Economics of Information Security and Privacy 2010
DOI: 10.1007/978-1-4419-6967-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Security Ecosystem - The Dynamics of (In)Security

Abstract: The security of information technology and computer networks is effected by a wide variety of actors and processes which together make up a security ecosystem; here we examine this ecosystem, consolidating many aspects of security that have hitherto been discussed only separately. First, we analyze the roles of the major actors within this ecosystem and the processes they participate in, and the the paths vulnerability data take through the ecosystem and the impact of each of these on security risk. Then, base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 70 publications
(81 citation statements)
references
References 16 publications
0
78
0
Order By: Relevance
“…Parsers are crawlers or scrapers designed to crawl the web and extract specific information about vulnerabilities, patches and exploits from the selected data sources. Currently we have parsers for six different vulnerability data sources (National Vulnerability Database data source 3 , Security database data source 4 , CVE data source 5 , CVE Details data source 6 , Security , Cisco 12 etc.,) and exploits from Exploit database 13 (illustrated by the left-most column in Figure 2). Due to the modular structure of the data collation framework, more parsers for other security data sources can easily be added.…”
Section: A Backendmentioning
confidence: 99%
See 3 more Smart Citations
“…Parsers are crawlers or scrapers designed to crawl the web and extract specific information about vulnerabilities, patches and exploits from the selected data sources. Currently we have parsers for six different vulnerability data sources (National Vulnerability Database data source 3 , Security database data source 4 , CVE data source 5 , CVE Details data source 6 , Security , Cisco 12 etc.,) and exploits from Exploit database 13 (illustrated by the left-most column in Figure 2). Due to the modular structure of the data collation framework, more parsers for other security data sources can easily be added.…”
Section: A Backendmentioning
confidence: 99%
“…This analysis is inspired by the work from Frei et al [3]. It allows an analyst to check how long it would take for a vulnerability to be exploited, for it to be patched, or for an exploited vulnerability to be patched.…”
Section: B Inter-event Time Series Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Depending on how we view systems, software security can be measured by several possible metrics [1,2]. Through examining the number of vulnerabilities and their discovery rates, many researchers have established models to quantitatively analyze software security [3][4][5].…”
Section: Introductionmentioning
confidence: 99%