Article in International Journal of Information Security and Privacy · April 017 doi: 10. 4018/ijisp. 2017040103 citations 10 reads 4,010 authors: Some of the authors of this publication are also working on these related projects


 DIGITAL eCoSySTeMS FoR CyBeRCRIMINAL


Download 195.49 Kb.
Pdf ko'rish
bet3/3
Sana12.03.2023
Hajmi195.49 Kb.
#1261869
1   2   3
Bog'liq
Digital Forensic Analysis of Cybercrimes Best Prac

2. DIGITAL eCoSySTeMS FoR CyBeRCRIMINAL
According to Cano (2016), cybercriminals modus operandi has been elevated from traditional cyber 
operations to cybercrime digital ecosystems where they take advantage of logic infrastructures, digital 
platforms and highly connected users. He defines a Criminal Digital Ecosystem (CDEco), as the 
group of relationships between local and global participants that interact to create a flexible network 
to engage in criminal activities by exploiting vulnerabilities of cyber victims; above all, aiming at 
specific goals under full anonymity and leaving untraceable digital evidence when possible.
He argues that the intent of the cybercriminal’s actions is set on five premises:
1. Maximum effectiveness with minimum effort;
2. Maximum anonymity, with the minimum possible evidence;
3. Maximum legal ambiguity, with minimal technological knowledge available;
4. The use of free digital platforms, assisted by specialized communities;


11 more pages are available in the full version of this
document, which may be purchased using the "Add to Cart"
button on the product's webpage:
www.igi-global.com/article/digital-forensic-analysis-of-
cybercrimes/178643?camid=4v1
This title is available in InfoSci-Journals, InfoSci-Select,
InfoSci-Select, InfoSci-Journal Disciplines Computer
Science, Security, and Information Technology, InfoSci-
Healthcare Administration, Clinical Practice, and
Bioinformatics eJournal Collection, InfoSci-Knowledge
Discovery, Information Management, and Storage eJournal
Collection, InfoSci-Surveillance, Security, and Defense
eJournal Collection. Recommend this product to your
librarian:
www.igi-global.com/e-resources/library-
recommendation/?id=2
Related Content
A Self-Supervised Approach to Comment Spam Detection Based on Content
Analysis
A. Bhattarai and D. Dasgupta (2011). International Journal of Information Security
and Privacy (pp. 14-32).
www.igi-global.com/article/self-supervised-approach-comment-
spam/53013?camid=4v1a
Board Independence and Expropriation Risk in Family Run Businesses
Jin Wook (Chris) Kim (2014). International Journal of Risk and Contingency
Management (pp. 25-39).
www.igi-global.com/article/board-independence-and-expropriation-risk-in-
family-run-businesses/111123?camid=4v1a


Case Study: Risk Mitigation for Hurricanes near Texas Coast Oil Refineries
Kenneth David Strang (2012). International Journal of Risk and Contingency
Management (pp. 43-53).
www.igi-global.com/article/case-study-risk-mitigation-
hurricanes/67374?camid=4v1a
Foreground Trust as a Security Paradigm: Turning Users into Strong Links
Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-
Khatib, Babak Esfandiari, Sylvie Noël and Mehmet Vefa Bicakci (2014). Information
Security in Diverse Computing Environments (pp. 8-23).
www.igi-global.com/chapter/foreground-trust-as-a-security-
paradigm/114367?camid=4v1a
View publication stats

Download 195.49 Kb.

Do'stlaringiz bilan baham:
1   2   3




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling