Advertisement

Network Threat Analysis

Chapter
Part of the Internet of Things book series (ITTCC)

Abstract

This chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. Then we will elaborate on the role of information from the point of view of various relevant stakeholders (cybercriminals, potential cybercrime victims, cyber-defence services providers, cybersecurity regulatory and law enforcement authorities, researchers). Finally, we will discuss the future of cybersecurity in the context of IoT and present both the underlying opportunities and threats.

Keywords

Cybercrime Network Threat Stakeholder management Cybersecurity IoT 

Notes

Acknowledgments

This chapter includes results shared by the European research project SAINT (Grant Agreement N° 740829), which has received funding from the European Union’s Horizon 2020 Research and Innovation Programme and the Swiss State Secretariat for Education, Research and Innovation.

References

  1. 1.
    Council of Europe, Cyberterrorism: the use of the internet for terrorist purposes. United Nations Office on Drugs and Crime 12(1), 497 (2007)Google Scholar
  2. 2.
    T. Sorell, Human rights and hacktivism: the cases of Wikileaks and anonymous. J. Human Rights Pract. 7(3), 391–410 (2015)CrossRefGoogle Scholar
  3. 3.
    M.K. Rogers, The psyche of cybercriminals: a psycho-Social perspective’, in Cybercrimes: a multidisciplinary analysis (Springer, Berlin, 2011), pp. 217–235CrossRefGoogle Scholar
  4. 4.
    C. Dianne Martin, Taking the high road: white hat, black hat: the ethics of cybersecurity. ACM Inroads 8(1), 33–36 (2017)CrossRefGoogle Scholar
  5. 5.
    R. Sabillon et al., Cybercrime and cybercriminals: a comprehensive study. Int. J. Comput. Netw. Commun. Secur. 4(6), 165–176 (2016). http://www.ijcncs.org/published/volume4/issue6/p1_4-6.pdfGoogle Scholar
  6. 6.
    N. Rasmussen, Homeland Security and Governmental Affairs “Cyber security, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland” Framing the Threat’ (2014), pp. 1–4.Google Scholar
  7. 7.
    R. Richardson, 2010/2011 computer crime and security survey. Director 2011, 1–40 (2011). https://doi.org/10.1108/09685229810209414CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Mandat InternationalGenevaSwitzerland
  2. 2.University of ThessalyThessalyGreece
  3. 3.CyberDefconEnglandUK
  4. 4.IIT DemokritosAthensGreece

Personalised recommendations