scholarly journals A new Systemic Taxonomy of Cyber Criminal activity

Politehnika ◽  
2020 ◽  
Vol 4 (1) ◽  
pp. 17-27
Author(s):  
Matej Babič ◽  
Damir Purković

Cybercrime commonly refers to a broad range of different criminal activities that involve computers and information systems, either as primary tools or as primary targets. Cybercrime Science combines the methodology of Crime Science with the technology of Information Security. The few existing taxonomies of Cybercrime provide only general insights into the benefits of information structures; they are neither complete nor elaborated in a systemic manner to provide a proper framework guided by real system-principles. The main problem with such taxonomies is the inability to dynamically upgrade, which is why there is no timely cybersecurity actions. The current and past approaches were based mainly on the technical nature of cyberattacks and such approaches classified the impact of the activities from a criminological perspective. In this article, we present a systemic taxonomy of Cybercrime, based on definitions of the field items and the related data specifications. We develop a new method for estimating the fractal dimension of networks to explore a new taxonomy of Cybercrime activity. This method can serve to dynamically upgrade taxonomy and thus accelerate the prevention of cybercrime.

2021 ◽  
Vol 7 (2) ◽  
pp. 95-101
Author(s):  
R. Zhuk

Currently, many methodological documents have been developed that regulate approaches to the development of models of threats to information security. for information systems that process information of a different nature. There are different methods of threat development and intruder model building proposed by information security regulators, depending on the direction of their activity. To support decision-making in the process of threat modeling, a databank of information security threats has been developed. However, there are a number of contradictions in existing approaches, while the methods for identifying threats and building a model of an intruder, in most cases, involve the involvement of experts to assess the factors and conditions for the emergence of threats. In the existing methods, there is no relationship between the violator of information security. and software vulnerabilities in information systems, which does not allow building an adequate threat model without the involvement of qualified experts. The purpose of this work is to determine the potential of an information security violator. depending on its capabilities and assessing the impact of this potential on the implementation of software vulnerabilities in information systems.


2017 ◽  
Vol 20 (7) ◽  
pp. 221-232
Author(s):  
B.V. Golub ◽  
E.M. Kuznetsov ◽  
R.V. Maximov

The method refers to the information security domain of information networks and can be used at a comparative estimation of information networks structures in order to determine their stability to the failures, caused by the impact of random or deliberate interferences. The destination is to improve results reliability of comparative estimation of information networks structures. To achieve technical result the dynamics of impact of random or deliberate interferences on information network nodes and also possibilities on communication recovery between transit nodes of information network are consider. For this purpose values of indexes of availability of information network nodes, time of achievement of critical ratio of "dangerous"and "safe"nodes for each variant of connection of subscribers, and also connectivity of adjacent "dangerous"nodes forming chains, eliminating exchange between subscribers are calculated.


Author(s):  
Christopher G. Reddick

This chapter examines the important issue of the impact of information security in government. Information security is one of the critical issues of Homeland Security Information Systems (HSIS). As we know from Chapter 4, information security is one of the leading concerns of Chief Information Officers (CIO) in the realm of homeland security. This chapter explores the impact of information security on government similarly to a framework provided by Straub and Welke (1998) who believe that the organizational environment, individual characteristics, the information systems environment, and level of threats are related to management perceptions of information security risk. The argument is that the stronger the correlation between changes in these four factors this would have an influence on the perception of management of information security risk. Therefore, the more the organizational culture supports information security the greater the managerial concern. In this chapter there is an argument made that there needs to be more knowledge of the leading issues facing information security in order to influence the organizational culture. The first part of this chapter focuses on several information security issues that have been identified in the literature. These issues deal with management, policy, and end users of IT and their impact on information security. The second part of this chapter provides evidence from several information security surveys. The last part of this chapter deals with survey results from an information security survey of Texas state agencies.


2019 ◽  
Vol 10 (4) ◽  
pp. 38-59
Author(s):  
Sarala Ramkumar ◽  
Zayaraz Godandapani ◽  
Vijayalakshmi Vivekanandan

In the modern world, globalization has made way for easy access to information systems for running businesses effectively. The misuse of information systems may lead to loss of productivity, revenue, and sometimes to legal liabilities. Therefore, information security is a major concern for running the business successfully. It is the responsibility of the information security personnel of an organization to develop strategies, and identify the suitable controls to mitigate the risks to which the organization is exposed to. Selection of a suitable set of security controls depends upon, the risks to be addressed, the impact of the risks in terms of revenue, and the cost incurred in implementing the selected controls. To assist in the selection of optimal security controls a hybrid intelligent approach combining the tabu search technique and genetic algorithm has been proposed. The obtained results prove that the proposed approach provides better results in the selection of optimal counter measures.


Author(s):  
В. Марценюк ◽  
І. Дідманідзе ◽  
I. Андрущак ◽  
Т. Крадінова ◽  
К. Рудь

The article deals with the normative and methodological bases of classification of information security threats related to the use of malware against information systems. The threats to the impact on the information systems of certain types of malware are highlighted. In the process, antivirus experts desing and develop new methodologies to make them stronger, more and more every day.  The purpose of this paper is to reviev these methodologies and outline their strengths and weaknesses to encourage those and interested in more investigation on these areas.


2016 ◽  
Vol 31 (2) ◽  
pp. 205-212 ◽  
Author(s):  
Belle Jürgen ◽  
Kleemann Stephan ◽  
Odermatt Jürgen ◽  
Olbrich Andrea
Keyword(s):  

Author(s):  
Вадим Георгиевич Ерышов ◽  
Никита Вадимович Ерышов

В статье проведен анализ актуальных угроз информационной безопасности информационных систем, возникших при переходе сотрудников организаций на удаленный режим работы. The article analyzes the current threats to information security of information systems that occurred when employees of organizations switch to remote mode of operation.


Sign in / Sign up

Export Citation Format

Share Document