IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • The Concept of Cybercrime and Online Threats Analysis


    Author(s): PARODI, Filippo

    Quick view | Full article | Citations | Views: 1,896


    Author(s) keywords: , , ,


    Reference keywords: ,


    Abstract:

    More and more persons are exploiting the speed, convenience and anonymity that modern software offers in order to commit a diverse range of criminal activities. This paper analyses the modern concept of cybercrime, cyberespionage and cyberweapons and the online IT threats.



    References:

    [1]. F. Cohen, Simulating Cyber Attacks, Defenses, and Consequences, Livermore, CA: Fred Cohen & Associates, 2009.

    [2]. P. Ferrie, Attacks on Virtual Machine Emulators, Symantec Advanced Threat Research, 2006.

    [3]. A.P. Moore, R.J. Ellison and R.C. Linger, Attack Modeling for Information Security and Survivability, CMU/SEI-2001-TN-001, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Mar. 2001.

    [4]. X. Jiang, D. Xu. Collapsar, A VM-Based Architecture for Network Attack Detention Center, USENIX Security Symposium, 2004, pp. 15–28.

    [5]. B. Schneier, Attack Trees: Modeling Security Threats, Dr. Dobb’s Journal, Dec. 2003.

    [6]. T. Tidwell, R. Larson, K. Fitch and J. Hale, Modeling Internet Attacks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 Jun. 2001.

    [7]. M.A. Vatis, Cyber Attacks during the War on Terrorism: A Predictive Analysis, Institute for Security Technology Studies, 22 Sept. 2001.

    [8]. http://faculty.ist.psu.edu/bagby/432Spring12/T12/analysis-and-conclusion.html, accessed in May 2013.

    [9]. http://dhs.gov/combat-cyber-crime, accessed in April 2013.

    [10]. http://securelist.com/en/analysis/204792292/IT_Threat_Evolution_Q1_2013, accessed in May 2013.

    [11]. http://www.fbi.gov/about-us/investigate/cyber, accessed in May 2013.



    Additional Information

    Article Title: The Concept of Cybercrime and Online Threats Analysis
    Author(s): PARODI, Filippo
    Date of Publication: 2013-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2013.01.07
    Issue: Volume 2, Issue 1, Year 2013
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 59-66 (8 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.