The Concept of Cybercrime and Online Threats Analysis
Author(s): PARODI, Filippo
Author(s) keywords: cybercrime, cyberespionage, cyberweapons, online threats
Reference keywords: cyber-attacks, cybercrime
Abstract:
More and more persons are exploiting the speed, convenience and anonymity that modern software offers in order to commit a diverse range of criminal activities. This paper analyses the modern concept of cybercrime, cyberespionage and cyberweapons and the online IT threats.
References:
[1]. F. Cohen, Simulating Cyber Attacks, Defenses, and Consequences, Livermore, CA: Fred Cohen & Associates, 2009.
[2]. P. Ferrie, Attacks on Virtual Machine Emulators, Symantec Advanced Threat Research, 2006.
[3]. A.P. Moore, R.J. Ellison and R.C. Linger, Attack Modeling for Information Security and Survivability, CMU/SEI-2001-TN-001, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Mar. 2001.
[4]. X. Jiang, D. Xu. Collapsar, A VM-Based Architecture for Network Attack Detention Center, USENIX Security Symposium, 2004, pp. 15–28.
[5]. B. Schneier, Attack Trees: Modeling Security Threats, Dr. Dobb’s Journal, Dec. 2003.
[6]. T. Tidwell, R. Larson, K. Fitch and J. Hale, Modeling Internet Attacks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 Jun. 2001.
[7]. M.A. Vatis, Cyber Attacks during the War on Terrorism: A Predictive Analysis, Institute for Security Technology Studies, 22 Sept. 2001.
[8]. http://faculty.ist.psu.edu/bagby/432Spring12/T12/analysis-and-conclusion.html, accessed in May 2013.
[9]. http://dhs.gov/combat-cyber-crime, accessed in April 2013.
[10]. http://securelist.com/en/analysis/204792292/IT_Threat_Evolution_Q1_2013, accessed in May 2013.
[11]. http://www.fbi.gov/about-us/investigate/cyber, accessed in May 2013.
Article Title: The Concept of Cybercrime and Online Threats Analysis
Author(s): PARODI, Filippo
Date of Publication: 2013-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2013.01.07
Issue: Volume 2, Issue 1, Year 2013
Section: Cyber-Attacks Evolution and Cybercrime Trends
Page Range: 59-66 (8 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.