2022
DOI: 10.1145/3547133
|View full text |Cite
|
Sign up to set email alerts
|

Measuring security practices

Abstract: Users are encouraged to adopt a wide array of technologies and behaviors to reduce their security risk. However, the adoption of these "best practices," ranging from the use of antivirus products to keeping software updated, is not well understood, nor is their practical impact on security risk well established. To explore these issues, we conducted a large-scale measurement of 15,000 computers over six months. We use passive monitoring to infer and characterize the prevalence of various security practices as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The issue of MAC address tracking and profiling underscores a broader debate about privacy in the digital age, highlighting the need for stronger regulatory frameworks and technology solutions to protect individuals from invasive tracking practices and ensure their right to privacy in increasingly connected environments. MAC address anonymization techniques helps to mitigate the MAC Address tracking, and profiling [172] - [176] as in Table 7 below.…”
Section: Figure 11 Mac Addresses Attackmentioning
confidence: 99%
“…The issue of MAC address tracking and profiling underscores a broader debate about privacy in the digital age, highlighting the need for stronger regulatory frameworks and technology solutions to protect individuals from invasive tracking practices and ensure their right to privacy in increasingly connected environments. MAC address anonymization techniques helps to mitigate the MAC Address tracking, and profiling [172] - [176] as in Table 7 below.…”
Section: Figure 11 Mac Addresses Attackmentioning
confidence: 99%
“…This evidence-based approach is one way to stress the importance of cybersecurity awareness in smart homes. However, achieving the goal of evidence-based security is just as challenging as providing evidence-based healthcare [44]. Interested researchers can investigate evidence-based effects of punishments and rewards on smart-home users' security practices and behaviors.…”
Section: Limitations and Future Workmentioning
confidence: 99%