I. INTRODUCTION
The demand of human beings changes over a time series even in fraction of seconds and other time units. This on the one hand increases the simplicity way of life. But on the other hand, leads to a fatal exploitation to the data/Information which instead undergo the process of complexity the ways of human life as viewed from data/Information confidentiality perspective. In such a case data/Information processing passes through and stored over the cyber space in a fault resistance, dynamic monitoring, pre-persecution, predictive, automated and SOA enabled communication in between the authorized users. Thus, the cyber space need to be secure in an efficient, effective, well understood, and with low financial crime investigation manner. In order to do so, the best solution is expected to developing an automated and cloud enabling Improved Cyber security for selected Institutions/Organizations in a form suite to commercialize risks against cyber attacker, with complete cyber attacker’s behaviors. The best solution is therefore, finding the cyber attackers behavior with the identified users computer and computer enabling end devices applied by the user. Because end devices are the ultimate source of user behaviors no matter how he/she is an authorized user or unauthorized user. It is known that, there are two basic dimensions for any cyber criminals in doing such a criminal activity. Either to personal benefit or for recreational activities.