The Evolution of Cyber Attacks over the Past Years

1763 Words4 Pages

In the chapter regarding cybercrime, the author notes that connections between corporations and crime are mentioned in the media starting in the second half of the last century. Only since 1970, did computer criminals start to make an appearance in corporate crime. In the 60s, the crimes mostly related to physical damage of either computer or telephone networks. In the 70s, crimes in the United States involved mostly destruction of computers or computing equipment. (Gethackingsecurity, 2012) It took time for cyber crime to become prevalent because criminals did not have computer access, nor did they possess the expertise to use computers for criminal activities. There were no easy ways to interact with early computing environments. Cybercrime became prevalent when computers became less expensive to purchase and easier to use. (Shinder, 2002)

From the awareness of white collar criminal activities stemmed two different criminal professionals – insider attackers and outsider attackers. From here attention shifted to criminal organizations that use information technology for “fraud, money laundering, and concealing funds, trafficking in pedo-pornographic material.” (Raoul Chiesa, 2008) The use of information technology for fraudulent activities also includes espionage, terrorism and revenge. The use of technology has increased and become ubiquitous, and the use of technology for criminal activity is unique because the Internet and the digital world do not have borders. (Rogers, 2001)

The authors discuss the evolution of cybercrime over the past 20 years, as initially focusing on physical destruction to for-profit activities including information theft. In the 1990s, attacks evolved from computer or equipment destruction to hacke...

... middle of paper ...

... CRIMINAL COMPUTER BEHAVIOR: AN EXPLORATORY STUDY. Retrieved January 2014, from homes.cerias.purdue.edu: http://homes.cerias.purdue.edu/~mkr/cybercrime-thesis.pdf

Shinder, D. L. (2002). Scene of the Cybercrime: Computer Forensics Handbook. Rockland, MA: Syngress Publishing Inc.

Software Engineering Institute. (1995-2014). CERT. Retrieved January 2014, from Carnegie Mellon University: http://www.cert.org/certcc.html

Tipton, H. F. (2007). Chapter 16 - Patch Management 101—It Just Makes Good Sense! In Information Security Management Handbook, Sixth Edition, Volume 1. Auerbach Publications.

Webopedia. (2014). CERT/CC. Retrieved January 2014, from http://www.webopedia.com: http://www.webopedia.com/TERM/C/CERTCC.html

Wikipedia. (2013, December 9). CERT Coordination Center. Retrieved January 2013, from Wikipedia: http://en.wikipedia.org/wiki/CERT_Coordination_Center

More about The Evolution of Cyber Attacks over the Past Years

Open Document