Home  >  Cyber Crime  >  Crimes with Information Network Infringement

Crimes with Information Network Infringement

Crimes of Information Network System Infringement

Cases of intrusion into computers or information network systems (computer systems) without justifiable access privileges or access which exceeds permitted access privileges or causing damage, destruction, or alterations to systems, data, programs and causing disruptions (impairing performance or causing system failures) in communications networks (computer systems).

※ Includes a high level of technical elements and are crimes which entail direct attacks on computers and information network systems which may or may not use information network systems as a medium

Hacking

Actions involving intrusions upon information network systems without justifiable access privileges or access which exceeds permitted access privileges. (Information network regulations – includes hacking in a narrow sense and account theft)

※ Actions which involve bypassing the access control policies of resources such as computers or networks using abnormal methods or accessing after disabling them (definition of cybercrime manual).

Account theft

- Cases of randomly using another person’s account (ID, Password) without justifiable access privileges or access exceeding allowed access privileges

※ Currently, game account theft and general account theft are being counted separately but will be combined under account theft since separate classification is not useful

Simple intrusion

- Intrusion into computers or information networks without justifiable access privileges or access exceeding allowed access privileges

Data leak

- Leaking data after intruding into computers or information networks without justifiable access privileges or access exceeding allowed access privileges

Data damage (deletion, alteration, etc.)

- Damaging (deleting, altering, etc.) the information of others (including homepage modification) after intruding into computers or information networks without justifiable access privileges or access exceeding allowed access privileges

Denial-of-Service Attack (DDoS, etc.)

causing communication disruptions (system failure, performance impairment) by sending massive signals or data to an information network or by making the network handle wrongful commands

Malicious programs

The transfer or circulation or programs which can damage, destroy, alter, forge or disrupt the operation of information systems, data, or programs without justifiable reasons

Other Information Network System Infringement Crimes

  • Not classified as one of the three categories of crime related to information network system infringement mentioned above
  • Or, is a new form of crime which infringes upon information network systems and has not existed before
《 Examples of Other Information Network System Infringement Type Crimes 》

* Disruption of business through computer impairment (Criminal Law Section 314, Article 2)

  • Disrupting business by causing impairment of data processing by entering falsified information or wrongful commands into a computer or data processing device or by using other methods through information network systems (computer network)
  • However, cases of disrupting business by physical destruction of data processing device such as computers or special media records such as electronic data are excluded from being classified as cybercrime (destroying a computer with a hammer, etc.)

* Issuing another person’s certificate verification (Digital Signature Act Section 31, Clause 3)

  • Issuing or making it possible to issue certificate verification of another person under disguised ownership through information network systems (computer network)