IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • The Concept of Cybercrime and Online Threats Analysis


    Author(s): PARODI, Filippo

    Quick view | Full article | Citations | Views: 1,306


    Author(s) keywords: , , ,


    Reference keywords: ,


    Abstract:

    More and more persons are exploiting the speed, convenience and anonymity that modern software offers in order to commit a diverse range of criminal activities. This paper analyses the modern concept of cybercrime, cyberespionage and cyberweapons and the online IT threats.



    References:

    [1]. F. Cohen, Simulating Cyber Attacks, Defenses, and Consequences, Livermore, CA: Fred Cohen & Associates, 2009.

    [2]. P. Ferrie, Attacks on Virtual Machine Emulators, Symantec Advanced Threat Research, 2006.

    [3]. A.P. Moore, R.J. Ellison and R.C. Linger, Attack Modeling for Information Security and Survivability, CMU/SEI-2001-TN-001, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Mar. 2001.

    [4]. X. Jiang, D. Xu. Collapsar, A VM-Based Architecture for Network Attack Detention Center, USENIX Security Symposium, 2004, pp. 15–28.

    [5]. B. Schneier, Attack Trees: Modeling Security Threats, Dr. Dobb’s Journal, Dec. 2003.

    [6]. T. Tidwell, R. Larson, K. Fitch and J. Hale, Modeling Internet Attacks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 Jun. 2001.

    [7]. M.A. Vatis, Cyber Attacks during the War on Terrorism: A Predictive Analysis, Institute for Security Technology Studies, 22 Sept. 2001.

    [8]. http://faculty.ist.psu.edu/bagby/432Spring12/T12/analysis-and-conclusion.html, accessed in May 2013.

    [9]. http://dhs.gov/combat-cyber-crime, accessed in April 2013.

    [10]. http://securelist.com/en/analysis/204792292/IT_Threat_Evolution_Q1_2013, accessed in May 2013.

    [11]. http://www.fbi.gov/about-us/investigate/cyber, accessed in May 2013.



    Additional Information

    Article Title: The Concept of Cybercrime and Online Threats Analysis
    Author(s): PARODI, Filippo
    Date of Publication: 2013-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2013.01.07
    Issue: Volume 2, Issue 1, Year 2013
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 59-66 (8 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.