LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Somer, Tiia; Hallaq, Bilal; Watson, Tim (2016)
Publisher: Mindsystems Pty. Ltd.
Languages: English
Types: Article
Subjects: HV

Classified by OpenAIRE into

ACM Ref: ComputerApplications_COMPUTERSINOTHERSYSTEMS
Modern society is now reliant on digital communication and networks for conducting a wide array of tasks, ranging from simple acts such as browsing the web through to mission critical tasks such as the management of critical infrastructure and industrial controls. This reliance shows a growing emphasis on strategic importance of cyberspace (Sharma, 2010). While organisations and individuals are keenly exploiting the benefits of cyberspace, these same platforms have also opened new avenues for nefarious actors in the pursuit of their criminal activities to attack, disrupt, or steal from organisations and individuals. Criminal organisations and lone criminals worldwide have access to powerful, evolving capabilities which they use to identify and target their victims allowing for the perpetration of a wide variety of cyber crimes. Cyber attacks and the term ‘cyber warfare’1 has come to use more regularly and it is apparent that a new class of weapons has emerged: software viruses, Trojan horses, logic bombs, etc. and where such weapons exist, then attackers exist also. The modus operandi of nationstate actors is not much different from that used by cyber criminals – with the exception of their end goals. \ud \ud This paper discusses ways in which utilising methods from typically non-cyber disciplines – business and criminology – can successfully be applied to the cyber domain in order to help in the fight against and prevention of cyber attacks, including those used in Cyber Warfare. Through the provision of a visual representation, this paper clarifies how journey mapping and crime scripting can help in building an understanding of the steps criminals or adversaries in general undertake during execution of a cyber criminal or cyber warfare attacker. In essence, within our work we have deconstructed the lifecycle of attack events and translated the steps within it into a visualisation map to show the full event process, highlighting key steps as well as positive and negative events. Such work can be applied to military defence area, as it can aid in the decision processes when undertaking steps in pursuit, prevention, preparation and protection. The end goals of the two differ, but tactics and techniques – reconnaissance for, preparation of and execution of attacks – uses the same modus operandi.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Bernik, I., 2013. Cybercrime and Cyber Warfare Brayley, H., Cockbain, E., Laycock, G., 2011. The value of crime scripting: Deconstructing Internal Child Sex Trafficking, Policing, Volume 5, Number 2, pp. 132-143 Borrion, H., 2013. Quality assurance in crime scripting, Crime Science 2013, 2:6. Available online at: http://www.crimesciencejournal.com/content/2/1/6 CISCO, 2014. Annual Security Report. Available online at: http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf Clarke, R., 2012. Cyber War. New York, HarperCollins Publishers, 2012.
    • De Falco, M. 2012. Stuxnet Facts Report. A technical and Strategic Analysis. NATO Cooperative Cyber Defence Center of Excellence, Tallinn, 2012. Available online at: https://ccdcoe.org/sites/default/files/multimedia/pdf/Falco2012_StuxnetFactsReport.pdf Denker, K. 2011. Cyber war and Cyber crime - Implications of a Vague Difference. Available online at: https://www.inter-disciplinary.net/wp-content/uploads/2011/04/kaiwpaper.pdf The Economic Impacts of Cyber Crime, FP7-SEC-2013.2.5-2. D2.3 Detailed appendixes on cyber crime inventory and networks in non-ICT sectors. T.Sõmer, R.Ottis, T.Lepik, M.Lagazio, B.Hallaq, D.Simms, T.Mitchener-Nissen. March 2015
    • ENISA Threat Landscape 2015. ENISA 2015. Available for download at: https://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisa-threatlandscape/etl2015
    • Olson, P. 2013. We Are Anonymous: Inside the Hacker World of Lulzsec, Anonymous, and the Global Cyber Insurgency. Hachette Book Group. 2013 Ottis, R. 2008. Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective. Proceedings of the 7th European Conference on Information Warfare and Security, Plymouth, 2008. Reading: Academic Publishing Limited, pp 163-168.
    • Pakharenko, G., 2015. Cyber Operations at Maidan: A First-Hand Account. In Geers, K. (Ed.) Cyber War in Perspective. NATO CCDCOE Publications, Tallinn 2015.
    • PC World, 2012. When Is a Cybercrime an Act of Cyberwar? Available online at: http://www.pcworld.com/article/250308/when_is_a_cybercrime_an_act_of_cyberwar_.html
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article