- This topic has 1 reply, 4 voices, and was last updated 2 years, 2 months ago by .
- You must be logged in to reply to this topic.
Cybersecurity Certifications | Mile2
Home » Topics » OCU ISCAP A Forum » OCU ISCAP A Weekly Discussions » OCU ISCAP A Week 05 Lesson 17 Discussion
When investigating a crime, there are always means, opportunity, and motive. Discuss in detail a specific cybersecurity crime and tell a story (real or fiction) about the criminal making sure to discuss the M.O.M. of the criminal. Also, discuss how this crime affected the organization.
A specific cyber security crime can be initiated by a disgruntled employee, who feels like they have been wronged by the company and wishes to get back at their employers. In a scenario like this the employee has credentials to sensitive information and wishes to hurt the company before leaving. The employee finds a discussion thread for hackers on the dark web and posts an offer of valuable information for a cut of the profit after selling the stolen data. Once a hacker accepts the offer, who wishes to take corporate information and sell it to competitors or other interested parties, the employee provides their secure credentials and paths to the data.
With a crime where information is stolen, the reputation and financial costs for the company could largely impact the company, to the point of bankruptcy. The information could be payment information of customers, which the company would be liable for. On top of the financial loss, company trust from consumers would take a plummet as well.
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.
Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range. We train students in penetration testing,disaster recovery, incident handling, and network forensics. Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.



