Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks

Article English OPEN
Somer, Tiia ; Hallaq, Bilal ; Watson, Tim (2016)
  • Publisher: Mindsystems Pty. Ltd.
  • Subject: HV
    acm: ComputerApplications_COMPUTERSINOTHERSYSTEMS

This paper discusses ways in which utilising methods from typically non-cyber disciplines, business and criminology, can successfully be applied to the cyber domain to aid the fight against and the prevention of cyber-attacks, including those used in cyber warfare. Through the provision of a visual representation, this paper clarifies how journey mapping and crime scripting can help build an understanding of the steps criminals or adversaries in general undertake during the execution of a cybercrime or cyber-warfare attack.
  • References (6)

    Bernik, I., 2013. Cybercrime and Cyber Warfare Brayley, H., Cockbain, E., Laycock, G., 2011. The value of crime scripting: Deconstructing Internal Child Sex Trafficking, Policing, Volume 5, Number 2, pp. 132-143 Borrion, H., 2013. Quality assurance in crime scripting, Crime Science 2013, 2:6. Available online at: http://www.crimesciencejournal.com/content/2/1/6 CISCO, 2014. Annual Security Report. Available online at: http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf Clarke, R., 2012. Cyber War. New York, HarperCollins Publishers, 2012.

    De Falco, M. 2012. Stuxnet Facts Report. A technical and Strategic Analysis. NATO Cooperative Cyber Defence Center of Excellence, Tallinn, 2012. Available online at: https://ccdcoe.org/sites/default/files/multimedia/pdf/Falco2012_StuxnetFactsReport.pdf Denker, K. 2011. Cyber war and Cyber crime - Implications of a Vague Difference. Available online at: https://www.inter-disciplinary.net/wp-content/uploads/2011/04/kaiwpaper.pdf The Economic Impacts of Cyber Crime, FP7-SEC-2013.2.5-2. D2.3 Detailed appendixes on cyber crime inventory and networks in non-ICT sectors. T.S├Ámer, R.Ottis, T.Lepik, M.Lagazio, B.Hallaq, D.Simms, T.Mitchener-Nissen. March 2015

    ENISA Threat Landscape 2015. ENISA 2015. Available for download at: https://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisa-threatlandscape/etl2015

    Olson, P. 2013. We Are Anonymous: Inside the Hacker World of Lulzsec, Anonymous, and the Global Cyber Insurgency. Hachette Book Group. 2013 Ottis, R. 2008. Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective. Proceedings of the 7th European Conference on Information Warfare and Security, Plymouth, 2008. Reading: Academic Publishing Limited, pp 163-168.

    Pakharenko, G., 2015. Cyber Operations at Maidan: A First-Hand Account. In Geers, K. (Ed.) Cyber War in Perspective. NATO CCDCOE Publications, Tallinn 2015.

    PC World, 2012. When Is a Cybercrime an Act of Cyberwar? Available online at: http://www.pcworld.com/article/250308/when_is_a_cybercrime_an_act_of_cyberwar_.html

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Warwick Research Archives Portal Repository - IRUS-UK 0 130
Share - Bookmark