Understanding motivations and characteristics of financially-motivated cybercriminals

03/16/2022
by   Claudia Peersman, et al.
0

Background: Cyber offences, such as hacking, malware creation and distribution, and online fraud, present a substantial threat to organizations attempting to safeguard their data and information. By understanding the evolving characteristics and motivations of individuals involved in these activities, and the threats that they may pose, cyber security practitioners will be better placed to understand and assess current threats to their systems and the range of socio-technical mitigations that may best reduce these. Aim: The reported work-in-progress aims to explore the extent to which findings from prior academic literature regarding the characteristics and motivations of offenders engaging in financially-motivated, cyber-dependent crime are supported by the contemporary experiences and perspectives of practitioners currently working in the cyber crime field. Method: A targeted, online survey was developed consisting of both closed and open-ended questions relating to current cyber threats and the characteristics and motivations of offenders engaged in these activities. Sixteen practitioners working in law enforcement-related domains in the cyber crime field completed the survey, providing a combination of qualitative and quantitative data for analysis.

READ FULL TEXT
research
09/03/2021

Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study

Understanding the properties exhibited by Spatial-temporal evolution of ...
research
03/10/2022

Cyber security and the Leviathan

Dedicated cyber-security functions are common in commercial businesses, ...
research
01/29/2018

Early Warnings of Cyber Threats in Online Discussions

We introduce a system for automatically generating warnings of imminent ...
research
02/05/2023

Towards a Contemporary Definition of Cybersecurity

The report provides an intricate analysis of cyber security defined in c...
research
07/17/2018

Sonification in security operations centres: what do security practitioners think?

In Security Operations Centres (SOCs) security practitioners work using ...
research
07/20/2023

To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?

Cyber threats, such as advanced persistent threats (APTs), ransomware, a...
research
10/12/2021

Sanctuary lost: a cyber-physical warfare in space

Over the last decades, space has grown from a purely scientific struggle...

Please sign up or login with your details

Forgot password? Click here to reset