This category is referred to as computer is

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: as carried out. This category is referred to as computer is incidental. Some examples of computer-assisted crimes are • Attacking financial systems to carry out theft of funds and/or sensitive information • Obtaining military and intelligence material by attacking military systems • Carrying out industrial spying by attacking competitors and gathering confidential business data • Carrying out information warfare activities by attacking critical national infrastructure systems • Carrying out hactivism, which is protesting a government or company’s activities by attacking their systems and/or defacing their web sites Some examples of computer-targeted crimes include • Distributed Denial-of-Service (DDoS) attacks • Capturing passwords or other sensitive data • Installing malware with the intent to cause destruction • Installing rootkits and sniffers for malicious purposes • Carrying out a buffer overflow to take control of a system N OTE NOTE The main issues addressed in computer crime laws are unauthorized modification, disclosure, destruction, or access, and inserting malicious programming code. Some confusion typically exists between the two categories—computer-assisted crimes and computer-targeted crimes—because intuitively it would seem any attack would fall into both of these categories. One system is carrying out the attacking, while the other system is being attacked. The difference is that in computer-assisted crimes, the computer is only being used as a tool to carry out a traditional type of crime. Without computers, people still steal, cause destruction, protest against companies (for example, companies that carry out experiments upon animals), obtain competitor ch10.indd ch10.indd 847 12/4/2009 11:39:05 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 CISSP All-in-One Exam Guide 848 information, and go to war. So these crimes would take place anyway; it is just that the computer is simply one of the tools available to the evildoer. As such, it helps the evildo...
View Full Document

This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.

Ask a homework question - tutors are online