TY - JOUR
T1 - The cyber threat landscape
T2 - Challenges and future research directions
AU - Choo, Kim Kwang Raymond
PY - 2011/11
Y1 - 2011/11
N2 - Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.
AB - Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.
KW - Culture of security
KW - Cyber crime
KW - Cyber exploitation
KW - Policing and preventative strategy
KW - Public private partnership
KW - Routine Activity Theory
UR - http://www.scopus.com/inward/record.url?scp=80955142795&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2011.08.004
DO - 10.1016/j.cose.2011.08.004
M3 - Article
SN - 0167-4048
VL - 30
SP - 719
EP - 731
JO - Computers and Security
JF - Computers and Security
IS - 8
ER -