Cyber Criminal Activity

From CyberSecurity
Revision as of 02:03, 2 December 2005 by Fleizach (talk | contribs)

Jump to: navigation, search

Cyber Criminal Activity White Team

Perhaps this page can get us started in the directions we want to pursue.

Cyber Criminal Activity:

Trace history of cyber criminal activity, evolution from intrusion to botnets as platforms for global criminal activity.

Profile the evolution of attackers, targets, defenders, vulnerabilities, threats, and goals of attacks. Where are the trends pointing?

Resources

cyber crime.gov

Issues

These are some recent topics from the news.

  • botnets
  • darknets
  • Rootkits
  • Instant messaging worms
  • Organized crime and cyber criminality
  • Phishing (just saw a new one that pretends there's a class action lawsuit against a company and needs you to sign up)
  • Pharming

Paper Order

  • 1. Introduction
  • 2. Evolution of Cybercrime and current situation (organized crime,worms, botnets, rootkits, script kiddies, vandals, lone hackers, spies,and so on) (Hema)
  • 3. Cyber Crime: Case Study: Emerging threat of Internet Bots (Pravin)
  • 4. Cyberforensics (Avichal)
  • 5. Legal Policy on Cybercrime (Chris)
  • 6. Future trends in Cybercrime & Countermeasures (Chris)
  • 7. Conclusion

Division of Work

Avichal 13:02, 10 November 2005 (PST) See my email (also posted at Talk:Cyber_Criminal_Activity) List subtopics of your interest. We could pick the final subtopics after everyone has listed theirs - looking for coherence among subtopics, and resolving any overlap etc.

  • Avichal
    • Cyberforensics (My main topic now)
    • CyberCrime and Terrorism
  • Chris
    • Legal Policies on Cybercrime: effectiveness of laws, examples, etc.
    • Future Direction of Cybercrime & Countermeasures
  • Hema
    • History of Cyber Criminal activity and Current Situation
    • Profile the evolution of attacker, targets, defenders, vulnerabilities, threats, and goals of attacks.
  • Pravin
    • Case Study : Emerging threat of Internet Bots – attacks, vulnerabilities, threats and goals and presenting possible responses to this particular threat.