Cybersecurity And Cybercrime Investigation

Author First name, Last name, Institution

Farkhund Iqbal
Mourad Debbabi
Benjamin C. M. Fung

Document Type

Book Chapter

Source of Publication

Machine Learning for Authorship Attribution and Cyber Forensics

Publication Date

12-5-2020

Abstract

Society's increasing reliance on technology, fueled by a growing desire for increased connectivity (given the increased productivity, efficiency, and availability to name a few motivations) has helped give rise to the compounded growth of electronic data. The increasing adoption of various technologies has driven the need to protect said technologies as well as the massive amount of electronic data produced by them. Almost every type of new technology created today, from homes and cars to fridges, toys, and stoves, is designed as a smart device, generating data as an auxiliary function. These devices are all now part of the Internet of Things (IoT), which is comprised of devices that have embedded sensors, networking capabilities, and features that can generate significant amounts of data. Not only has society seen a dramatic rise in the use of IoT devices, but there has also been a marked evolution in the way that businesses use these technologies to deliver goods and services. These include banking, shopping, and procedure-driven processes. These enhanced approaches to delivering added value create avenues for misuse and increase the potential for criminal activities by utilizing the digital information generated for malicious purposes. This threat requires protecting this information from unauthorized access, as this data (ranging from sensitive personal data, demographic data, business data, to system data and context data) can be monetized by criminals.

ISSN

2364-9488

Publisher

Springer International Publishing

Last Page

21

Disciplines

Business | Computer Sciences

Indexed in Scopus

no

Open Access

no

Share

COinS