Objectives: |
The developments in the field of information and technology, especially in recent years, have provided humanity with significant opportunities, but have also created a new environment for criminals. In this area, where various terms such as cyberspace, and cyber environment/area are used, criminals can access vast criminal resources very easily and mostly free of charge. For this reason, criminals are rapidly transitioning from the physical environment to the cyber environment. Among the important factors of this transition are the delay in the creation of legal definitions regarding the new criminal environment, the relatively low number of penal sanctions, and the difficulty of identifying the criminal. In this context, this course aims to provide students with information about crimes committed in the field of information. |
Content: |
Introduction to cybercrimes, Entering and staying in a computer system, Blocking, disrupting, destroying or changing data in a computer system, Abuse of bank and credit cards, Fraud over the Internet, Searching, copying and seizing computers, computer programs and files, Expertise in the Field of Information Security, Law No. 5561 and Internet access restrictions, Electronic Commerce Law, Personal Data Protection Law (KVKK), Responsibility of Internet service providers, Concept of data and protection of personal data, Comparative examination of computer law, European Cybercrime Convention and Council of Europe Digital Evidence Guide, Fundamentals of computer forensics, Environments where evidence can be found, Computer forensics tools, Traffic analysis; Examination of Case Studies. |