2.5 KiB
2.5 KiB
#public
- Cyber Crime: Use computer/digital device to further illegal ends
"nothings black and white in what we do, everything's got some gray"
Types of crime
- Crimes Against People: A digital crime where the victim is a person
- Crimes Against Property: A digital crime that damages, or illegally interacts with property
- Crimes Against Government: A digital crime to undermine the efficacy of a government
Life is not Black and White, Consider what the greatest impact is
| Crime | category |
|---|---|
| Harrassement | People |
| Stalking | People |
| Credit Card fraud | People |
| Id theft | People |
| DOS attack | Property |
| Hacking | Property |
| Vandalism | Property |
| Cyber Warfare | Government |
| Cyber Terrorism | Government |
Online Harassment is a growing field, stalking, bullying, doxing, etc.
Modern wars be started with infrastructure hacks, Power grid hacks of Ukraine, Iran, Etc.
Cyber-stalking and bullying
- Cyber Bulling: People attacking reputation and self esteem of other people trough online means like social media campaigns.
- Cyber Stalking: Stalking someone through their online footprint. Often to find information with which to exploit the victim.
Typically older person stalking a younger person. As opposed to bullying, which is usually across the same age
Cyber Terrorism
- Cyber Terrorism: Politically motivated attacks on major infrastructure Money can be a factor, but usually the political is the primary motivation
- Instill fear in a society to elicit some reaction
- financial/reputation gain
- revenge
- etc.
Examples
Stux-Net Nation-state attacks on power grids before Wars
- Sneaker Net: Moving information across barriers physicality
proving an attack is one of the hardest questions to answer
U.S. National cyber strategy
- U.S. National cyber strategy: anually updated policy document from the white house detailing the national cyber objectives
it has been similar last few years
- promote American people
- promoting American prosperity
- preserve peace through strength
- deterrent
- advanced American cyber influence
- strong alliances
- promote international policies
- Shaping adversary behavior
- regulatory environment
- Federal government security
- criticial infrastructure security
- cyber skills workforce gap