Topic: Cyber Crime
Name: Mansi Singh
Detection of cyber-attacks
The paper proposes a method for improving the accuracy of early detection of cyberattack with a small impact, in which the mathematical expectation is a fraction of the total, and the pulse repetition period is quite long. Early detection of attacks against telecommunication networks is based on traffic analysis using extreme filtering. The algorithm of fuzzy logic for deciding on the results of extreme filtering is suggested. The results of an experimental evaluation of the proposed method are presented. They demonstrate that the method is sensitive even with minor effects. In order to eliminate the redundancy of the analysed parameters, it is enough to use the standard deviation and the correlation interval for decision making. Privalov A. et al 2020.
Investigation of cyber threats
This paper provides a close investigation into the landscape of both cyber threats and actual incidents in the maritime sector, identifying the cyber trends and challenges as they relate to safe navigation and marine shipping. As an important subset of cyber threats that impact many maritime systems, the vulnerabilities of satellite navigation systems, in particular the Global Positioning System (GPS), receive special attention. For this article, a systematic literature review was conducted, complemented by the research and analysis of a specific spoofing event. Analysing available resources, we might summarize that a shift in mind-set is essential to direct more attention and resources toward cybersecurity as well as the necessity for manufacturers to improve the cybersecurity of their products, as shipping systems currently remain vulnerable to cybercriminals. Androjna, A., et al 2020.
Awareness of cyber threats
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber -hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management. The rapid proliferation in the automation of cyber -attacks is reducing the gap between information and operational technologies and the need to review the current levels of robustness against new sophisticated cyber -attacks, trends, technologies and mitigation countermeasures has become pressing. Sensors, 20(24) et al 2020.
Protection of digital content
Access to audio-visual and digitized heritage is crucial for the economy and overall well-being. It also offers important avenues for the development of creativity and intercultural dialogue, shaping people’s identity and contributing to cultural diversity. Yet the rise of the digital sector has also been accompanied by the proliferation of cyber or computer-related crime. Therefore, the harmonization of cybercrime legislation has widely been discussed in different international fora. At the same time, the protection of digital content has become a highly important issue in the context of the expanding policies aimed at ensuring public, open access to digitized resources for non-commercial, educational, and cultural purposes. Chałubińska-Jentkiewicz, et al (2020).
Current challenges during covid 19
The current world challenges include issues such as infectious disease pandemics, environmental health risks, food safety, and crime prevention. Through this article, a special emphasis is given to one of the main challenges in the healthcare sector during the COVID-19 pandemic, the cyber risk. Since the beginning of the Covid-19 pandemic, the World Health Organization has detected a dramatic increase in the number of cyber -attacks. For instance, in Italy the COVID-19 emergency has heavily affected cybersecurity; from January to April 2020, the total of attacks, accidents, and violations of privacy to the detriment of companies and individuals has doubled. Sardi, et al 2021.
Solution strategy to cybercrime
Intel’s “Bring Your Own Device” (BYOD) adoption quickly became popular as an alternative workplace solution strategy. It enables employees to use their personally owned devices to perform business activities, leading to increased productivity and employee satisfaction. However, BYOD also brought associated risks because of exponential growth in the number of cybersecurity incidents due to which business ecosystem gets disrupted and fragmented. Although several methods and mechanisms have been developed and adopted to mitigate the risk associated with BYOD, they still represent a challenge as corporate network gets exposed to inherent threats caused by the BYOD threat landscape. Md, et al (2021).
Essential step for crime mitigation
Crisis and disruption are often unpredictable and can create opportunities for crime. During such times, policing may also need to meet additional challenges to handle the disruption. The use of social media by officials can be essential for crisis mitigation and crime reduction. In this paper, we study the use of Twitter for crime mitigation and reduction by UK police (and associated) agencies in the early stages of the Covid-19 pandemic. Our findings suggest that whilst most of the tweets from our sample concerned issues that were not specifically about crime, especially during the first stages of the pandemic, there was a significant increase in tweets about fraud. Manja, N., et al 2020.
Consensus in media about cyber crime
Cybercrime perpetuates as a major threat to the reputation and economy of a nation. There is consensus in the media and academic journals alike, that cybercrimes have incremented over the years. During the coronavirus pandemic in the year 2020, a global lockdown imposed by governments forced people to be homebound, leading to a subsequent surge in online users. This resulted in cybersecurity risk hitting close to home, with an upsurge in cybercrimes. This article attempts to make sense of the elevated cybercrime landscape. For the last two decades, criminological research had attempted to explore variants of technology-enabled crime and have examined theories to account for offending. Govender, et al 2021.
Growth of cybercrime
Actuality of surveillance the cyber -criminality problem and its impact upon a society is proved out by the rapid increase in a quantity of such crimes and material losses accordingly. The statistical analysis of their number increases and the caused losses is made in the process of cybercrimes studying. It’s revealed that besides the catastrophic number growth of such crimes, the relative size of losses is increased too. The analysis of the actual data for the nine years is made, on which basis the indicators’ table of the cyber -attacks number, the general losses and the indexes of their dynamics is elaborated. The analysis of the struggle’s state with cyber -criminality in our state is made. The recommendations are presented in the limits of the research for the increase of the information protection’s reliability. Tkalichenko, S., et al 2021.
Cyberattack campaigns
Generated a set of unique cyber – crime related circumstances which also affected society and business. The increased anxiety caused by the pandemic heightened the likelihood of cyber -attacks succeeding corresponding with an increase in the number and range of cyber -attacks. This paper analyses the COVID-19 pandemic from a cyber – crime perspective and highlights the range of cyber -attacks experienced globally during the pandemic. Cyber -attacks are analysed and considered within the context of key global events to reveal the modus-operandi of cyber-attack campaigns. Harjinder, et al 2020.
References:
A review of cyber-ranges and test-beds: Current and future trends. (2020). Sensors, 20(24), 7148. doi:http://dx.doi.org/10.3390/s20247148.
Androjna, A., Brcko, T., Pavic, I., & Greidanus, H. (2020). Assessing cyber challenges of maritime navigation. Journal of Marine Science and Engineering, 8(10), 776. doi:http://dx.doi.org/10.3390/jmse8100776.
Chałubińska-Jentkiewicz, K. (2020). Digital single market. cyber threats and the protection of digital contents: An overview. Santander Art and Culture Law Review, (2), 279-292. doi:http://dx.doi.org/10.4467/2450050XSNR.20.020.13023.
Govender, I., Watson, B. W. W., & Amra, J. (2021). Global virus lockdown and cybercrime rate trends: A routine activity approach. Journal of Physics: Conference Series, 1828(1) doi:http://dx.doi.org/10.1088/1742-6596/1828/1/012107.
Harjinder, S. L., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2020). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Ithaca: Cornell University Library, arXiv.org. doi:http://dx.doi.org/10.1016/j.cose.2021.102248.
Manja, N., Johnson, S. D., & Ekblom, P. (2020). “Show this thread”: Policing, disruption and mobilisation through twitter. an analysis of UK law enforcement tweeting practices during the covid-19 pandemic. Crime Science, 9(1) doi:http://dx.doi.org/10.1186/s40163-020-00129-2.
Md, I. A., & Kaur, S. (2021). Next-generation digital forensic readiness BYOD framework. Security and Communication Networks, 2021 doi:http://dx.doi.org/10.1155/2021/6664426.
Privalov, A., Lukicheva, V., Kotenko, I., & Saenko, I. (2020). Increasing the sensitivity of the method of early detection of cyber-attacks in telecommunication networks based on traffic analysis by extreme filtering. Energies, 13(11), 2774. doi:http://dx.doi.org/10.3390/en13112774.
Sardi, A., Rizzi, A., Sorano, E., & Guerrieri, A. (2021). Cyber risk in health facilities: A systematic literature review. Ithaca: Cornell University Library, arXiv.org. doi:http://dx.doi.org/10.3390/su12177002.
Tkalichenko, S., Khotskina, V., Tsymbal, Z., Solovieva, V., & Burunova, O. (2021). Modern structural level and dynamics of crimes with the use of computers, automation systems, computer networks and electric connection systems. Les Ulis: EDP Sciences. doi:http://dx.doi.org/10.1051/shsconf/202110001014.