1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. The evolution of technology is rapidly advancing as it is being implemented into our everyday lives. It is through this exponential growth of technology that has made it hard for cyber analysts and the society to keep up to emerging threats that emit from cyber-crime. Daily, technology and cyber-crime are continually being changed and updated which results in ensuring exacting standards are kept up to date. As cyber-crime and technology accelerate its encapsulates us into being vulnerable to an attack. There are multiple forms of attacks that can be done and the incentive behind cyber-crime plays a major factor in the events leading to it (Maochao Xu, 2018, p. 2861). These attacks are generally extensive, multidimensional, and acquires various techniques to complete and instantiate an attack. The motivation behind these cyberattacks has deviated from “thrill-seeking or notoriety to the pursuit of profit or political gain” (Jang, 2018). Moreover, the economic costs related to cybercrime have a large substantial amount costing in the millions for large businesses if a data breach was to occur, on average costing around $3million in Australia (Brookes, 2019). Various elements will need to be considered to ensure the tenacity of predicting cyber-crime is both accurate and reliable. With the altitude of technology, businesses and individuals can gain possession of various artificial intelligence (AI) technology, forecast the manifestations of cyber-crime that is being targeted upon many businesses and individuals. In this essay, it will provide a deep analysis of predicting cyber-crime than simply respond to it and will discuss if it is a time to be capable of achieving accurate and optimal predictions, the ways prediction is currently done and the tools used for prediction in the future, the difference in predicting and responding to cyber-crime and lastly the human factors that contribute within an organisation. 1|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. The prediction of cyber-crime is within reach of our capabilities in today’s age of computing to some extent. Although, it is not fully feasible to implement predictions of cyber-crime as a primary security defence. Cyber-attacks have become and progressively more sophisticated as technology moves on and it has become visible that dealing with cybercrime is no longer effective to analyse and deal with when they are happening and after they occur. Therefore, the prevention and prediction of cyber-crime are far more superior than waiting for an attack to occur. By predicting an attack, it can allow businesses to adjust their defences rather than implement costly and reactive response plans. This is evident through an analysis of the data breach that happened in September 2017 with the organisation Equifax, this data breach disclosed and uncovered over 143 million private and sensitive data and information from their customers ranging from credit card details to social security numbers through an unpatched vulnerability within the organisation's software (Ng, 2018). This vulnerability was noticeable to the Equifax company prior to the data beach therefore, if expedient measures were enforced it could and may have been prevented. This data breach may have resulted in the lack of care or through not placing predictable measures within the organisation. One of the most basic principles in information technology (IT) security is to ensure updates on system and software are up to date. Ultimately, this data breach may have been predicted by many of the technologies/ processes used to predict cyber-crime/ data breaches and be noticeable by employees and place effective patches to vulnerabilities and be incorporated with manual and automated monitoring within the business. In contrast, by thoroughly analysing past data breaches, businesses are able to apply countermeasures that other businesses have done to ensure the protection within their systems and business is secure. Therefore, forecasting an attack before any data breach was to occur will allow the business to have effective response plans and effective security measures in place to prepare the business for the many distinctive 2|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. attacks that can occur. Overall, the prediction of cyber-crime is achievable to some distinct level, and with the exponential growth of technology, we will maybe soon be able to predict almost all cyber-crime and therefore, ultimately provide optimal security within businesses. Although, the level of complexity to fully predict cyber-crime is far beyond our reach of knowledge and technology. The advancement of technology has not reached the level to develop and enhance the prediction countermeasures of cyber-crime as currently, the prediction of cyber-crime is “near impossible” (Stegh, 2018) to fully predict the behaviours and procedures of people, especially within the cyber-crime world with the technologies currently used today. Notably, the tools used to predict cyber-crime today are limited to the effectiveness and accuracy they can produce due to the recurring changes to technologies that are challenging to retain up-to-date knowledge. Tools such as attack graphs are used to show the various ways a hacker can exploit vulnerabilities into the network and many of the connected systems within, this can be overlooked by the business to see the deficiency and instabilities within the systems. Other tools many businesses may use are called an intrusion detection system (IDS) and “big-data analytics” (Menon, 2018), it can either be software or hardware that monitors the traffic flow between networks and scans for suspicious activities (Pratt, 2018). To enumerate, the three tools just discussed are examples of prediction tools businesses may use but noticeably have limiting factors contribute to them, which are they both require the existence of some type of suspicious procedures. Researchers are now searching to find sufficient and adequate ways to predict cyber-crime using a combination of machine learning, criminology theory, and algorithms that will evaluate data breach attack factors, simulate attacks, 3|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. and come to an understanding of absolute and theoretical attacks (Jang, 2018). This has been achieved by researchers at Massachusetts Institute of technology’s (MIT) Computer Science and Artificial Intelligence Laboratory as they exhibit their latest AI that has been able to achieve a high success rate of 85% for detecting attacks and reducing false positives by a factor of five (Menon, 2018). With the implementation of AI systems, it can provide numerous substantial benefits by providing extra security within a business. AI will enable the response towards cybersecurity risks easier and provide more time to tech employees as AI are able to function on their own although, this process can be very costly (Kh, 2017). This is evident through the comparison of the technologies and costs used to predict weather forecasts. Over the last decade, it has been hard to make predictions (Recorded Future, n.d., p. 1), especially about the future. Meteorologists use multiple different tools to predict the weather which can be very costly, the same applies to cyber-crime as to fully predict a data breach it will need lots of different tools which can also be very costly and take a long time. Above all, it is evident that to some extent we can use the various tools and procedures to predict cyber-crime and that in the near future the prediction will be enhanced to provide the ability to place them within our systems as the main security. Similarly, there is a fine line that draws the difference between predicting cybercrime and simply responding to the effects and occurrence of it as they both provide diverse security within a business and both acquire advantages and as well as disadvantages. There is an array of distinct cases that will vibrantly contrast the difference between being able to predict cyber-crime before it happens and directly responding to it as threats arise within an organisation. Through a deep analysis of both cases we can identify the advantages and 4|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. disadvantages that they each illustrate. Advantages of predicting cybercrime are that there are many different tools businesses and individuals may use to forecast cyber-attacks, some examples are attack graphs, technique that analyse the capability, opportunity and intent of the hacker (COI) which is used by the military and intelligence communities for threat prediction, Dynamic Bayesian Network (DBN) is a type of statistical model which operates by revealing patterns and estimating probabilities over time, and many more (Jang, 2018). These attacks are very beneficial to businesses as they provide a deep overview of cyber-attacks and the various ways a business can be defenceless. The future of predicting cyber-attacks like mentioned above are through uses of various AI technology that will ultimately increase security and success rates in predicting cyber-attacks than the current tools used today (Jang, 2018).However, with all these types of prediction methods and tools, there are limiting factors that are associated with them which are due to errors in an incomplete network information and attack obfuscation and can sometimes be very costly. Obfuscation techniques are used to avoid detection by many of these tools by insertion of noise into malware, construct complex codes so that it will be very hard to be analysed and read (Jang, 2018). Also, there are multiple outcomes and possibilities cyber-crime endures resulting in predicting cyber-crime very hard. Similarly, by acting upon cyber-crime as it is occurring businesses are able to visually see where the vulnerabilities within the system are and can use this for future security measures. Nonetheless, there are also many disadvantages, if a data breach was to occur, it will be very expensive and place a bad reputation within and out of the businesses. To sum up, predicting and acting upon cyber-crime are both very diverse situations with some simular functionalities although, by integrating both cases into an organisation by using the examples of tools mentioned above and the many basic fundamentals of IT security, will enable the business to efficiently provide effective and adequate security measures 5|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. within the business. The components of all systems is mainly performed and fulfilled by the many employees that are associated with the business, this has shown to be the weakest link in all systems which some businesses may fail to predict or even respond to the vulnerabilities the employees within the business portray In any Information system (IS) the human component is the most crucial and important segment in the system, as human factors are what makes and creates a system (Gheyas & Abdallah, 2016). Over the years, Human factors in data breaches have become one of the “weakest links” (Bisson, 2019) within an organisation which results in making the business vulnerable to an attack. Hadlington (2018) emphasised that “aspects of an accidental or unintentional employee is linked to poor planning, lack of attention, and ignorance” that the employees perform. “A malicious insider has the potential to cause more damage to the organisation and has many advantages over an outside attacker” (Colwill, 2009, p. 187). This is reflected in the data breach that the company Uber obtained in 2016 as hackers were able to gain login credential information that was stored and accessed on a website called ‘GitHub’ (Desjardins, 2019). This compromised 57 million accounts that held personal details. By analysing this case study, we are able to see that Uber was not able to act on the data breach until it already happened. This shows that there are many cases where predicting could’ve or not been used as, the prediction of someone’s actions, in this case the hackers or employees will be near impossible to predict. Although, by insuring the teaching and informing of employees on how to keep information safe and contained within the business is vital to preserving information and data within an organisation (Marseille, 2020, p. 28). There are many past data breach cases that have the same occurring problems as “52% of businesses all admit the employees are the biggest weakness in IT security” (Kaspersky Daily, 6|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. n.d.) . As a result, this reveals there are limitation on how much a business is able to predict as the actions of their employees has a vast number of different possible outcomes. Meaning that, it is not feasible to fully predict the actions of all employees but with the combination of predicting the numerous ways an employee will make a business vulnerable can lead to plans to being able to maintain response plans. In summary, the main causes of a data breach are due to the lack of knowledge an individual has about ensuing security across multiple levels of their daily basis is optimal. Significantly, this is a major predictable vulnerability that has arisen in many businesses and is what most businesses are developing to make dynamic changes within their organisation. In conclusion, with the emerging state of technology and the evergrowing population that uses it, it encloses us into being vulnerable to an attack which leads to higher statistics of cyber-crime. This motivates businesses to ensure that optimum security is assured. Through analysis of future technology, we have discovered we are close to being able to predict cyber-crime and the difference opposed to responding to the threats that emit from cyber-crime, and the human factors that are associated with all businesses. As shown above, we as a society are currently not ready and equipped to optimise prediction of cyber-crime as our main security measure within businesses as the lack of knowledge, technology and ultimately have the ability to keep up to date with recent security problems and updates. Although, we can incorporate both prediction tools and security measures together within the businesses to simply respond and prevent cyber-crime atomically. 7|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. References Bisson, D., 2019. Venafi. [Online] Available at: https://www.venafi.com/blog/7-data-breaches-caused-human-error-did-encryptionplay-role [Accessed 7 June 2020]. Brookes, J., 2019. Which-50. [Online] Available at: https://which-50.com/as-costs-rise-australia-is-getting-worse-at-handling-databreaches-ibmstudy/#:~:text=On%20average%2C%20the%20cost%20of,periods%20than%20a%20year%20ago. [Accessed 3 June 2020]. Colwill, C., 2009. Human factors in information security: The insider. Information security technical report, 14(1), pp. 186-196. Desjardins, J., 2019. Visual Capitalist. [Online] Available at: https://www.visualcapitalist.com/the-15-biggest-data-breaches-in-the-last-15-years/ [Accessed 7 June 2020]. Gheyas, I. A. & Abdallah, A. E., 2016. Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis. Big Data Analytics, 30 August, Volume 6. Hadlington, L., 2018. The “Human Factor” in Cybersecurity: Exporing the Accidental Insider. pp. 4663. Jang, S. J., 2018. Research Features. [Online] Available at: [Accessed 2 June 2020]. Kaspersky Daily, n.d. The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within. [Online] Available at: https://www.kaspersky.com/blog/the-human-factor-in-it-security/ [Accessed 8 June 2020]. Kh, R., 2017. InfoSecurity. [Online] Available at: https://www.infosecurity-magazine.com/next-gen-infosec/ai-future-cybersecurity/ [Accessed 5 June 2020]. Maochao Xu, K. M. S. R. M. B. a. S. X., 2018. Modeling and Predicting Cyber Hacking Breaches. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 13(11), pp. 2856-2871. Marseille, E., 2020. The Rapid Growth of Data Breaches in Today’s Society, s.l.: ProQuest. Menon, P., 2018. McAfee. [Online] Available at: https://www.skyhighnetworks.com/cloud-security-blog/can-cyber-attacks-bepredicted/ [Accessed 5 June 2020]. Ng, A., 2018. CNet. [Online] Available at: https://www.cnet.com/news/equifaxs-hack-one-year-later-a-look-back-at-how-it- 8|Page 1. Can we predict cyber-crime rather than simply respond to it? Using real examples to discuss how this can happen. happened-and-whats-changed/ [Accessed 4 June 2020]. Pratt, M. k., 2018. CSO Australia. [Online] Available at: https://www.csoonline.com/article/3255632/what-is-an-intrusion-detection-systemhow-an-ids-spots-threats.html [Accessed 4 June 2020]. Recorded Future, n.d. Anticipating Cyber Attacks: Theres No Abbottabad in Cyber Space, s.l.: s.n. Stegh, C., 2018. Enabling Technologies. [Online] Available at: https://blog.enablingtechcorp.com/faq-cybersecurity [Accessed 7 June 2020]. 9|Page