Lesson
1 Lesson 2 Lesson 3 Lesson 4 Lesson 5 Lesson
6 Lesson 7 Lesson 8 Lesson 9 Lesson 10
Software engineering | Программная инженерия
Lesson 5
Read the text: The computer technology is used in the criminal cases of financial-banking sphere.
Nowadays computers are widely used for information storage and processing. They are also used in criminal activity. During larceny or embezzlement investigation, economic crimes in financial-banking sphere there are computers, which serve either as object of a criminal encroachment or served as instruments for committing crimes and possess criminal action trace. Thus, during investigation actions such as examination or inspection, search, seizure, reconstitution of conditions and circumstances on different categories of criminal cases, during investigation of computer information sphere, a new object of investigation and research can be identified – computer technique, and object of a search can be identified as information stored in the computer memory or external carriers – disks, diskettes etc. It is important to implement specialized knowledge for obtaining full and complete information concerning committed crime.
The use of special knowledge and technical methods by investigator, prosecutor-criminalist and by court differs from other forms of their implementation by its remedial and criminalistic orientation on collecting, recording, research, and use of actual database of a specific crime circumstances and of guilty persons involved in it, remedial order of investigatory actions. Investigator (prosecutor-criminalist) applies his professional criminalistic knowledge, methods, techniques and criminalistic techniques means with the purpose of finding, recording and seizure of evidence. Conditions and result of their implementation are recorded in the investigatory actions minutes and by criminalistic methods of recording (such as photographs, moulds, sound –and video recordings etc.).
The form of special knowledge use by investigators on pre-judicial trial has its peculiarities.
Realization of any investigatory action requires thorough preparation that is explained by computer means peculiarities. The site crime survey includes: a) preparatory; b) working and c) final stages, which have their own goals and tasks.
It is very important to get the following data during the preparatory stage of survey or search: IBM configuration; organization of a local network or connecting to the global network (such as Internet); information safety service availability; data protection from unauthorized access with the purpose of automated information deleting, which can be deleted during opening of a computer body, of a room where computer is located or under other circumstances; conditions of a water supply system of the premises where computer engineering is installed, users’ qualifications, and correlation among those employees who operate the technique. It is necessary to make out a plan of survey conducting on preparatory stage
A high level of computer protection can be characterized by a special information protection system from an unauthorized access or certified means of protection; permanent territory and premises guarding and security where the computer system is located: by technical means and specially trained staff, strict pass procedure, special premises equipment, information protection service, normal functioning and control of the work.
Low level of protection determined by a casual algorithm of access limitation (database is protected by a password), it’s easy to obtain data on how to get through the password so it’s not necessary to apply special access techniques.
1. Match the left part with the right:
a) to make out a plan of survey conducting on preparatory stage. |
|
2. It is necessary |
b) can be characterized by special information protection system. |
3. The use of special knowledge and technical methods by investigator, by court |
c) are recorded in the investigatory actions. |
4. Conditions and results of their implementation |
d) differs from other forms of their implementation. |
2. Complete the sentences with the suggested words: preparatory, requires, goals, peculiarities
Realization of any investigatory action _____ thorough preparation that is explained by computer means _______. The site crime survey includes: a) ________; b) working and c) final stages, which have their own _______ and tasks.