LISTCRIME.COM
LISTCRIME.COM

The Adversary, who they are.    

A Holistic view to approaching Cyber Security and Cyber Crime    


The Cyber Ecosystem of Internet Protocol Resources attempts to provide a more holistic and unified view to our approach to cybercrime and cybersecurity. The map below attempts to highlight a variety of different levels of people, processes, technology and physical services that make up our cyber ecosystem, so that we can start to view the internet and its borderless security problems more broadly.

THE ABUSERS OF INTERNET PROTOCOL RESOURCES, LAYER 7

The Abusers/Adversary Explained:
1.Cyber-Criminal - An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
2.Hacktivist - The use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda, ideological motives or social change.
3.Competitors - Industry competitor, a competing interest involving cyber spying or espionage. An attempt to gain an economic advantage, targeting sensitive Intellectual Property.
4.Insider (knowingly or unwitting) Threat to an organization that comes from people within the Organization, such as employees, former employees, contractors or business associates, anyone who has legitimate access, either by accidental or deliberate misuse.
5.Nation State - Motivated by nationalism and tasked with gaining secrets from or disrupting other nations via cyber means. Organized crime entity employed by a national government.
A. Cyber Warfare -. Cyber Warfare is the use of digital attacks to attack a nation, causing comparable harm to actual warfare and or disrupting the vital computer systems.
B. Cyber Terrorism - Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm in order to achieve political or ideological gains through threat or intimidation.

THE CYBER ECOSYSTEM MAP