2         C *     
 ' ( 
!
/     " 2        (      
 ( (F
! O/2*  (        9
 
  
  =3D)&$%$7)) , 
    !B ) "      9C  

 
   )

  !B (        9 
 
 
 

 
 !&    
       " C               "
!< 2 
  2*  
*F
  9  0   
'  

   9   E " )
       9
   !
! &!  % .$$  % / 
    (    
        )     
      ( '(     
)     ! 7= =, 3  )   =3D         
            *"  ) *    
'  !
=3D             C    
'         ! 7         
*    (  #
    * 
  (  
(!    
   *     
 C         '
!3        (( 
  
 
               "     
 (  ' '   !



 





Delitos Informticos
E! $6$6 
 (     *
 *           " 
    '   ! B
  '    )          
 )  *    !
M!  5> $        
    '  C
      ! / *              
 (      *   '!<  
 (      *   ( 
      (
      ) !/   
 *"        
 ! /  

    (
          )  *" C     ! /
       
    "   *   ! B
"   
       *          
 ( 9  (    '        
  
 )         ( '! B        
      
*     "   
  C
 '       )
   !$
( "(         
      
            
    (           
   '  ( ! B
 '    9  *)G    
 "  ("!
+1 ! $ )!$.$ 8! !  $ !+ 
1+
/   * 
         "     (   ' 
  #
  ')*    
J     )   *(  ! $          
      
       "     ' 
    C) *' "  !  (  
 
 (   ' "2  * 
     ' 
 *  )    *   ' ) 9    
  ')  C       !
B 
 (F

/        C     ' )  J        
 '       *    ! /       
J  )           #
        (  
        '! /        '       
  '   '     *     '   
 ' '  ( !

/    *     ) 


A   
 
% ))  C    *>) 
   ?
 *       !





 



Delitos Informticos

B   -   '    C2* 


    C   (    !/     
  
            ' )     
!

B *' * 


   
 C    
           (    )  * 
     
        ! $)  C          

  "   "    )    !

B   '    )  C            
'    ( '   !/  )  

  
  (      @ !        
*   )   
   ! /        
  C(      C       
  *!/ ) 
     ('  !

%!$
1+$L!$$L
/  /  /( $ >$   ' ?   )   
   "  *)        
  !&    '  ('
 '     '   ! B     
 *     '   ) 69  '!
   *( 
     //!@@! ( 
*  )  (  *           C 
 ) ) '   *   C    ' !
$  C   '       )         *(
  
 $  '     (   
 (          A
 )       ! $   
   "   * (   ! 
  ' )  C  C  "!
$       ,    *         
              
 (     '     
( !
/    * '
  


   ! 4 2          C    
    A
( J ) ("
 ' (   "    = ! B '   (     
(             (    
   ! $   
      '     
     "     '     '!



 





También podría gustarte