2016 - Cybercrime Surveys Report: Acknowledgements
2016 - Cybercrime Surveys Report: Acknowledgements
2016 - Cybercrime Surveys Report: Acknowledgements
Table of Contents
1 Overview of the Cybercrime Surveys ...................................................................................................... 2
1.1 Introduction .................................................................................................................................... 2
1.2 Methodology .................................................................................................................................. 2
2 Results and Findings ................................................................................................................................ 4
2.1 Definitions of cybercrime ............................................................................................................... 4
2.2 What activities are considered to be cybercrimes? ....................................................................... 4
2.3 Best practices and workplace policies ............................................................................................ 5
2.4 Cyber security responsibility .......................................................................................................... 8
2.5 Security solutions ........................................................................................................................... 9
2.6 Sources of data and information on cybercrime .......................................................................... 10
2.7 Personal experiences of cybercrime............................................................................................. 10
2.8 Consumer rights ........................................................................................................................... 12
2.9 Cybercrime research – Return on Investment (ROI) .................................................................... 12
2.10 Information sharing ...................................................................................................................... 14
2.11 Cyber Threats................................................................................................................................ 15
3 Analysis from the stakeholder surveys – What are the research gaps? ............................................... 16
3.1 Gap Analysis.................................................................................................................................. 16
4 Conclusions............................................................................................................................................ 18
Acknowledgements
The authors would like to provide grateful thanks to all the many survey participants & respondents who
gave up valuable time to complete the surveys, this report is primarily for you. To the European Commission
Seventh Framework Programme, that made this possible. APWG, MAAWG, ENISA, and the wider cyber
security community. LinkedIn, Survey Monkey, Google, & the CyberROAD team;
UNIVERSITÀ DEGLI STUDI DI CAGLIARI, TECHNISCHE UNIVERSITAET DARMSTADT, INDRA, POSTE ITALIANE,
SECURITY MATTERS, VITROCISET, FOUNDATION FOR RESEARCH AND TECHNOLOGY HELLAS, INOV,
DEMOKRITOS, SBA, PROPRS, MINISTÉRIO DA JUSTIÇA (PORTUGAL), CEFRIEL, SUPSI, ROYAL HOLLOWAY,
MINISTRY OF NATIONAL DEFENCE, GREECE, MELANI
1.2 Methodology
The surveys were designed using specialist online software based on the Delphi method where a series of
surveys drawdown to explore previously answered questions at a deeper level. The initial survey was of a
generic nature followed by two further surveys divided by the subject matter; Survey 2 – Technical and
Organizational; Survey 3 – Social, Economic and Political.
In order to capitalize upon the intended European standpoint of the surveys they were designed to allow
for a comparative study between different regions from world to EU and to country specific (macro to
micro). Two versions of the surveys were made available: one for English speakers worldwide and the other
translated into Polish and aimed at Polish users. Poland was primarily selected as a statistical control group,
as the Polish language is primarily spoken only within one country and therefore the results provide a
crossmatch of one EU country versus multiple countries to establish any cultural bias or imbalance of survey
questions from the results. As the results shown, all Polish results were within 5% of the English language
survey results.
The surveys were distributed in a variety of formats: project website, a dedicated website, announcements
via social media, and prompting by email to interested parties.
The breakdown of respondents can be shown as:
1
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=7299982
2
http://www.springer.com/gb/
Survey 1 respondents indicated a lack of formal cybersecurity management policies in their place of work.
In Survey 2 explored this theme further asking why they thought this was the case.
Participants were asked if there was a clear policy within their work place on how to escalate anything
suspicious.
Survey 1 indicated low levels of training on cybersecurity within their workplace. Survey 3 respondents were
asked who should be responsible for the cost of training.
Over 90% of respondents of the more advanced Survey 2 – Technical and Organizational thought there was
too much pressure to prematurely roll out IW/web applications and projects.
As previous respondents had indicated the two greatest effects of cybercrime had been “down time” and
“inconvenience” respondents were asked how much time was lost as a victim to cybercrime.
Consequences Defense
Theme Scenario Research GAP
(actual view) (future view)
No standard
definitions;
Lack of international Clear-cut definitions
Perceptions How to achieve cross-
agreements; legal of cybercrime and
differ on what border agreement and
Definitions sanctions take place cross-border co-
is an act of internationally agreed
within national operation to improve
cybercrime sanctions
borders where legal sanctions
perceptions may
differ
High BYOD
Best Practices
usage with low Compliance within the Policies and best
and Workplace High risk workplace
rates of best workplace. Effective practices for the
Cyber Security environments
practice measures in place. workplace
Policies
policies
Responsibility
boundaries are clear Cyber security as a
Divided views cut between shared responsibility.
Ineffective cyber
on where governments, ISPs, Where/what are the
Cybersecurity security measures due
responsibility service providers, law overlaps? Who should
Responsibility to inappropriate
for cyber enforcement, end pay for cyber security
responsibilities
security lays. users and training?
international
organisations.
What sources
Lack of trust in data
of data can be Industry standards Industry standards and
and security
Trusted Sources trusted in the and benchmarking benchmarking. What
information.
of Data absence of with data provided by determines a trusted
Inaccurate forecasting
industry trusted sources. source for data?
for budgets
benchmarking?
Real-life vs Fit-for-purpose
Inappropriate
Stakeholder assumed Proactive security, fit- solutions. Actual
solutions providing
Experiences scenarios and for-purpose measures consequences of
ineffective measures
consequences cybercriminal activity.
Research and
Inappropriate
development
solutions and
Return on projects are not R&D will provide Where should research
ineffective measures
Investment & required to appropriate return on money be spent in the
as a result of
Economics prove their investments future?
inadequate research
cost-
and development
effectiveness.
Stakeholders
do not know
Incident and event
who to share What makes a trusted
Inaccurate collation of information will be
information entity? How can
Information data and a barrier to shared with trusted
with although information sharing be
Sharing legal action against entities followed by
they encouraged in a safe
perpetrators of crime appropriate legal
understand the environment.
action
value of doing
so
4 Conclusions
Stakeholder responses to the CyberROAD surveys provide a snapshot of personal experiences of
cybercriminal activities and cyber security policies within the home and at work. The surveys illustrate the
need for changes in perceptions and practices before cyber security solutions can be fully effective.
Practices within the workplace fall short of what is desired leaving staff without proper guidance and at
high risk to threats. Proper guidelines and processes within a comprehensive cyber security plan improves
defenses against attack. More research on how these can be enacted is necessary.
Other problems areas highlighted are a lack of information sharing which limits the ability to collect and
collate accurate cyber security data. Stakeholders often do not know where to report incidents or lack trust
in the appointed entity. This limits the capacity to take appropriate action which is further hindered by the
lack of cross-border cooperation between legal entities.
Industry standards are yet to fully evolve meaning that benchmarking is not commonplace. Consumer rights
can be enhanced with appropriate best practices in place.
Reactive security is extensive with inappropriate measures in place that are not fit-for-purpose. Stakeholder
experiences indicate that proactive security is not usual with attitudes to newer ideas slow to change.
The surveys highlight that research gaps are widespread and improved ROI could be achieved through
funding being targeted in these areas.
The electronic version of this document is available on the official CyberROAD project’s website
www.cyberroad.eu
Cyber criminal activities are reported to be continuously growing and are negatively impacting the development
of the European society and economy, and are pervasively affecting all the aspects of our daily lifes. Even though
the level of awareness of cyber threats has increased, and Law Enforcement acts globally to fight against them,
illegal profits have reached unsustainable figures. In addition to the economic reasons, however, cyber crime
often hides other political and social motivations.
What is CyberROAD?
CyberROAD is a 24-month research project funded by the European Commission under the Seventh Framework
Programme (with a total budget of 1.300.000 €).
In order to help coordinate the European efforts in the fight against cyber crime and cyber terrorism, the
CyberROAD project has identified 19 research topics on which Europe should concentrate resources to increase
its security and resilience, organizing them in strategic roadmap for Cyber Security Research.
The roadmap encompasses all the aspects which may contribute to reach this goal, from the development of
better and more robust technologies for prevention, detection and mitigation of the attacks, to the legal and
forensics aspects concerning the fight against cyber crime and cyber terrorism, up to the need of developing
better methods to measure and to analyse the phenomenon and make the citizens more aware of it.
The roadmap is the final outcome of a process of information collection and analysis, during which the existing
literature has been deeply analysed, public events and interviews with the relevant stakeholders have been
organized in order to grasp the future challenges which our society will be called to face in the forthcoming years.
A ranking methodology has been also applied to the devised research topics which allows to obtain different
views of the research roadmap tailored on the needs of the different stakeholders which may be interested in
the project outcomes.
The CyberROAD project has been implemented by a consortium of 20 international partners, involved in the fight
against Cyber Crime and Cyber Terrorism. Members include representatives from Academia and Research,
Industry, Government and NGOs across Europe:
PRA Lab, University of Cagliari, Italy (Project coordinator).
CEFRIEL - Forcing Innovation, Italy.
CyberDefcon, UK.
National Centre for Scientific Research “Demokritos”, Greece.
FORTH - Institute of Computer Science, Greece.
Governo de Portugal - Ministério da Justiça, Portugal.
Hellenic Republic - Ministry of National Defence, Greece.
Indra, Spain.
INOV - Inesc Inovação, Portugal.
McAfee, UK.
MELANI - Reporting and Analysis Centre for Information Assurance, Switzerland.
NASK, Poland.
Poste Italiane, Italy.
PROPRS - Professional Probabilistic Risk Solutions, UK.
Royal Holloway - University of London, UK.
SBA Research, Austria.
Security Matters, Netherlands.
SUPSI - Scuola Universitaria Professionale della Svizzera Italiana, Switzerland.
Technische Universitaet Darmstadt, Germany.
Vitrociset, Italy
http://www.cyberroad-project.eu/en/
https://twitter.com/cyberroad_eu
https://www.facebook.com/cyberroadproject
https://www.linkedin.com/groups/CyberROAD-8184478