Page 1600 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1600

Chapter 19: Investigations and Ethics




                1.  The major categories of computer crime are military/intelligence

                    attacks, business attacks, financial attacks, terrorist attacks, grudge
                    attacks, and thrill attacks.

                2.  Thrill attacks are motivated by individuals seeking to achieve the
                    “high” associated with successfully breaking into a computer
                    system.

                3.  Interviews are conducted with the intention of gathering
                    information from individuals to assist with your investigation.
                    Interrogations are conducted with the intent of gathering evidence

                    from suspects to be used in a criminal prosecution.

                4.  To be admissible, evidence must be reliable, competent, and
                    material to the case.
   1595   1596   1597   1598   1599   1600   1601   1602   1603   1604   1605