Criminal profiling and insider cyber crime
Section snippets
History of profiling
The profiling of criminals dates back to the 15th century. The investigative technique's path through history has been, at times, poorly documented and marred with occasional inaccurate findings and prejudices. As many adversaries as the method seems to have, however, there exists strong instances throughout history in which the process has produced incredible results that demand attention and consideration. Today, profiling takes a very different form than it did in the 1400s. Since the 1970s
Cyber crimes against business
Cyber crime is a hot topic of the 20th century. The world stands at a crossroads for developing defense mechanisms against it. Cyber crime by its most general definition can be any crime committed over a computer network.17 These crimes have been occurring since the creation of the Internet. If there is information to be shared, there is information to be sabotaged. The challenge is faced by every online individual, company or
Insider cyber crime and abuses
Insider abuse of Net access and unauthorized insider access are two concerns for employers. While insider abuse of net access went up to US$50,099,000 from US$35,001,650 in 2001, the unauthorized insider access decreased to US$4,503,000 from US$6,064,000 (Power, 2002).25 Upwards of 70% of all computer crime directed toward companies is committed by insiders.26 The insider abuse of
Profiles and cyber criminals
There are many differences between cyber crime and conventional crime both in committing the crime and in prosecuting it. All of which seem to favor the criminals. This makes it very difficult to track, catch, and prosecute cyber criminals within the current legal system. Many times, the cyber criminal may be far away from the place where the crime takes place. The attackers can choose the place they will be at the time that the crime is to be committed because cyber crime does not require a
Applying profiles to insiders
In order to make the most precise profile of an inside cyber criminal, the first step will be to divide the type of cyber crime into one of many possible subcategories. Insider cyber crime can be generalized in four main categories: espionage, theft, sabotage, and personal abuse of the organizational network.
A spy is: “a person who keeps close and secret watch on the activities and words of another or others” or “a person who seeks to obtain confidential information about the activities, plans,
References (0)
Cited by (26)
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
2015, Digital InvestigationCitation Excerpt :Our proposed profiling system, which comprises mobile devices and a remote server, is analogous to criminal profiling. In the real world, criminal profiling, also known as offender profiling, is a methodology that is intended for helping investigators accurately predict and profile the characteristics of unknown criminal subjects or offenders (Kocsis, 2009; Nykodym et al., 2005; Rogers, 2003). We adopt criminal profiling methodology in the malware analysis domain.
Impacts of increasing volume of digital forensic data: A survey and future research challenges
2014, Digital InvestigationCitation Excerpt :Producing a profile of a suspect is another facet of criminal intelligence. Nykodym et al. (2005) discuss the application of psychological profiling techniques to create profiles in relation to cyber criminals and cyber-crimes. Abraham (2006) discusses the application of investigative or criminal profiling to identify the personality characteristics of a user, such as email authorship analysis.
Influencing factors identification in smart society for insider threat in law enforcement agency using a mixed method approach
2022, International Journal of System Assurance Engineering and ManagementInformational Consciousness and cyber crimes: A study of a sample of social network users
2022, Journal of Faculty of Arts, Fayoum University(De-)constructing attacker categorisations: A typology iteration for the case of digital banking
2020, Journal of Universal Computer ScienceExamining and constructing attacker categorisations — An experimental typology for digital banking
2019, ACM International Conference Proceeding Series