An Empirical Study of Computer and Internet Security Breaches Using Sparse Data
نویسندگان
چکیده
This study discusses some empirical findings on various computer and Internet-related crimes. An appropriate diffusion model was used that encompassed modeling of two opposite behaviors—imitation and deterrence acts. The model also is adequate for handling sparse data. The model was used to analyze various types of attack. The results shows that different types of attacks follow different types of growth, that increase in imitation is related to an increase in deterrence, and that imitation rates are much higher than deterrence rates. Model validation results are also included.
منابع مشابه
An Analysis of the Growth of Computer and Internet Security Breaches
This study uses the modified Gompertz model and sparse data to analyze the growth rates of different types of computer and Internet-related crimes. The Gompertz model is an appropriate diffusion model because it is capable of modeling two opposite behaviors: (1) acts of attacks and imitation of attacks and (2) deterrence acts to prevent such attacks. In addition, this model can handle sparse da...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملThe Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers
Assessing the value of information technology (IT) security is challenging because of the difficulty of measuring the cost of security breaches. An event-study analysis, using market valuations, was used to assess the impact of security breaches on the market value of breached firms. The information-transfer effect of security breaches (i.e., their effect on the market value of firms that devel...
متن کاملFace Recognition using an Affine Sparse Coding approach
Sparse coding is an unsupervised method which learns a set of over-complete bases to represent data such as image and video. Sparse coding has increasing attraction for image classification applications in recent years. But in the cases where we have some similar images from different classes, such as face recognition applications, different images may be classified into the same class, and hen...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003