1. Players
On reading or seeing these reports, citizens wonder whether the public authorities have the means to react to this new criminality.
-
Criminals
They are the first players... Attacking an information system is a way of making money, so criminals have been quick to invest in cyberspace. The risk is much lower than in a burglary, the amount of money to be collected is often greater, and it's easier to fall back in the event of failure. A cyber-burglary therefore offers undeniable advantages over a traditional hold-up, and it's likely that Bonnie and Clyde, and also Jesse James, would have taken a keen interest in this technology, had it existed in their day. Cybercrime has therefore been a reality for several decades now, and it has also become organized. Cyber gangs include not only technicians capable of cracking digital...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Players
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - LAURENT (M.), BOUZEFRANE (S.) Éd - La gestion des identités numériques. - Collection ISTE, ISBN : 978-1-78405-056-6 (papier), ISBN : 978-1-78406-056-5 (ebook) (2015).
Also in our database
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!