ATTACK TOOLS FOUND ON THE INTERNET AND USED PRIMARILY TO ATTACK INTERNET-CONNECTED TARGETS.USING THE GII, INTERNET, AND NII TO SEARCH FOR TOOLS.OTHER COMPUTER-RELATED TECHNIQUES USED BY BOTH INSIDERS AND OUTSIDERS.BASIC USE OF PHYSICAL AND HUMAN INTELLIGENCE COLLECTION METHODS: THEFT AND SOCIAL ENGINEERING.HIGH-TECHNOLOGY MISCREANTS’ BASIC APPROACH TO ATTACKING NETWORKS*.SOPHISTICATED DRUG DEALER USE OF HIGH TECHNOLOGYĬhapter 3: The Basic Techniques Used by High-Technology Crime Miscreants.INFORMATION WARRIORS AND CYBER WARRIORS. INDUSTRIAL AND ECONOMIC ESPIONAGE DEFINED.HIGH-TECHNOLOGY ECONOMIC AND INDUSTRIAL ESPIONAGE ON THE INTERNET-NETSPIONAGE.TERRORIST TECHNOLOGY THREAT ENVIRONMENT.PROFILE OF THE HIGH-TECHNOLOGY AND INTERNET FRAUDSTERS.HACKERS, CRACKERS, AND PHREAKERS, OH MY!.WHO ARE THE HIGH-TECHNOLOGY MISCREANTS AND OTHERS ON THE INTERNET?.AN EXAMPLE OF A CORPORATE EMPLOYEE AND THE “CRIME TRIAD”.REQUIREMENTS TO COMMIT A HIGH-TECHNOLOGY CRIME.A BRIEF HISTORY OF HIGH-TECHNOLOGY CRIME AND ITS ASSOCIATED MISCREANTS.THE THREE BASIC STEPS OF COMPUTER OPERATIONSĬhapter 2: High-Technology Crime Miscreants: Profiles, Motives, and Philosophies.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |