Abstract
Abstract
This paper proposes a methodology based on the concept of Human Factors to obtain Cybersecurity profiles. The profiles are determined by a set of parameters that help model the skills of individuals (potential offenders, victims, etc.) during a digital investigation. The definition is flexible enough to allow the cybersecurity profiles to grow when more data is available. A critical part of the solution is the inclusion of personal devices as important elements of the profiles. This is highly relevant as paradigms such as the Internet of Things (IoT) are transforming society, bringing humans closer to their devices than ever before. IoT devices also produce a lot of data, which can be useful to complete cybersecurity profiles and therefore understand the whole context of a digital investigation. Thus, IoT devices are included in the proposed methodology to capitalise on the strong dependence between users and devices during the analysis.
Funder
Ministry of Economy and Competitiveness
European Unions Horizon 2020 research and innovation programme
Instituto Nacional de Ciberseguridad
Universidad de Málaga
Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376. https://doi.org/10.1109/COMST.2015.2444095
2. IoT Analytics. market insights for the internet of things: State of the IoT 2018: Number of IoT devices now at 7B – Market accelerating. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/. Accessed 2019
3. Bashir M, Wee C, Memon N, Guo B (2017) Profiling cybersecurity competition participants: self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. Comput Secur 65:153–165
4. Kocsis RN, Palermo GB (2016) Criminal profiling as expert witness evidence: the implications of the profiler validity research. Int J Law Psychiatry 49:55–65
5. Nykodym N, Taylor R, Vilela J (2005) Criminal profiling and insider cyber crime. Comput Law & Secur Rev 21(5):408–414
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献