Security Criminals??
- Rocco Paul
- Sep 13, 2020
- 2 min read
That's right, security criminals. In my last assessment I had learned what about the types of people that proposed and proceed forward with the threats that I had learned, as well as how they do those things. Well reading and annotating the documents, I had learned about three different types of criminals as well as “terrorists” as people would call them. The first type of cybercriminal is one that is hungry for recognition, and that to me reminds me of someone that tries to hack into a social media page or does hack into a social media page, and pretends to be that person by posting inappropriate things as well as viruses. The second one, is the types of cyber criminals that are not interested in the recognition, and when I think of this I look at the people that steal money from large businesses and go undercover with everything. The last one I had learned about where the cybercriminals that are known as the Insiders, and when this is looked at, it can be perceived as someone that will go into a company and try to steal data as well as even try to get a job there to steal as much data as they can so a different company can have an economic advantage. While I was reading the type of cyber criminal that was in the insiders sector, I proposed a question that really stumped me. And that question was, why do companies let brand new people into a job have access to data of the company? If I were a big company, I would give at least three to four months for access to Big Data if that was their job, cuz that would give time for the other company to potentially give up. As well as the fact of is do they catch these types of criminals? And is there a criminal offense for doing such a thing? Because I've never really heard anything on the news about someone who took a job at a company and stole data from it. One of the funny things that I have learned from this was those types of viruses that I see when I look at "free Amazon gift card click the link below" is called a trojan horse. Which is so creative And fits the scenario perfectly with a disguised virus that looks good but isn't. Another thing that I had found last week was my potential Mentor, I will be reaching out to him soon and I can't wait to keep in touch with them.
Comments