The global cyber-vulnerability report /

Saved in:
Bibliographic Details
Imprint:Cham : Springer, 2015.
Description:1 online resource : illustrations, maps.
Language:English
Series:Terrorism, security, and computation
Terrorism, security, and computation.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11096890
Hidden Bibliographic Details
Other authors / contributors:Subrahmanian, V. S., author.
Ovelgonne, Michael, author.
Dumitras, Tudor, author.
Prakash, B. Aditya, author.
ISBN:9783319257600
3319257609
3319257587
9783319257587
9783319257587
Digital file characteristics:text file PDF
Notes:Includes bibliographical references and index.
English.
Vendor-supplied metadata.
Summary:This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
Other form:Printed edition: 9783319257587
Standard no.:10.1007/978-3-319-25760-0

MARC

LEADER 00000cam a2200000Ii 4500
001 11096890
005 20170630045615.5
006 m o d
007 cr cnu|||unuuu
008 151211s2015 sz ab ob 001 0 eng d
003 ICU
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d N$T  |d IDEBK  |d GW5XE  |d OCLCF  |d COO  |d CDX  |d OCLCQ  |d EBLCP  |d KSU  |d IAO  |d JBG  |d IAD  |d IAS  |d ICN  |d SOI  |d ILO  |d IDB  |d VT2  |d Z5A  |d LIP 
019 |a 941734159  |a 985038651  |a 990740552 
020 |a 9783319257600  |q (electronic bk.) 
020 |a 3319257609  |q (electronic bk.) 
020 |a 3319257587  |q (print) 
020 |a 9783319257587  |q (print) 
020 |z 9783319257587 
024 7 |a 10.1007/978-3-319-25760-0  |2 doi 
035 |a (OCoLC)932064030  |z (OCoLC)941734159  |z (OCoLC)985038651  |z (OCoLC)990740552 
050 4 |a QA76.9.A25 
072 7 |a SOC  |x 004000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
049 |a MAIN 
245 0 4 |a The global cyber-vulnerability report /  |c V.S. Subrahmanian [and others]. 
264 1 |a Cham :  |b Springer,  |c 2015. 
300 |a 1 online resource :  |b illustrations, maps. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
347 |a text file  |b PDF  |2 rda 
490 1 |a Terrorism, security, and computation 
504 |a Includes bibliographical references and index. 
588 0 |a Vendor-supplied metadata. 
505 0 |a Introduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis. 
520 |a This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference. 
546 |a English. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Cyberterrorism.  |0 http://id.loc.gov/authorities/subjects/sh00001974 
650 0 |a Malware (Computer software)  |0 http://id.loc.gov/authorities/subjects/sh2009005103 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
650 7 |a Malware (Computer software)  |2 fast  |0 (OCoLC)fst01748230 
650 7 |a Computer Science.  |2 hilcc 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
655 4 |a Electronic books. 
655 0 |a Electronic books. 
700 1 |a Subrahmanian, V. S.,  |e author.  |0 http://id.loc.gov/authorities/names/n91041505  |1 http://viaf.org/viaf/121959406 
700 1 |a Ovelgonne, Michael,  |e author.  |1 http://viaf.org/viaf/210846498 
700 1 |a Dumitras, Tudor,  |e author.  |1 http://viaf.org/viaf/864159474342427662710 
700 1 |a Prakash, B. Aditya,  |e author.  |1 http://viaf.org/viaf/1533159474359227662933 
776 0 8 |i Printed edition:  |z 9783319257587 
830 0 |a Terrorism, security, and computation. 
856 4 0 |u http://link.springer.com/10.1007/978-3-319-25760-0  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i 0b250de0-e9d6-516b-bdd5-669144c6b845  |s d4e523c0-5a2f-5ca7-b98c-28c8a4a6925e 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-319-25760-0  |z SpringerLink  |g ebooks  |i 9911152