Cybercrime as a Service (CaaS)

The Changing Face of Cybercrime as a Service: An Australian Perspective

Abstract:

Claims of unchecked sophisticated cyberattacks have raised important questions about the types of adversaries, the targets (victims), the changing nature of cybercrime, and the legal ramifications that lead to successful prosecutions. The ease of access to services, such as botnets that can be deployed on behalf of customers by third-party providers, has no doubt encouraged non-technical customers to engage in cyber warfare. As such, they could be legitimately prosecuted; such prosecutions are, however, rare, due to a range of limitations. This article examines the legal and practical issues arising from the evolution of Cybercrime as a Service from a technical to a business-driven model.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com