Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

1. Cybersecurity And Cybercrime Investigation

verfasst von : Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung

Erschienen in: Machine Learning for Authorship Attribution and Cyber Forensics

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Society’s increasing reliance on technology, fueled by a growing desire for increased connectivity (given the increased productivity, efficiency, and availability to name a few motivations) has helped give rise to the compounded growth of electronic data. The increasing adoption of various technologies has driven the need to protect said technologies as well as the massive amount of electronic data produced by them. Almost every type of new technology created today, from homes and cars to fridges, toys, and stoves, is designed as a smart device, generating data as an auxiliary function. These devices are all now part of the Internet of Things (IoT), which is comprised of devices that have embedded sensors, networking capabilities, and features that can generate significant amounts of data. Not only has society seen a dramatic rise in the use of IoT devices, but there has also been a marked evolution in the way that businesses use these technologies to deliver goods and services. These include banking, shopping, and procedure-driven processes. These enhanced approaches to delivering added value create avenues for misuse and increase the potential for criminal activities by utilizing the digital information generated for malicious purposes. This threat requires protecting this information from unauthorized access, as this data (ranging from sensitive personal data, demographic data, business data, to system data and context data) can be monetized by criminals.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat B. Nelson, A. Phillips, C. Steuart, Guide to Computer Forensics and Investigations (Cengage Learning, 2014) B. Nelson, A. Phillips, C. Steuart, Guide to Computer Forensics and Investigations (Cengage Learning, 2014)
2.
Zurück zum Zitat M.E. Whitman, H.J. Mattord, Principles of Information Security (Cengage Learning, 2011) M.E. Whitman, H.J. Mattord, Principles of Information Security (Cengage Learning, 2011)
3.
Zurück zum Zitat M. Ciampa, Security+ Guide to Network Security Fundamentals (Cengage Learning, 2012) M. Ciampa, Security+ Guide to Network Security Fundamentals (Cengage Learning, 2012)
4.
Zurück zum Zitat T. Olovsson, A structured approach to computer security (1992) T. Olovsson, A structured approach to computer security (1992)
11.
Zurück zum Zitat J.P. Lawler, H. Howell-Barber, A framework model for a software-as-a-service (SaaS) strategy, in Encyclopedia of Information Science and Technology, 3rd edn. (IGI Global, 2015), pp. 1024–1032 J.P. Lawler, H. Howell-Barber, A framework model for a software-as-a-service (SaaS) strategy, in Encyclopedia of Information Science and Technology, 3rd edn. (IGI Global, 2015), pp. 1024–1032
16.
Zurück zum Zitat S. Ragan, Code Spaces forced to close its doors after security incident, CSO June, vol. 18 (2014) S. Ragan, Code Spaces forced to close its doors after security incident, CSO June, vol. 18 (2014)
15.
Zurück zum Zitat J. Fruhlinger, What is WannaCry ransomware, how does it infect, and who was responsible (2017) J. Fruhlinger, What is WannaCry ransomware, how does it infect, and who was responsible (2017)
18.
Zurück zum Zitat D. McCandless, T. Evans, M. Quick, E. Hollowood, C. Miles, D. Hampson, World’s Biggest Data Breaches & Hacks—Information Is Beautiful. Inf. Is Beautiful Vis D. McCandless, T. Evans, M. Quick, E. Hollowood, C. Miles, D. Hampson, World’s Biggest Data Breaches & Hacks—Information Is Beautiful. Inf. Is Beautiful Vis
20.
Zurück zum Zitat G. Tsakalidis, K. Vergidis, A systematic approach toward description and classification of cybercrime incidents. IEEE Trans. Syst. Man Cybern. Syst. 99, 1–20 (2017) G. Tsakalidis, K. Vergidis, A systematic approach toward description and classification of cybercrime incidents. IEEE Trans. Syst. Man Cybern. Syst. 99, 1–20 (2017)
22.
Zurück zum Zitat K.M. Finklea, C.A. Theohary, Cybercrime: conceptual issues for congress and US law enforcement (2012) K.M. Finklea, C.A. Theohary, Cybercrime: conceptual issues for congress and US law enforcement (2012)
24.
Zurück zum Zitat D.L. Shinder, M. Cross, Scene of the Cybercrime (Elsevier, 2008) D.L. Shinder, M. Cross, Scene of the Cybercrime (Elsevier, 2008)
30.
Zurück zum Zitat R. Anderson et al., Measuring the cost of cybercrime, in The Economics of Information Security and Privacy (Springer, 2013), pp. 265–300 R. Anderson et al., Measuring the cost of cybercrime, in The Economics of Information Security and Privacy (Springer, 2013), pp. 265–300
31.
Zurück zum Zitat F. Howard, Exploring the Blackhole exploit kit, Sophos Tech. Pap. (2012) F. Howard, Exploring the Blackhole exploit kit, Sophos Tech. Pap. (2012)
176.
Zurück zum Zitat F. Inc, fastText: library for efficient text classification and representation learning (2016) F. Inc, fastText: library for efficient text classification and representation learning (2016)
177.
Zurück zum Zitat M. Kusner, Y. Sun, N. Kolkin, K. Weinberger, From word embeddings to document distances, in International Conference on Machine Learning (2015), pp. 957–966 M. Kusner, Y. Sun, N. Kolkin, K. Weinberger, From word embeddings to document distances, in International Conference on Machine Learning (2015), pp. 957–966
Metadaten
Titel
Cybersecurity And Cybercrime Investigation
verfasst von
Farkhund Iqbal
Mourad Debbabi
Benjamin C. M. Fung
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-61675-5_1

Premium Partner