added vault builder from public tag documents
This commit is contained in:
75
public_vault/Cyber-Crime.md
Normal file
75
public_vault/Cyber-Crime.md
Normal file
@@ -0,0 +1,75 @@
|
||||
#public
|
||||
- **Cyber Crime**: Use computer/digital device to further illegal ends
|
||||
> "nothings black and white in what we do, everything's got some gray"
|
||||
## Types of crime
|
||||
- **Crimes Against People**: A digital crime where the victim is a person
|
||||
- **Crimes Against Property**: A digital crime that damages, or illegally interacts with property
|
||||
- **Crimes Against Government**: A digital crime to undermine the efficacy of a government
|
||||
> Life is not Black and White, Consider what the greatest impact is
|
||||
|
||||
| Crime | category |
|
||||
| --- | --- |
|
||||
| Harrassement | People |
|
||||
| Stalking | People |
|
||||
| Credit Card fraud | People |
|
||||
| Id theft | People |
|
||||
| DOS attack | Property |
|
||||
| Hacking | Property |
|
||||
| Vandalism | Property |
|
||||
| Cyber Warfare | Government|
|
||||
| Cyber Terrorism | Government|
|
||||
|
||||
> Online Harassment is a growing field, stalking, bullying, doxing, etc.
|
||||
|
||||
> Modern wars be started with infrastructure hacks, Power grid hacks of Ukraine, Iran, Etc.
|
||||
|
||||
### Cyber-stalking and bullying
|
||||
- **Cyber Bulling**: People attacking reputation and self esteem of other people trough online means like social media campaigns.
|
||||
- **Cyber Stalking**: Stalking someone through their online footprint. Often to find information with which to exploit the victim.
|
||||
> Typically older person stalking a younger person. As opposed to bullying, which is usually across the same age
|
||||
### Cyber Terrorism
|
||||
- **Cyber Terrorism**: Politically motivated attacks on major infrastructure Money can be a factor, but usually the political is the primary motivation
|
||||
- Instill fear in a society to elicit some reaction
|
||||
- financial/reputation gain
|
||||
- revenge
|
||||
- etc.
|
||||
|
||||
## Examples
|
||||
Stux-Net
|
||||
Nation-state attacks on power grids before Wars
|
||||
|
||||
- **Sneaker Net**: Moving information across barriers physicality
|
||||
> proving an attack is one of the hardest questions to answer
|
||||
# U.S. National cyber strategy
|
||||
- **U.S. National cyber strategy**: anually updated policy document from the white house detailing the national cyber objectives
|
||||
|
||||
> it has been similar last few years
|
||||
|
||||
- promote American people
|
||||
- promoting American prosperity
|
||||
- preserve peace through strength
|
||||
- deterrent
|
||||
- advanced American cyber influence
|
||||
- strong alliances
|
||||
- promote international policies
|
||||
- Shaping adversary behavior
|
||||
- regulatory environment
|
||||
- Federal government security
|
||||
- criticial infrastructure security
|
||||
- cyber skills workforce gap
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user