2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet797/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   793   794   795   796   797   798   799   800   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Business Attacks
Business attacks
focus on illegally obtaining an organization’s confidential information. 
This could be information that is critical to the operation of the organization, such as a 
secret recipe, or information that could damage the organization’s reputation if disclosed, 
such as personal information about its employees. The gathering of a competitor’s confiden-
tial information, also called 
corporate espionage
or 
industrial espionage
, is not a new phe-
nomenon. Businesses have used illegal means to acquire competitive information for many 
years. Perhaps what has changed is the source of the espionage, as state-sponsored espio-
nage has become a significant threat. The temptation to steal a competitor’s trade secrets 
and the ease with which a savvy attacker can compromise some computer systems makes 
this type of attack attractive.
The goal of business attacks is solely to extract confidential information. The use of the 
information gathered during the attack usually causes more damage than the attack itself. 
A business that has suffered an attack of this type can be put into a position from which it 
might not ever recover. It is up to you as the security professional to ensure that the systems 
that contain confidential data are secure. In addition, a policy must be developed that will 
handle such an intrusion should it occur. (For more information on security policies, see 
Chapter 2, “Personnel Security and Risk Management Concepts.”)


Major Categories of Computer Crime 
859
Financial Attacks
Financial attacks
are carried out to unlawfully obtain money or services. They are the type 
of computer crime you most commonly hear about in the news. The goal of a financial 
attack could be to steal credit card numbers, increase the balance in a bank account, or 
place “free” long-distance telephone calls.
Shoplifting and burglary are both examples of financial attacks. You can usually tell the 
sophistication of the attacker by the dollar amount of the damages. Less sophisticated attackers 
seek easier targets, but although the damages are usually minimal, they can add up over time.
Financial attacks launched by sophisticated attackers can result in substantial damages. 
Even attacks that siphon off small amounts of money in each transaction can accumulate 
and become serious financial attacks that result in losses amounting to millions of dollars. 
As with the attacks previously described, the ease with which you can detect an attack and 
track an attacker is largely dependent on the attacker’s skill level.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   793   794   795   796   797   798   799   800   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish