October 2006
Intermediate to advanced
304 pages
5h 47m
English
“Never underestimate the time, expense, and effort an opponent will expend to break a code.” | ||
| --Robert Morris | ||
Before I begin discussing insider threats, I want to provide a general overview of cyber crime. This chapter will provide background on the motives, markets, perpetrators, and techniques related to cyber crime. For some, this chapter may be a refresher on cyber criminals and their means of profit; for others, this is an opportunity for exposure to a comprehensive examination of cyber crime. I will cover insider threats explicitly starting in chapter two.
The security threatscape has changed significantly. While the Internet was once a ...