Network Threat Analysis
- 1.4k Downloads
This chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. Then we will elaborate on the role of information from the point of view of various relevant stakeholders (cybercriminals, potential cybercrime victims, cyber-defence services providers, cybersecurity regulatory and law enforcement authorities, researchers). Finally, we will discuss the future of cybersecurity in the context of IoT and present both the underlying opportunities and threats.
KeywordsCybercrime Network Threat Stakeholder management Cybersecurity IoT
This chapter includes results shared by the European research project SAINT (Grant Agreement N° 740829), which has received funding from the European Union’s Horizon 2020 Research and Innovation Programme and the Swiss State Secretariat for Education, Research and Innovation.
- 1.Council of Europe, Cyberterrorism: the use of the internet for terrorist purposes. United Nations Office on Drugs and Crime 12(1), 497 (2007)Google Scholar
- 5.R. Sabillon et al., Cybercrime and cybercriminals: a comprehensive study. Int. J. Comput. Netw. Commun. Secur. 4(6), 165–176 (2016). http://www.ijcncs.org/published/volume4/issue6/p1_4-6.pdfGoogle Scholar
- 6.N. Rasmussen, Homeland Security and Governmental Affairs “Cyber security, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland” Framing the Threat’ (2014), pp. 1–4.Google Scholar