Co-Founder Responsible Cyber | World Economic Forum Expert Network Cyber Security | 3 Books📚| TEDx Speaker | On Forbes Poland 🇵🇱| Cyber Insurance & Supply Chain Risk |
PhD, S-CISO, CISSP, Cert SCI (General Insurance) 2mo I am very proud and happy to share that today our startup Responsible Cyber Pte. Ltd. has two smart and talented engineers from
#Tunisia 🇹🇳 ! I hope I will be able to find more talented and motivated people to join our journey!
#cyber
#startup
#people Dr Magda Chelly’s Post
More from this author
Explore topics
This is a preview. Log in to get access
Abstract
Cybercrime is now recognised as a major international problem, with continual increases in incidents of hacking, viruses, and other forms of abuse having been reported in recent years. However, although many people may recognise cybercrime-related terminology, agreeing and defining what they actually mean can prove to be somewhat difficult. As a result, alternative classifications have emerged from a range of authoritative sources, which are similar in some respects, but markedly different in others. This paper considers the difficulty associated with categorising cybercrime, and identifies that a harmonised nomenclature would be beneficial to individuals and organisations concerned with combating the problem, as well as to those concerned with reporting the issue to the general public. The discussion presents a variety of different top-level classifications of cybercrime, each of which has been utilised in practice by authoritative sources in the field. The need for further sub classification is then illustrated by examining the specific issue of hacking, which reveals that numerous types and motivations can be identified, and that the simple, yet frequently used, label of ‘hacker’ is consequently inappropriate to convey any real impression of the activities in many cases.
Journal Information
Dr. Bill Hutchinson founded the Journal of Information Warfare 15 years ago, and the staff of the JIW wanted to bring him back so that this publication could focus on its original intent – namely to deliver high quality, highly technical papers on cutting edge IW and Cyber Warfare topics. This will be done by linking closely with the academic IW conferences, to deliver new and exciting articles for publication in the JIW. Dr Armistead received his PhD in IW and has written three books.
Publisher Information
Peregrine Technical Solutions LLC (Peregrine) is a small disadvantaged business, 8(a), Alaska Native Corporation (ANC), operating with a primary NAICS code of 541513, under the three-year size standard under $27.5M. Our CAGE Code is 68PP4: our DUNS # is 96-6658028, and we have an approved DCAA accounting system. Based in Hampton Roads, Peregrine was founded in 2011 to meet the expanding requirements of Cyber offense/defense activities, including full-spectrum Information Operations (IO) and security engineering.
Rights & Usage
This item is part of a JSTOR Collection.
For terms and use, please refer to our Terms and Conditions
Journal of Information Warfare © 2001
Peregrine Technical Solutions
Request Permissions
The Present Threat LandscapeWhat does TOR stand for?1.) The Other Realm.2.) The Onion Router.3.) The Outside Ransomware.4.) The Outer Reach.2.) The Onion Router
What is the LEAST likely motivator of a black-hat hacker in today's cyber world?
5.) NotorietyWhich of the following are popular exploit kits?
Which statements describe the characteristics of an Advanced Persistent Threats?
Recommended textbook solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume
23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene
369 solutions
Social Psychology
10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson
525 solutions
Human Resource Management
15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine
249 solutions
Applied Calculus for the Managerial, Life, and Social Sciences
8th EditionSoo Tan
6,275 solutions