CISSP Security & Risk Management- Computer Crimes
Computer as incidental to other crimes
- Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect.
- Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.
Crimes associated with the prevalence of computers
- Includes crimes resulting from the popularity of computers
- Crime of this category are usually traditional in nature, but the targets are ever evolving
- Examples include copyright violations of computer programs, software and movie piracy, and black marketing of computer peripherals.
Computer as incidental to other crimes
- Involves crimes where computers are not really necessary for such crimes to be committed. Instead computers facilitate these crimes and make them difficult to detect.
- Examples of crimes in this category may include money laundering and unlawful activities on bulletin board systems.
Crimes associated with the prevalence of computers
- Includes crimes resulting from the popularity of computers
- Crime of this category are usually traditional in nature, but the targets are ever evolving
- Examples include copyright violations of computer programs, software and movie piracy, and black marketing of computer peripherals.
Please bear in mind that although computer crimes can be categorized, a single criminal transaction can result in multiple crime categories. Therefore, there can be an overlap between such classifications.
Motivation for Computer Crimes
- Grudge (against a company or an individual
- Political reasons (terrorist activities, info warfare)
- Financial reasons
- Business (competitive intelligence)
- Fun (script kiddies)
M -motive
O – opportunity
M – means
To Become Certified For CISSP Please Visit This Link;