You are on page 1of 4

The cyber threat landscape: Challenges and future

research directions
GROUP-7
Brief about Cyber Crime
 Cyber crime refers to any crime that involves a computer/mobile and a network.
The computer may have been used in the commission of a crime, or it may be the
target.
 Various categories of CyberCrime. Cyber Crime may be basically divided into 3
categories 1)Against Persons 2) Against Property 3) Against Government


Against Person: transmission of childpornography, harassment of any one with the use
of a computer such as e-mail, and cyberstalking.
Against Property: unauthorized computer trespassing through cyberspace, computer
vandalism, transmission of harmful programs, and unauthorized possession of
computerized information
Against Government: Cyber Terrorism is one distinct kind of crime in this category.
When an individual "cracks“ into a government or military maintained website.

 Hacking
 Cyber squatting
 Phishing
 Cyber stalking




Cyber crime prevention strategies: applying criminological
theories
 It describe how the Routine Activity Theory can be applied to
mitigate these risks by reducing the opportunities for cyber
crime to occur, making cyber crime more difficult to commit
and by increasing the risks of detection and punishment
associated with committing cyber crime
Cyber crime prevention strategies using
RAT, for example,
target each of these areas e (1)
increasing the effort required
to offend; (2) increasing the risk of
getting caught; and (3)
reducing the rewards of offending
Recommendations
 While cyber criminal and security risks may be seen by some as an extension of existing
threats to cyber and national security, the threat landscape is an extremely fast-moving
environment. Only seven years ago, several criminologists warned that ‘those who fail to
anticipate the future are in for a rude shock when it arrives’. It is essential for our society to
be prepared and for our businesses, governments and research institutions to innovate faster
than criminals and other actors with malicious intents.

Continue to have the required capabilities to
(1) reduce both the likelihood and consequence of threat against our nation,
(2) provide societal security and resilience, and
(3) enhance and support digital productivity across society, we need to invest in research and
development (R&D) initiatives.
 Although governments should continue to invest significantly in science, technology,
engineering, and mathematics (STEM) education and R&D, there is a need for the private
sector to invest in joint R&D initiatives to enable cyber security researchers to play a more
significant role in designing state of the art security software and hardware that can be
deployed in an online environment
 The challenge for the public and private sectors is to design technologies that are robust in
the sense that their legitimate use is minimally constrained, but their illegitimate use
prevented or discouraged