Documente Academic
Documente Profesional
Documente Cultură
Internet Crime
1.
2.
3.
4.
5.
6.
Year
2003
2002
137,529
82,094
2001
2000
52,658
21,756
1999
9,859
1998
3,734
1997
2,134
1.
2.
3.
4.
Virus
Worm
Trojan
Horse
Botnets
Denial-of-Service Attacks
Rootkits
Spam
Phishing
Chapter 3 - Computer and
Internet Crime
The
Viruses
10
11
12
Zombies
13
14
15
16
Type of
perpetrator
Objective
Resources available to
perpetrator
Level of risk
taking
acceptable to
perpetrator
Frequency of
Attack
Hacker
Limited
Minimal
High
Cracker
Limited
Moderate
Medium
Malicious
Insider
Knowledge of systems
and passwords
Moderate
Low
Industrial spy
Minimal
Low
Cybercriminal
Financial gain
Moderate
Low
Cyberterrorist
Very high
Low
17
18
Crackers
code.
Malicious insiders are a security
concern for companies.
Insiders may be employees,
consultants, or contractors.
They have knowledge of
internal systems and know
where the weak points are.
Chapter 3 - Computer and
Internet Crime
19
20
21
22
23
24
25
26
Incident containment
-
27
Incident eradication
Before the IT security group begins the
eradication effort, it must collect and log all
possible criminal evidence from the system,
and then verify the all necessary backups
are current, complete, and free of any virus.
Creating a forensic disk image of each
compromised system on write-only media
both for the later study and as evidence can
be very useful.
28
Incident
-
follow-up
29
Business
managers, IT
professionals, and IT users all
face a number of ethical
decisions regarding IT security.
The increased complexity of the
computing environment has led
to an increase in the number of
security related issues.
Chapter 3 - Computer and
Internet Crime
30
31
32
On
33
Visa-branded
34