Posted filed under CISSP.

Computer as incidental to other crimes

  • Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect.
  • Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.

 

Crimes associated with the prevalence of computers

  • Includes crimes resulting from the popularity of computers
  • Crime of this category are usually traditional in nature, but the targets are ever evolving
  • Examples include copyright violations of computer programs, software and movie piracy, and black marketing of computer peripherals.

 

 

 

Computer as incidental to other crimes

  • Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect.
  • Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.

 

Crimes associated with the prevalence of computers

  • Includes crimes resulting from the popularity of computers
  • Crime of this category are usually traditional in nature, but the targets are ever evolving
  • Examples include copyright violations of computer programs, software and movie piracy, and black marketing of computer peripherals.

 

 

Please bear in mind that although computer crimes can be categorized, a single criminal transaction can result in multiple crime categories. Therefore, there can be an overlap between such classifications.

 

Motivation for Computer Crimes

  • Grudge (against a company or an individual
  • Political reasons (terrorist activities, info warfare)
  • Financial reasons
  • Business (competitive intelligence)
  • Fun (script kiddies)

M -motive

O – opportunity

M – means

 

 

 

To Become Certified For CISSP Please Visit This Link;

Trackbacks/Pingbacks

  1.  DMPK