PinchofKnowledgeonCyberCrime
CyberCrime
Phishing: Cybercrooks use “bait” in the form of fraudulent messages to lure victims to fake sites where they unwittingly enter personal information like usernames, passwords, or bank details.
Pharming: Taking it one step deeper than phishing, pharming uses malware to reroute unsuspecting internet surfers to fake versions of websites, where they unknowingly enter their personal details.
Keylogging: This type of malware secretly loging everything you type, capturing your account information and other personal details by reading RAM.
- Sniffing: If you’re connected to an unsecured, unencrypted public Wi-Fi network, hackers can steal your data by “sniffing” your internet traffic with special tools (unless you have a vpn, of course).
Tips to prevent identity theft : While hackers have many ways to steal personal data/information, there are also some good ways you can prevent identity theft. Avoid accessing your personal accounts (especially online banking) on public Wi-Fi, and consider setting up a monitoring service to make sure your online accounts haven’t been breached.
Cyberbullying
Cryptojacking
Cryptojacking is when hackers break into your device and use it to mine cryptocurrency without your knowledge or consent. Cryptominers do this by using JavaScript to infect your device after you visit an infected website. This can cause performance issues and high electric bills for you — and earn big profits for the cryptojackers.
Cyberextortion
Cyberextortion is just what it sounds like — a digital version of the nightmare that is extortion. One of the most common forms is ransomware, when hackers infect your computer with malware that encrypts all your files until you pay them a ransom to unlock them. Cyberextortion can also refer to blackmailing victims using their personal info, photos, and video; or threatening businesses using methods like botnet-driven DDOS attacks.
Cyberespionage
As mentioned, many cybercriminals these days are actually state-sponsored groups. Whether it’s the North Koreans, the Iranians, or even the US’s own NSA-affiliated Equation Group, world powers use hacker groups as one weapon in the complicated matrix of global politics. Stealing classified intelligence and using malware to attack nuclear plants are just two ways in which state-sponsored groups can do some frightening things on the world stage.
What is a Confusion Matrix?
The number of correct and incorrect predictions are summarized with count values and broken down by each class. This is the key to the confusion matrix.
The confusion matrix shows the ways in which your classification model
is confused when it makes predictions.
It gives you insight not only into the errors being made by your classifier but more importantly the types of errors that are being made.
It is this breakdown that overcomes the limitation of using classification accuracy alone.
How to Calculate a Confusion Matrix
Below is the process for calculating a confusion Matrix.
- You need a test dataset or a validation dataset with expected outcome values.
- Make a prediction for each row in your test dataset.
- From the expected outcomes and predictions count:
- The number of correct predictions for each class.
- The number of incorrect predictions for each class, organized by the class that was predicted.
These numbers are then organized into a table, or a matrix as follows:
- Expected down the side: Each row of the matrix corresponds to a predicted class.
- Predicted across the top: Each column of the matrix corresponds to an actual class.
The counts of correct and incorrect classification are then filled into the table.
The total number of correct predictions for a class go into the expected row for that class value and the predicted column for that class value.
In the same way, the total number of incorrect predictions for a class go into the expected row for that class value and the predicted column for that class value.
This matrix can be used for 2-class problems where it is very easy to understand, but can easily be applied to problems with 3 or more class values, by adding more rows and columns to the confusion matrix.
Let’s make this explanation of creating a confusion matrix concrete with an example.
2-Class Confusion Matrix Case Study
Let’s pretend we have a two-class classification problem of predicting whether a photograph contains a man or a woman.
We have a test dataset of 10 records with expected outcomes and a set of predictions from our classification algorithm.
Let’s start off and calculate the classification accuracy for this set of predictions.
The algorithm made 7 of the 10 predictions correct with an accuracy of 70%.
But what type of errors were made?
Let’s turn our results into a confusion matrix.
First, we must calculate the number of correct predictions for each class.
Now, we can calculate the number of incorrect predictions for each class, organized by the predicted value.
We can now arrange these values into the 2-class confusion matrix:
We can learn a lot from this table.
- The total actual men in the dataset is the sum of the values on the men column (3 + 2)
- The total actual women in the dataset is the sum of values in the women column (1 +4).
- The correct values are organized in a diagonal line from top left to bottom-right of the matrix (3 + 4).
- More errors were made by predicting men as women than predicting women as men.
Two-Class Problems Are Special
In a two-class problem, we are often looking to discriminate between observations with a specific outcome, from normal observations.
Such as a disease state or event from no disease state or no event.
In this way, we can assign the event row as “positive” and the no-event row as “negative“. We can then assign the event column of predictions as “true” and the no-event as “false“.
This gives us:
- “true positive” for correctly predicted event values.
- “false positive” for incorrectly predicted event values.
- “true negative” for correctly predicted no-event values.
- “false negative” for incorrectly predicted no-event values.
We can summarize this in the confusion matrix as follows:
This can help in calculating more advanced classification metrics such as precision, recall, specificity and sensitivity of our classifier.
For example, classification accuracy is calculated as true positives + true negatives.
The dark web
Comments
Post a Comment