【24h】

Framing the Attacker in Organized Cybercrime

机译:在有组织的网络犯罪中构筑攻击者

获取原文
获取原文并翻译 | 示例

摘要

When large values are at stake, the attacker and the attacker's motives cannot be easily modeled, since both the organization at stake and the possible attackers are unique and have complex motives. Hence, rather than using stereotypical attacker models, recent work proposes realistic profiling of the opponent by the use of user-centered design principles in form of the persona methodology. Today, cyber crime is often organized, i.e., attacks are planned and executed by an organization that has put together a tailor made team consisting of the necessary skills for the task. The actual individuals taking part in the attack might not be aware of or interested in the overall organizational motives. Rather, taking motives behind espionage, fraud, etc., into account requires consideration of the attacking organization rather than the individuals. In this paper, based on interviews with IT security experts, we build on the attacker persona methodology and extend it with methodology to also handle organizational motives in order to tackle organized cyber crime. The resulting framework presented in the paper extends the attacker persona methodology by also using narratives in order to assess the own organization's security. These narratives give rise to intrigue sketches involving any number of attacker personas which, hence, make it possible to take organized cyber crime into account.
机译:当面临重大价值时,攻击者和攻击者的动机就很难轻易建模,因为处于危险中的组织和可能的攻击者都是独特的,并且动机复杂。因此,最近的工作不是使用定型的攻击者模型,而是通过使用以角色为中心的方法以用户为中心的设计原则,对对手进行了现实的分析。如今,网络犯罪通常是有组织的,即攻击是由组织策划和执行攻击的组织,该组织组成了量身定制的团队,其中包含执行任务所需的技能。参与攻击的实际人员可能不了解组织整体动机或对组织整体动机不感兴趣。而是,要考虑到间谍,欺诈等背后的动机,需要考虑攻击组织而不是个人。在本文中,基于对IT安全专家的访谈,我们以攻击者角色方法为基础,并将其扩展为还可处理组织动机的方法,以应对有组织的网络犯罪。本文中介绍的结果框架通过使用叙述来扩展攻击者角色方法,以评估自身组织的安全性。这些叙述引起了涉及任意数量攻击者角色的阴谋勾画,因此可以考虑有组织的网络犯罪。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号