Legal Aspects of Investigations - Computer Crimes - CISSP - Security and Risk Management
Автор: Daniel Meyer
Загружено: 2018-02-05
Просмотров: 38
Описание:
------------------------------------------------------------------------------------------------------
Security and Risk Management: Legal Aspects of Investigations: Computer Crimes
------------------------------------------------------------------------------------------------------
**I Am NOT An Expert! **
As a method of studying for the CISSP, I am attempting to briefly explain the concepts I am learning in an an effort to help me, and perhaps fellow students.
For an overview of my plan have a look here: • CISSP - Learning Through Teaching - Introd...
Please take everything with a grain of salt.If I'm missing something or focusing on the wrong aspect of a concept or term, please post your comment to let me know.
------------------------------------------------------------------------------------------------------------
Legal Aspects of Investigations: Computer Crimes - Notes
There are three different categories of computer crimes:
Computer Systems as Targets: When the system itself is under attack . . .
o DDOS attacks
o Malware
o Exploiting a vulnerability to store illegal content
Computers As Tools: When the computer is the tool used to perpetrate the attack
o Stealing credit card information
o Hacking into a database to steal PII
o Using computers to harass people via social networks
Computers Used But Incidental: Computers are so much a part of our lives that the computer may just be substituting some real world thing:
o If you used computer sticky notes to store your victim’s names and phone numbers
It just means it’s being held there.
Could have been a piece of paper, so it’s incidental
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: