Skip to main content

Are We Doing All the Right Things to Counter Cybercrime?

  • Chapter
  • First Online:
Combatting Cybercrime and Cyberterrorism

Abstract

In this paper we present the discussion about the future ideas, needs and trends for cyber security technologies. Our focus is on the future technologies which should be developed in order to further enhance the protection of the cyberspace. Similarly to our work in the FP7 CAMINO project, we follow the comprehensive approach looking at broad range of possible technologies and problems. We termed our approach as THOR since we considered the following dimensions: Technical, Human, Organisational and Regulatory. In this paper we also discuss the idea of the comprehensive approach, since we believe only holistic view on cyber security can improve protection from the cyber threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Batz, D., et al.: Roadmap to achieve energy delivery systems cybersecurity, Technical report, Department of Homeland Security, Cyber Security R&D Center (2011)

    Google Scholar 

  2. Berenson, J.: The Roadmap to Secure Control System in the Transportation Sector, The Roadmap to Secure Control Systems in the Transportation Sector Working Group (2012)

    Google Scholar 

  3. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303–336 (2014)

    Article  Google Scholar 

  4. Choraś, M.: Comprehensive approach to information sharing for increased network security and survivability. Cybern. Syst. 44(6–7), 550–568 (2013)

    Article  Google Scholar 

  5. Choraś, M., et al.: Comprehensive approach to increase cyber security and resilience. In: Proceedings of ARES (International Conference on Availability, Reliability and Security), Touluse, pp. 686–692 (2015)

    Google Scholar 

  6. Choraś, M., Kozik, R., Renk, R., Holubowicz, W.: A practical framework and guidelines to enhance cyber security and privacy. In: Herrero, A., Baruque, B., Sedano, J., Quintan, H., Corchado, E. (eds.) International Joint Conference CISIS 2015 and ICEUTE 2015. AISC, vol. 369, pp. 485–496. Springer, Heidelberg (2015)

    Google Scholar 

  7. Eisenhauer, J., Donnelly, P., Ellis, M., OBrien, M.: Roadmap to Secure Control Systems in the Energy Sector, U.S. Department of Energy, U.S. Department of Homeland Security (2006)

    Google Scholar 

  8. EU NIS Platform Working Group 3, Secure ICT Research Landscape Deliverable. https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/state-of-the-art-of-the-secure-ict-landscape/at_download/file

  9. European Union Agency for Network and Information Security (ENISA), National Cyber Security Strategies in the World. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-in-the-world

  10. Johnson, S., Larson, B., Edwards, D., Morley, K.: Roadmap to Secure Control Systems in the Water Sector, Water Sector Coordinating Council Cyber Security Working Group (WSCCCWG) (2008)

    Google Scholar 

  11. Markatos, E., Balzarotti, D.: A Roadmap for Systems Security Research, SysSec, FP7 NoE Project

    Google Scholar 

  12. National Institute of Standards and Technology (NIST) 2014, NIST Roadmap for Improving Critical Infrastructure Cybersecurity

    Google Scholar 

  13. Pederson, P., Roxey, T., Gray, J.: Cross-sector Roadmap for Cybersecurity of Control Systems. Industrial Control Systems Joint Working Group (ICSJWG) (2011)

    Google Scholar 

  14. U.S. Department of Homeland Security 2009, A Roadmap for Cybersecurity Research

    Google Scholar 

  15. U.S. Department of Homeland Security 2010, Dams Sector Roadmap to Secure Control Systems

    Google Scholar 

  16. Betterley, R.S.: The Betterley Report: Cyber/privacy insurance market survey (2014). http://betterley.com/samples/cpims14_nt.pdf. Accessed 22 Apr 2016

  17. Jones, S.: Lloyds CEO Sees Cyber Insurance to Surge After Attacks, Bloomberg Business (2014). http://www.bloomberg.com/news/articles/2014-10-08/lloyd-s-ceo-sees-cyber-insurance-to-surge-after-attacks. Accessed 22 Apr 2016

  18. Marotta, A., Martinelli, F., Nanni, S., Yautsiukhin, A.: A Survey on Cyber-Insurance, Consiglio Nazionale delle Ricerche, IIT TR-17/2015. Technical report (2015)

    Google Scholar 

Download references

Acknowledgement

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the CAMINO project under grant agreement no 607406.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michal Choraś .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Choraś, M., Kozik, R., Churchill, A., Yautsiukhin, A. (2016). Are We Doing All the Right Things to Counter Cybercrime?. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38930-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38929-5

  • Online ISBN: 978-3-319-38930-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics