Files
blog/public_vault/Cyber-Crime.md

2.5 KiB

#public

  • Cyber Crime: Use computer/digital device to further illegal ends

"nothings black and white in what we do, everything's got some gray"

Types of crime

  • Crimes Against People: A digital crime where the victim is a person
  • Crimes Against Property: A digital crime that damages, or illegally interacts with property
  • Crimes Against Government: A digital crime to undermine the efficacy of a government

Life is not Black and White, Consider what the greatest impact is

Crime category
Harrassement People
Stalking People
Credit Card fraud People
Id theft People
DOS attack Property
Hacking Property
Vandalism Property
Cyber Warfare Government
Cyber Terrorism Government

Online Harassment is a growing field, stalking, bullying, doxing, etc.

Modern wars be started with infrastructure hacks, Power grid hacks of Ukraine, Iran, Etc.

Cyber-stalking and bullying

  • Cyber Bulling: People attacking reputation and self esteem of other people trough online means like social media campaigns.
  • Cyber Stalking: Stalking someone through their online footprint. Often to find information with which to exploit the victim.

Typically older person stalking a younger person. As opposed to bullying, which is usually across the same age

Cyber Terrorism

  • Cyber Terrorism: Politically motivated attacks on major infrastructure Money can be a factor, but usually the political is the primary motivation
    • Instill fear in a society to elicit some reaction
    • financial/reputation gain
    • revenge
    • etc.

Examples

Stux-Net Nation-state attacks on power grids before Wars

  • Sneaker Net: Moving information across barriers physicality

proving an attack is one of the hardest questions to answer

U.S. National cyber strategy

  • U.S. National cyber strategy: anually updated policy document from the white house detailing the national cyber objectives

it has been similar last few years

  • promote American people
  • promoting American prosperity
  • preserve peace through strength
    • deterrent
  • advanced American cyber influence
    • strong alliances
    • promote international policies
  • Shaping adversary behavior
  • regulatory environment
  • Federal government security
  • criticial infrastructure security
  • cyber skills workforce gap