Technologies Commonly Used for Cybercrime

Technologies Commonly Used for Cybercrime

Technologies Commonly Used for Cybercrime

Overview of Technologies Commonly Used for Cybercrime in relation to cyber crime: [1]In reality, responsible IT users and cybercriminals can use the same information systems, devices, and software to accomplish information security or cybercrime objectives. The same technology that enables people to put an entire human resources database in their pocket for emergency access purposes enables a disgruntled employee to walk off with it and later sell the data to identity thieves. The root of these weaknesses is the lack of security representation in organizations that produce software and in the mind of the software consumer. Who asks for security features in the software they use? When using email or instant messaging software, who wants to make sure that persons with whom they are interacting really are the persons intended? For some businesses and government agencies this precision of knowledge is critical, especially if financial data or other types of sensitive information need to be exchanged online. But most consumers do not see it as important, or they see the steps that need to be taken for obtaining and checking digital signatures as inconvenient.

Resources

Notes and References

1. By Jim Moore

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Choo, K.-K.R., et al. (2007). Future directions in technology-enabled crime: 2007–09. Retrieved December 30, 2007, from (internet link) aic.gov.au/publications/ rpp/78/rpp78.pdf; Epstein, K. (2001, September). Analysis: Data infrastructure. Ziff Davis CIO Insight. Retrieved on January 5, 2008, from (internet link) cioinsight.com /c/a/Trends/Analysis-Data-Infrastruture/; IT Compliance Institute. (2007, September 19). Cybercrime surpasses illegal drug trade in terms of global value. Retrieved December 30, 2007, from https://itcinstitute.com/display.aspx?id=4202; Kelly, M. (2007, April 16). Chocolate the key to many company PCs. ENN. Retrieved January 22, 2008, from (internet link) electricnews.net/article/10038156.html; Long, J. (2005). Google hacking for penetration testers. Rockland, MA: Syngress Publishing, Inc., ISBN 1931836361; McAfee® Avert® Labs top 10 threat predictions for 2008. (2007, November 16). Retrieved December 30, 2007, from (internet link) mcafee.com/us/local_- content/white_papers/threat_center/wp_avert_predictions_2008.pdf; Null, C. (2004, March 3). Google: Net hacker tool du jour. Wired Magazine. Retrieved January 3, 2008, from (internet link) wired.com/techbiz/it/news/2003/03/57897; Parker, D. (1998). Fighting computer crime: A new framework for protecting information. New York: Wiley Computer Publishing, ISBN 0471163783; Richards, Dr. C.W. (1993, January 29). Riding the tiger: What you really do with OODA loops. Retrieved January 25, 2008, from (internet link) belisarius.com/modern_business_strategy/richards/ riding_the_tiger/tiger.htm.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *