This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ture credit card numbers, Social Security numbers, and personal information to carry out fraud and identity theft. ch10.indd 851 12/4/2009 11:39:05 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 CISSP All-in-One Exam Guide 852
NOTE Script kiddies are hackers who do not necessarily have the skill to
carry out specific attacks without the tools provided for them on the Internet
and through friends. Since these people do not necessarily understand how
the attacks are actually carried out, they most likely do not understand the
extent of damage they can cause. Common Internet Crime Schemes
• ch10.indd 852 Auction fraud
Counterfeit cashier’s check
Parcel courier e-mail scheme
Employment/business opportunities 12/4/2009 11:39:05 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 Chapter 10: Legal, Regulations, Compliance, and Investigations 853
• Escrow services fraud
Nigerian letter, or “419”
Third-party receiver of funds Find out how these types of computer crimes are carried out by visiting www
We have already seen a decrease in the amount of viruses created just to populate as
many systems as possible, and it is predicted that this benign malware activity will continue to decrease, while more dangerous malware increases. This more dangerous malware has more focused targets and more powerful payloads—usually installing
backdoors, bots, and/or loading rootkits.
So while the sophistication of the attacks continues to increase, so does the danger
of these attacks. Isn’t that just peachy?
Up until now, we have listed some difficulties of fighting cybercrime: the anonymity the Internet provides the attacker; attackers are organizing and carrying out more
sophisticated attacks; the legal system is running to catch up with these types of crimes;
and companies are just now viewing their data as somethin...
View Full Document
- Fall '12