ABSTRACT

A well-constructed cyber security plan must address the prevention of access and the management of various forms of exploitation as distinct issues. Corporate espionage on the Internet and within cyber systems in general has become increasingly serious over the past decade. Cyber warriors and spies fall into three main categories: state-sponsored; corporate; and terrorists. Malware creators may also be acting independently or they may have been recruited by another party or organisation. Technology-enabled criminals are less technically sophisticated people who rely on technology developed by others for their own criminal exploits. These include: spammers; organised crime; and financial fraudsters. Virtual Wizards specialise in the use of virtual currencies and other assets as a mechanism for transferring the proceeds of crime on behalf of third parties. This virtual money laundering can be carried out via web-based unregulated money services such as WebMoney Transfer and BitCoin, or potentially by using the currencies created by online gaming firms.