Indd 851 1242009 113905 am all in 1 cissp all in one

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ture credit card numbers, Social Security numbers, and personal information to carry out fraud and identity theft. ch10.indd 851 12/4/2009 11:39:05 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 CISSP All-in-One Exam Guide 852 N OTE NOTE Script kiddies are hackers who do not necessarily have the skill to carry out specific attacks without the tools provided for them on the Internet and through friends. Since these people do not necessarily understand how the attacks are actually carried out, they most likely do not understand the extent of damage they can cause. Common Internet Crime Schemes • • • • • ch10.indd 852 Auction fraud Counterfeit cashier’s check Debt elimination Parcel courier e-mail scheme Employment/business opportunities 12/4/2009 11:39:05 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 Chapter 10: Legal, Regulations, Compliance, and Investigations 853 • • • • • • • Escrow services fraud Investment fraud Lotteries Nigerian letter, or “419” Ponzi/pyramid Reshipping Third-party receiver of funds Find out how these types of computer crimes are carried out by visiting www .ic3.gov/crimeschemes.aspx. We have already seen a decrease in the amount of viruses created just to populate as many systems as possible, and it is predicted that this benign malware activity will continue to decrease, while more dangerous malware increases. This more dangerous malware has more focused targets and more powerful payloads—usually installing backdoors, bots, and/or loading rootkits. So while the sophistication of the attacks continues to increase, so does the danger of these attacks. Isn’t that just peachy? Up until now, we have listed some difficulties of fighting cybercrime: the anonymity the Internet provides the attacker; attackers are organizing and carrying out more sophisticated attacks; the legal system is running to catch up with these types of crimes; and companies are just now viewing their data as somethin...
View Full Document

Ask a homework question - tutors are online