Review Article

Cybercrimes: A Proposed Taxonomy and Challenges

Table 1

Classification of recent cybercrimes on the basis of security fundamental principles.

Security goalsObjectiveRecent incidents of cybercrimes in 2016-17

ConfidentialityLimits the data access to authorized users only(1) Confidential information of users of nine password manager apps like Dashlane, My Passwords, Password manager, etc. was found to be leaked. Methods used by attackers were data residue attacks and clipboard sniffing [6]
(2) 85 million user accounts have been stolen from Dailymotion on 20 October 2016 [7]

IntegrityAssures the accuracy of data(1) Cyberattack on the Ukraine Kiev’s power grid caused the power outage on December 17 near midnight in the northern part [8]
(2) Two weeks before the Trump’s presidency in America, a cyberattacker hacked the radio stations to play “F∗∗k Donald Trump” across the country [9]

AvailabilityMakes sure that authorized users always access the network and its resources(1) Cyberattack affected 900,000 customers of Deutsche Telekom by knocking a million routers offline in November 2016 [10]
(2) DDoS attacks on five major Russian banks disrupted the services of the bank to their customers for two days in November 2016 [11]
(3) The WannaCry attack locked 90,000 computers in 99 countries and was ready to release them for a ransom of $300–$500 bitcoins [12]