By Raul Bernardino
Abstract:
Modeling a cybercrime is important for the Information and Technology professionals to learn the symptoms and to be alerted (ready at any time) when the hackers have penetrated the systems its environment. The cybercrime behavior can be formulated into the mathematical model. The base of the cybercrime activity is starting from the unethical behaviors. Moreover, the hackers develop information from social engineering or gain information from spoofing, sniffing, skimming, Distributed Denial of Services (DDoS), and other techniques and forming the knowledge.
Keywords: cybercrime, unethical, social engineering, and knowledge
Introduction:
Nowadays cybercriminals activities are using encryption too. Therefore it is hard to detect their movements in the networking systems. The hackers are also using a similar methodology as IT professionals.
We can take several techniques as an example such as:
- Spoofing technique. The spoofing is a technique used to access unauthorized computers, where the attacker (hacker) entered by way of pretending to falsify identity that they are the host or a computer that can be trusted.
Types of Spoofing:
IP Spoofing: the technique of this attack the complex, which consists of several components. The first security exploits, which concerned work with stealth computer and in the relationship of trust that you are the other person.
DNS Spoofing: take the name of the Domain Name Server (DNS) of other systems with the DNS domain of an endangering the legitimate.
Identify Spoofing: the Act of infiltration by using official identity illegally. By using it, the intruder will be able to access everything that is on the network.
- Sniffing:
The Sniffing packet allows individuals to tap the data that is transmitted over the network. This technique was used by the professional to diagnose network problems. But the hackers use this way to tap the unencrypted data such as user id and password of the user.
To formulate the cybercrime activities, I came up RB formula, which is RB stand for Raul Bernardino
Cybercrime = unethical + skill*opportunity (RB1)
Skill = information + knowledge (RB2)
In which the relation between RB1 and RB2 equation becomes:
Cybercrime = unethical + (informationopportunity) + (Knowledgeopportunity) (RB3)
Unethical = Gray Hat + Black Hat (RB4)
The gray hat is still in the area of the balancing (gray) therefore, to be unethical, the gray hat person is expected bigger than his/her intention is more than (>) 50% or it is equivalent to 50% + 1. This means the cybercrime would happen when the hackers desire to dominate a system, host, document, data, and the information which clearly has no right to the possession (unethical). Furthermore, the hackers searching essential information through techniques such as spoofing, sniffing, DDoS, Skimming, and so on, however, it all depends on whether the hackers get a chance to do a penetration and gain the information. Furthermore, the information it’s developed and become an available knowledge and then creates strategic and plan to do reliable attacks in order to gain financial benefit and control the critical and confidential information illegally. It’s including hiding and to eliminate their footpath of hacking (footprints).
Conclusion:
The cybercrime is an illegal activity over the internet and or networking which performed by an individual, a group, and even organizations (hacker or hackers) in order to gain confidential information and or a financial benefit.
Reference list:
Bernardino, R. (2017) Cybercrime [online]. Available from: https://www.researchgate.net/publication/321124293_CYBERCRIME (Accessed date: 6 January 2018)
Bernardino, R. (2017) Modeling a Cybercrime [online]. Available from: https://www.researchgate.net/publication/321145590_Modeling_a_Cybercrime (Accessed date: 6 January 2018)
Congratulations @bernardinoraul! You have received a personal award!
Click on the badge to view your Board of Honor.
Congratulations @bernardinoraul! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
Congratulations @bernardinoraul! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness to get one more award and increased upvotes!