Article in International Journal of Information Security and Privacy · April 017 doi: 10. 4018/ijisp. 2017040103 citations 10 reads 4,010 authors: Some of the authors of this publication are also working on these related projects
DIGITAL eCoSySTeMS FoR CyBeRCRIMINAL
Download 195.49 Kb. Pdf ko'rish
|
Digital Forensic Analysis of Cybercrimes Best Prac
2. DIGITAL eCoSySTeMS FoR CyBeRCRIMINAL
According to Cano (2016), cybercriminals modus operandi has been elevated from traditional cyber operations to cybercrime digital ecosystems where they take advantage of logic infrastructures, digital platforms and highly connected users. He defines a Criminal Digital Ecosystem (CDEco), as the group of relationships between local and global participants that interact to create a flexible network to engage in criminal activities by exploiting vulnerabilities of cyber victims; above all, aiming at specific goals under full anonymity and leaving untraceable digital evidence when possible. He argues that the intent of the cybercriminal’s actions is set on five premises: 1. Maximum effectiveness with minimum effort; 2. Maximum anonymity, with the minimum possible evidence; 3. Maximum legal ambiguity, with minimal technological knowledge available; 4. The use of free digital platforms, assisted by specialized communities; 11 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/digital-forensic-analysis-of- cybercrimes/178643?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Select, InfoSci-Select, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology, InfoSci- Healthcare Administration, Clinical Practice, and Bioinformatics eJournal Collection, InfoSci-Knowledge Discovery, Information Management, and Storage eJournal Collection, InfoSci-Surveillance, Security, and Defense eJournal Collection. Recommend this product to your librarian: www.igi-global.com/e-resources/library- recommendation/?id=2 Related Content A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis A. Bhattarai and D. Dasgupta (2011). International Journal of Information Security and Privacy (pp. 14-32). www.igi-global.com/article/self-supervised-approach-comment- spam/53013?camid=4v1a Board Independence and Expropriation Risk in Family Run Businesses Jin Wook (Chris) Kim (2014). International Journal of Risk and Contingency Management (pp. 25-39). www.igi-global.com/article/board-independence-and-expropriation-risk-in- family-run-businesses/111123?camid=4v1a Case Study: Risk Mitigation for Hurricanes near Texas Coast Oil Refineries Kenneth David Strang (2012). International Journal of Risk and Contingency Management (pp. 43-53). www.igi-global.com/article/case-study-risk-mitigation- hurricanes/67374?camid=4v1a Foreground Trust as a Security Paradigm: Turning Users into Strong Links Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El- Khatib, Babak Esfandiari, Sylvie Noël and Mehmet Vefa Bicakci (2014). Information Security in Diverse Computing Environments (pp. 8-23). www.igi-global.com/chapter/foreground-trust-as-a-security- paradigm/114367?camid=4v1a View publication stats Download 195.49 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling