CRIM 218 Lecture Notes - Lecture 6: Modus Operandi, Cybercrime, Structural Level
Document Summary
Little is known about the characteristics of the o enders or their modus operandi. Little or no research on pro ling cybercriminals or cybercrime. Rooted in rational choice theory, routine activities theory, and crime pattern theory. For changes to the environment to have any e ect o enders must exercise some degree of rationality (cost-bene t analysis). Scp strategies need to be minute or granular (i. e. , they work at the micro level, rather than at the macro or structural level). Di erent scp strategies required for di erent countries and di erent crime categories (including di erent types of cybercrime). Target hardening, e. g. , encrypting sensitive information custom installation of the os (rather than using default), requiring employees to use strong passwords, etc. Access control, e. g. , photo id cards, biometric credentialing, check-in booths with security guards. De ecting o ender, e. g. , storing data o -site (in the cloud). Controlling facilitators, e. g. , conducting background checks, restricting installation of exe les to administrators.