This study presents some methods of operation related to the offense consisting in the unauthorized access to a computer system, which is stipulated in article 360 of New Romanian Criminal Code (Law no. 286/2009). Since the material element of the offense is represented by the unauthorized access to a computer system, there are several methods to achieve this access that can be analyzed, such as password attack, trusted access attack, exploitation of technological
weaknesses, shared library attack, IP attack or TCP hijacking attack.
European Union Law
Administrative practices as an infringement of the law of the European Union
Overview on the criminal justice system in Bulgaria. Comparative law. A Bird’s Eye View
The profession of legal advisor in european countries
Legal regime of competition in Slovenia
International Law
Ruscism – A threat to international legal order and the security of all humanity