SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Cybercriminal Networks: Origin, growth and criminal capabilities

Rutger Leukfeldt

1 min read
in Book, Career, Learning

Cybercriminal networks make use of digital means, such as phishing, malware, or hacking to steal money from customers of financial institutions. The author analyzes the processes of origin, growth, and criminal capabilities to put forward several explanations for the differences found between traditional criminal networks and cybercriminal networks.

Although the majority of these cybercriminal networks still rely on real-world social ties for their origin and growth, some networks make full use of the advantages that digitization provides. As a new kind of offender convergence setting, forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important.

Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Furthermore, based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks.

This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security. Dissertation.

Get Book

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: BooksCriminal GroupsCriminal Groups BooksLearningRutger Leukfeldt
1
VIEWS
ADVERTISEMENT

Related Posts

Network Forensic Analyst (GNFA)

Network Forensic Analyst (GNFA)

June 29, 2022
Cyber Threat Intelligence (GCTI)

Cyber Threat Intelligence (GCTI)

June 29, 2022
Cyber Threat Intelligence

Cyber Threat Intelligence

June 29, 2022
Threat Hunter

Threat Hunting Professional

June 29, 2022

More Articles

Certification

Certified Information Security Manager (CISM)

October 28, 2020
Course

Cryptography and Hashing Fundamentals in Python and Java

May 30, 2022
Incidents

Robinhood Reveals Data Breach and Extortion Shakedown

November 9, 2021
Alerts

Ricon Mobile security advisory

February 1, 2022

Symantec’s Targeted Attack analytics Tool (TAA)

March 15, 2021
Incidents

Threat actors offer for sale data for 50 millions of Moscow drivers

October 25, 2021
Quotes

“It has been said that InfoSec has to…”

October 3, 2020
Course

Security Operations Architecture

February 10, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....