A Sophistication Index for Evaluating Security Breaches

نویسندگان

  • Nic DePaula
  • Sanjay Goel
چکیده

The focus of this research is to develop a sophistication index for evaluating security breaches due to cyber-attacks. Although reports about cyber-attacks elucidate the sophistication involved in a given security or data breach, it is difficult to compare the sophistication of breaches across multiple attacks. Once we have an attack sophistication index, incidents can be compared and consequences of sophistication level, such as damage impact, may be assessed. To develop this index, we first explore the evolution of malware and security breaches due to cyber-attacks. We then develop a dataset of 32 security breach incidents that were well publicized in the media over the last 10 years. Based on our literature review and expert evaluation we develop a set of basic features that may be used to classify the sophistication level of an attack. We also ask security experts to rate the incidents based on their perceived notion of sophistication. Our results indicate that our sophistication index is correlated with the level of perceived sophistication. We also observe that the level of sophistication of the well publicized attacks have not consistently increased over time. Simpler attacks continue to propagate and cause damage. Moreover, a correlation of the sophistication level and the damage caused (number of records exposed) is not significant, suggesting that a more sophisticated attack is not necessarily more damaging to the institution at question.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Insurance Style Model for Determining the Appropriate Investment Level against Maximum Loss arising from an Information Security Breach

The economic consequences of breaches in information security cannot be underestimated. According to the World Bank 2002 survey on reported cyber crime the US$ value of the effects from intrusions from a variety of sources has been increasing at an accelerating rate over the past decade. This survey contains a list of reported intrusions recording criminal and employee abuse with losses ranging...

متن کامل

Trust-Based Security Protocols

An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents

متن کامل

Introduction to the Special Issue on Evaluating the Security of Complex Systems

Recent security breaches show the need to secure large, distributed, complex systems. A fundamental, but little discussed aspect of security is how to evaluate when a complete system is secure. Purely formal methods cannot handle this level of complexity. Code checking does not consider the interaction of separate modules working together and is hard to scale. Model-based approaches, such as pa...

متن کامل

Measuring the Impact of Security Breaches on Stock Valuations of Firms

Security breaches can have a significant impact on the financial performance of firms. Information has become the most valuable asset of an organization and security breaches can lead to loss of confidentiality, availability, and integrity of information as well as to disruption of critical services. With public disclosure laws in place, security breaches of personal private information of clie...

متن کامل

Evaluating Customer Information Breaches as Service Failures: An Event Study Approach

Firms are collecting more information about their customers than ever before in an attempt to understand and better serve customer needs. At the same time, firms are becoming more vulnerable to the compromise of customer information through security breaches. This study attempts to associate breach reports with the decline in market value of firms using an event study. The results show that fir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016