Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 21 October 2019

Computer Crime Incidents and Responses in the Private Sector

Computer Crime Incidents and Responses in the Private Sector

Chapter:
(p.200) Computer Crime Incidents and Responses in the Private Sector
Source:
Advances in Cyber Security
Author(s):

Edward M. Stroz

Publisher:
Fordham University Press
DOI:10.5422/fordham/9780823244560.003.0011

This chapter focuses on computer crimes and private sector responses. Companies can fall victim to various types of computer crime and accidental incidents. One type of incident is a data breach in which information a company has in its possession is stolen or in some way improperly released. Those who seek to steal information are sometimes referred to as threat agents, who can have different motivations for what they do. Some intruders are motivated by financial profit, and they may be interested in stealing personally identifiable information (PII) to sell to identity thieves, or intellectual property such as trade secrets or research and development information (industrial espionage). Other intruders may be motivated by ideology. Attacks from this type of intruder can include state-sponsored attacks, and are sometimes committed by trusted insiders of the targeted company. The remainder of the chapter discusses important response actions to cyber attacks and useful tips for preventing incidents. It concludes with ten observations that the author has found to be helpful in providing advice to clients.

Keywords:   computer crime, cyber security, data breach, cyber attacks, network security

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .