Abstract
This chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. Then we will elaborate on the role of information from the point of view of various relevant stakeholders (cybercriminals, potential cybercrime victims, cyber-defence services providers, cybersecurity regulatory and law enforcement authorities, researchers). Finally, we will discuss the future of cybersecurity in the context of IoT and present both the underlying opportunities and threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68). Palgrave Macmillan, London.
- 2.
Marion, N. E. (2010). The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation. International Journal of Cyber Criminology, 4(1/2), 699.
- 3.
Näsi, M., Oksanen, A., Keipi, T., & Räsänen, P. (2015). Cybercrime victimisation among young people: a multi-nation study. Journal of Scandinavian Studies in Criminology and Crime. Prevention, 16(2), 203-210.
- 4.
Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2010). Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilisation. Journal of Adolescent Health, 47(2), 183-190.
- 5.
Acar, K. V. (2016). Sexual Extortion of Children in Cyberspace. International Journal of Cyber Criminology, 10(2), 110.
- 6.
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth.
- 7.
- 8.
Koops, B. J. (2010). The internet and its opportunities for cybercrime.
- 9.
Ross, S., & Smith, R. G. (2011). Risk factors for advance fee fraud victimisation. Trends and Issues in Crime and Criminal Justice, (420), 1.
- 10.
Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., & Wang, L. (2010, August). On the analysis of the zeus botnet crimeware toolkit. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on (pp. 31-38). IEEE.
- 11.
O’Gorman, G., & McDonald, G. (2012). Ransomware: A growing menace. Symantec Corporation.
- 12.
Hutchings, A., & Holt, T. J. (2014). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.
- 13.
Kokkinos, C. M., Antoniadou, N., & Markos, A. (2014). Cyber-bullying: An investigation of the psychological profile of university student participants. Journal of Applied Developmental Psychology, 35(3), 204-214.
- 14.
Citron, D. K., & Franks, M. A. (2014). Criminalizing revenge porn
- 15.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.
- 16.
Hyman, P. (2013). Cybercrime: it’s serious, but exactly how serious?. Communications of the ACM, 56(3), 18-20.
- 17.
Walters, R. (2014). Cyber attacks on US companies in 2014. The Heritage Foundation, 4289, 1-5.
- 18.
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials.
- 19.
Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Oxford University Press, USA.
References
Council of Europe, Cyberterrorism: the use of the internet for terrorist purposes. United Nations Office on Drugs and Crime 12(1), 497 (2007)
T. Sorell, Human rights and hacktivism: the cases of Wikileaks and anonymous. J. Human Rights Pract. 7(3), 391–410 (2015)
M.K. Rogers, The psyche of cybercriminals: a psycho-Social perspective’, in Cybercrimes: a multidisciplinary analysis (Springer, Berlin, 2011), pp. 217–235
C. Dianne Martin, Taking the high road: white hat, black hat: the ethics of cybersecurity. ACM Inroads 8(1), 33–36 (2017)
R. Sabillon et al., Cybercrime and cybercriminals: a comprehensive study. Int. J. Comput. Netw. Commun. Secur. 4(6), 165–176 (2016). http://www.ijcncs.org/published/volume4/issue6/p1_4-6.pdf
N. Rasmussen, Homeland Security and Governmental Affairs “Cyber security, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland” Framing the Threat’ (2014), pp. 1–4.
R. Richardson, 2010/2011 computer crime and security survey. Director 2011, 1–40 (2011). https://doi.org/10.1108/09685229810209414
Acknowledgments
This chapter includes results shared by the European research project SAINT (Grant Agreement N° 740829), which has received funding from the European Union’s Horizon 2020 Research and Innovation Programme and the Swiss State Secretariat for Education, Research and Innovation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Brékine, A. et al. (2019). Network Threat Analysis. In: Ziegler, S. (eds) Internet of Things Security and Data Protection. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-04984-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-04984-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04983-6
Online ISBN: 978-3-030-04984-3
eBook Packages: EngineeringEngineering (R0)