An Empirical Study of Computer and Internet Security Breaches Using Sparse Data

نویسندگان

  • Kallol Kumar Bagchi
  • Godwin J. Udo
چکیده

This study discusses some empirical findings on various computer and Internet-related crimes. An appropriate diffusion model was used that encompassed modeling of two opposite behaviors—imitation and deterrence acts. The model also is adequate for handling sparse data. The model was used to analyze various types of attack. The results shows that different types of attacks follow different types of growth, that increase in imitation is related to an increase in deterrence, and that imitation rates are much higher than deterrence rates. Model validation results are also included.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of the Growth of Computer and Internet Security Breaches

This study uses the modified Gompertz model and sparse data to analyze the growth rates of different types of computer and Internet-related crimes. The Gompertz model is an appropriate diffusion model because it is capable of modeling two opposite behaviors: (1) acts of attacks and imitation of attacks and (2) deterrence acts to prevent such attacks. In addition, this model can handle sparse da...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers

Assessing the value of information technology (IT) security is challenging because of the difficulty of measuring the cost of security breaches. An event-study analysis, using market valuations, was used to assess the impact of security breaches on the market value of breached firms. The information-transfer effect of security breaches (i.e., their effect on the market value of firms that devel...

متن کامل

Face Recognition using an Affine Sparse Coding approach

Sparse coding is an unsupervised method which learns a set of over-complete bases to represent data such as image and video. Sparse coding has increasing attraction for image classification applications in recent years. But in the cases where we have some similar images from different classes, such as face recognition applications, different images may be classified into the same class, and hen...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003