There is no doubt that the computer has become an indispensable tool for human development, but it is more surprising how fast the information superhighway (Internet) has managed to captivate millions of fans to its different and diverse services, and Either from the well-known and requested e-mail, to shopping services on the Web, which allow a series of virtual visits in which the products that are to be acquired are selected and keep track of the objects we select (Gerdes, 2009).
Thanks to all this computer technology we can make use of many of these services freely with the simple fact of connecting to the Internet, through a telephone line and a modem. Unfortunately, technology has not only been used for the benefit of man, but some unscrupulous individuals have crossed the boundaries of security and have performed illicit acts, which has generated a great concern on the part of users of this computer medium , And many of them have been given the task of finding a solution to this problem of computer crime (Graham, 2010).
Throughout this research work will be able to obtain information on the different concepts that have been given by some experts in the field of Computer Crime, how to classify them, also some organizations dedicated to this subject that in few countries have been able to establish For the control of this type of crime, as well as the general vision that has been given to this problem in our country and the legal conditions in which we currently live in this area (Graham, 2010).
Beyond questioning electronic fraud or computer crime, it is necessary to unravel the behavior and behavior of individuals (Halimahton Shaari, & Ismail Sualman, n.d.). Know why it is so attractive for a person to join social networks. What is your motivation? What are you looking for? Why are you doing this? How do you act? What is your way of thinking? What is your world like?
An individual may have different behaviors in the "real world" and in the "virtual world", which motivates this writing to generate a small orientation in the responsible use of the ICT, and especially of the information and the intimacy in the social networks (Hansson, 2008).
That amount of benefits captivated the majority of frequent internet users in the world. Its growth has taken place exponentially and people, without noticing the possible consequences, provide sensitive personal information that can be used by cybercriminals.
Two causes are identified for which the crimes are committed. One subjective, which is linked to culture, is the neglect of one's own information, and another objective, linked to the technical factor of security for not taking into account measures of technological protection, such as proper use of programs, firewalls (part of A system or network designed to block unauthorized access, which allows, at the same time, authorized communications), antivirus, among others (Higgins, & Packard, 2004).
For example, the laws of Habeas Data (6) and "Computer crimes" in Colombia (7) (Laws 1266 of 2008 and 1273 of 2009, respectively) establish the procedures for the collection, maintenance and updating of information in the plants Of information (data banks) and contemplate violations such as the impersonation, the violation of the right to privacy and the collection of information for sale.
The concept of "information security" involves two fundamental terms within its definition: risks and vulnerabilities, both closely linked. The exploitation of vulnerability within a computer system brings risks of all kinds, which must be minimized (Hynson, 2012).
To a residual risk that is easily detectable and controllable thanks to an adequate contingency plan. By containing delicate personal information from its users, social networks represent a perfect scenario for computer criminals thanks to the many vulnerabilities, due mainly to the Ignorance of those who use them. In the vast majority of cases, users, without measuring consequences, offer in their profiles such important data as their work history, current position, telephones, emails and even residence address (ICT, 2009). Obtained by third parties with bad intentions through the development of simple applications or supplanting identities. Likewise, spam numbers, outdated identities and other electronic frauds reach alarming levels in social networks. Social networks Social networks often allow plurality and community to be conjugated and there, perhaps, this large part of all the energy that It gives life to the human groups that make up these networks. Social networks give anonymous popularity, discriminated integration, different equality, ill-humored education, and so many more things. The strength of the group allows the individual to change, Another way, they could be difficult and generate new affective and business bonds (ICT, 2009).
Basically, its operation begins when, once the technical support is set up, a group of initiators invites friends and acquaintances to join the social network; Each new member can bring with it many new members and the growth of that social network can be exponencial. The social networks have been part of an interesting phenomenon of massification among Internet users, which has made the growth of registered people is immense and It becomes practically impossible for its administrators to exercise an efficient control over the exposure of the data of many of them (Mendina, & Britz, 2004). Terms and conditions in social networks is a privacy agreement that must be accepted by a user in any social network at the time of registration , Contains the rights and duties and includes aspects such as privacy, information and content to share, security, registration and security of accounts and responsibility in the handling of information. Although there are many other aspects that should be taken into account, but Which usually are not given attention. Is that the social network allows to carry out looking for the protection of the data of all the users that include the visibility of the information and other fundamental aspects for someone concerned by its confidentiality. Risks and vulnerabilities of the social networks Vulnerabilities are weaknesses of a system Which represent a risk to its users and which allow the attacker to violate the confidentiality, integrity and availability of stored information. Most of the time these risks are measurable and mitigatable, leading to an It is also stated that it is impossible to eliminate a risk, that is why procedures are created to make them known and to avoid their materialization. Vulnerabilities can originate in any of the following aspects: Spaces or physical elements such as areas of work of the users, location of servers, wiring, etc. That the users, As people, can reveal important information many times without knowing it, even after being warned (O'Byrne, 2006).
In the access keys the complexity of the combinations is essential, if there is obvious and little change this element of security will become a vulnerability. Poor programming, Because in some cases, developers are not focused on equipping their software with good security, this creates holes that can be easily exploited by malicious people. Poor infrastructure in some networks does not have adequate equipment to prevent possible attacks. In data integrity the lack of copy or redundancy can cause losses. Social networks, being a computer system like any other, have dangerous vulnerabilities due mainly to its users. It is they who are exposed to different threats and their lack of knowledge can often lead them to reveal personal information, probably collected by those who surely do not have the best intentions (O'Byrne, 2006). Social networks are, therefore, a favorable scenario for those who pretend to attempt Against the security of information of many people; In addition, users are, in most cases, unaware of the risk they incur by openly disclosing information of wide interest to offenders, a situation that has helped proliferate such practices.
That it knows that its data are exposed to the whole public. Much has been argued about the limits of the law and the application of ethics and N compliance. When a programmer takes advantage of the advantages he has over all those who do not have advanced computer skills, he is not violating any law, worse when those people have agreed to make their data available to a third party, so be it involuntarily (Taylor, 2006) .However , The question arises, is that programmer ethical? The issue goes beyond the scope of legislation and depends solely and exclusively on the conception of good and evil of each person. A practical example is the pedestrian crossing a dangerous avenue without using the pedestrian bridge located a few meters from the place. The law may protect the one who tramples him under the argument of the irresponsibility of the pedestrian by not crossing the bridge. Hypothetically, it could appear that anyone wants to take advantage of the situation by trampling his enemy when he is in a situation as described (Taylor, 2006). In theory, that person will be protected by law, but, certainly, his action was unethical in view of the intentionality of murdering his enemy. It is necessary to emphasize that it is not the instrument - in this case represented by the Social networks - the threat to the security or confidentiality of people and their data. It is the users who can qualify this instrument making it a useful and entertaining tool or a threat for the majority of the population without much interest in informatics subjects.
Therefore, the application of ethics and, in general, education about good Customs becomes a transcendental element when it comes to making available to the population something as powerful and universal as social networks. It is not social networks a tool created to violate the law and commit all kinds of crimes, on the contrary, are A useful and powerful interface of interaction and entertainment that, unfortunately, some of its users have been turning into a space where it is necessary to be cautious with personal data (Townsend, 2012). The action of the users is out of the reach of the administrators of a social network, because It is virtually impossible to control each of the millions of people with active accounts. For example, ignorance among Australian users of the risks related to social networks, as well as all the opportunities they provide to protect their privacy is a worrying aspect that must be attacked to avoid the increase of illegal acts of which they themselves are victims.
Gerdes, L. (2009). Cyber crime. Detroit: Greenhaven Press.
Graham, I. (2010). ICT. London: Evans.
Grant-Adamson, A. Cyber crime.
Halimahton Shaari, & Ismail Sualman. Issues in media and communication.
Hansson, T. (2008). Handbook of research on digital information technologies. Hershey, Pa.: Information Science Reference.
Higgins, S., & Packard, N. (2004). Meeting the standards in primary ICT. London: RoutledgeFalmer.
Hynson, C. (2012). Cyber crime. Mankato, Minn.: Smart Apple Media.
ICT. (2009). Oxford.
Mendina, T., & Britz, J. (2004). Information ethics in the electronic age. Jefferson, N.C.: McFarland & Co.
O'Byrne, S. (2006). Information & communication technology. London: Letts.
Taylor, J. (2006). ICT. London: David Fulton.
Townsend, J. (2012). Cyber crime secrets. Mankato, MN: Amicus.