118
CHAPTER 9
Understanding the situational awareness in cybercrimes
In cases where self-actualization occurs—i.e. the hackers attack to test systems
or do it because they can—like in the Mafiaboy case—the threat can be classed as
high impact.
Operationally, to start making assessments about threats, a method for collecting
information and data using a taxonomy system for situational understanding has been
presented. This model focuses on the intent and motivation behind cybercrimes and
rather than taking a technical approach focuses on human factors. The five real-life
cases not only show the diversity and sometimes complexity of individual crimes but
also show the difference in motivations for the crimes. The proposed taxonomy for
creating a knowledge repository therefore particularly focuses on the perceived moti-
vations and intent of potential suspects and perpetrators. Using the taxonomy model
above provides a starting point toward gaining a clearer situational understanding
of cybercrimes. Currently with a number of cybercrime strategies across the globe,
and with no agreed definitions or legislation—gathering knowledge about the cyber-
crimes—including situational knowledge will help to foster the practical implications
for countermeasures. This is especially true when considering our earlier definition
of knowledge. Given the lack of agreed definitions and numerous strategies for cy-
bercrime, the model has been designed to be flexible for front line officers especially
in light of the fact that cases vary in nature. The model also makes use of simple
language since a Universal linguistic system for cybercrime has not yet been agreed.
REFERENCES
Akghar, B., 1999. Strategic information systems beyond technology: a knowledge manage-
ment perspective, SHU presentation.
Anonymous, 2008. Message to scientology, Youtube 21st January 2008 [online],
http://www.
youtube.com/watch?v=JCbKv9yiLiQ
(accessed 13.12.13).
Anonymous, 2014a. About Us.
http://www.anonymusanalytics.com
(accessed 13.02.14).
Anonymous, 2014b. Anon New: Everything Anonymous. [online],
http://anonnews.org/static/
faq
(accessed 12.02.14).
Ashford, W., 2013. More than one-fifth of UK firms hit by DDoS attacks in 2012. 16th July
2013, Computer weekly. [online],
http://www.computerweekly.com/news/2240188089/
More-than-one-fifth-of-UK-firms-hit-by-DDoS-attacks-in-2012
(accessed 03.01.14).
Association of Chief Police Officer of England, Wales and Northern Ireland, 2012. ACPO
e-Crime Strategy.
http://www.acpo.police.uk/documents/crime/2009/200908CRIECS01.
pdf
(accessed 01.02.14).
Australian Government, 2009. Cyber security strategy. [online],
http://www.ag.gov.au/
RightsAndProtections/CyberSecurity/Documents/AG%20Cyber%20Security%20
Strategy%20-%20for%20website.pdf
(accessed 02.02.14).
Bank of England, 2013. Financial Stability report. November 2013 Issue No 34. [online],
http://www.bankofengland.co.uk/publications/Documents/fsr/2013/fsrfull1311.pdf
(ac-
cessed 13.12.13).
Berkman, F., 2014. Syrian Electronic army hacks microsofts twitter accounts and blog. 11th
January 2014. Mashable, [online],
http://mashable.com/2014/01/11/syrian-electronic-
army-hack-microsoft/
(accessed 28.01.14).
Do'stlaringiz bilan baham: |