Adapting cybersecurity practice to reduce wildlife cybercrime
نویسندگان
چکیده
Abstract Wildlife trafficking is driving many species to extinction and overwhelming law enforcement efforts stop it. At least a 2-fold increase in the number of traffickers who are put out business needed help avoid these extinctions. A cybersecurity-based solution described this article consists large international confederation criminal investigators collecting intelligence on persons involved wildlife trafficking, analyzing it, then recommending (a) cybercriminals detain, (b) surveil, (c) where when intercept cybercriminal-initiated wire transfers shipments products. nowadays often use internet commit their cybercrimes. Prosecuting such crimes challenging. Indeed, one top five challenges cybersecurity develop methods for pursuing bringing them justice through acquisition digital evidence that links specific individuals illegal acts. The proposed finds two lists remove. first found by computing centrality measures statistically estimated (reconstructed) current social network identify those criminals whose removal would, according theory, maximally disrupt syndicate’s operations. This list contains identified as kingpins, and/or information brokers. second m results largest simulator-computed drop poaching trafficked over next year. Database access control form security (InfoSec), or data security—a chief component cybersecurity. Here, distributed developed keeping confederation’s database secure from unauthorized insider threats. procedure uses only peer-to-peer transactions. trade rhino horn used illustrate how would several countries build simulation political–ecological system operation, fitted simulator remove, block, product seize. All software implement federated its freely available.
منابع مشابه
Approach To Solving Cybercrime And Cybersecurity
Cybercrime is becoming ever more serious. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international perspective on fighting Cybercrime. This work seeks to define the concept o...
متن کاملConservation in Practice Using Decision Modeling with Stakeholders to Reduce Human–Wildlife Conflict: a Raptor–Grouse Case Study
The successful resolution of human-wildlife conflicts requires the participation of local communities and other stakeholder groups in formulating management decisions. In the uplands of the United Kingdom, a controversial conservation issue concerns the relationship between the conservation of a legally protected raptor, the Hen Harrier (Circus cyaneus) and the management of a gamebird, the Red...
متن کاملCybersecurity: From Engineering to Science
Engineers design and build artifacts bridges, sewers, cars, airplanes, circuits, software -for human purposes. In their quest for function and elegance, they draw on the knowledge of materials, forces, and relationships developed through scientific study, but frequently their pursuit drives them to use materials and methods that go beyond the available scientific basis. Before the underlying sc...
متن کاملCrossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
—New and innovative technologies will only make a difference if they are deployed and used. It does not matter how visionary a technology is unless it meets the needs and requirements of customers/users and it is available as a product via channels that are acceptable to the customers/users. One of the biggest ongoing challenges within the cybersecurity research community is transitioning techn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cybersecurity
سال: 2023
ISSN: ['2057-2093', '2057-2085']
DOI: https://doi.org/10.1093/cybsec/tyad004