18500 Cyber-crime Science = Crime Science + Information Security

Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to typical Information Security problems, namely phishing and on-line auction fraud, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions.

Spotlight

Titan Solutions Australia

Titan Solutions has been providing small businesses and not for profits across Australia with reliable technology support that drives real results to their organisation. We place emphasis on consistent and efficient use of technology solutions to help simplify work processes and streamline operations, all while keeping costs to a minimum. We have years of experience with managed services, desktop, server, operating system and application refresh and we use the latest technology tailored with your needs in mind. Our engineers have extensive experience in both small scale deployments and large enterprise roll-outs all across Australia.

OTHER WHITEPAPERS
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More

Spotlight

Titan Solutions Australia

Titan Solutions has been providing small businesses and not for profits across Australia with reliable technology support that drives real results to their organisation. We place emphasis on consistent and efficient use of technology solutions to help simplify work processes and streamline operations, all while keeping costs to a minimum. We have years of experience with managed services, desktop, server, operating system and application refresh and we use the latest technology tailored with your needs in mind. Our engineers have extensive experience in both small scale deployments and large enterprise roll-outs all across Australia.

Events