Skip to main content

2015 | OriginalPaper | Buchkapitel

5. Country by Country Analysis

verfasst von : V. S. Subrahmanian, Michael Ovelgönne, Tudor Dumitras, B. Aditya Prakash

Erschienen in: The Global Cyber-Vulnerability Report

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we present a detailed summary of the cyber-vulnerability of each of the 44 countries in our study. We start with a summary of the national cybersecurity strategy for that country. In some cases, the country has not published a national cybersecurity strategy, but most of the 44 countries in our study do have one. For each country, we show the average number of attacks per host, and the percentage of attacked hosts over our 2 year study window. We show the distribution of attack types (viruses, Trojans, worms, spyware, adware, misleading software) and how these attacks vary by month. For comparison, we compare attack types statistics for each country with the corresponding statistics for the entire set of OECD countries as well as the entire set of non-OECD countries.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat ENISA (2012). National Cyber Security Strategies Practical Guide on Development and Execution, Dec 2012 ENISA (2012). National Cyber Security Strategies Practical Guide on Development and Execution, Dec 2012
6.
Zurück zum Zitat Trend Micro (2008) Trend Micro Annual Threat Roundup and 2009 Forecast, 2008. Retrieved Dec 30 2014 Trend Micro (2008) Trend Micro Annual Threat Roundup and 2009 Forecast, 2008. Retrieved Dec 30 2014
17.
Zurück zum Zitat Center for Cyber Security (2015) The Danish Cyber and Information Security Strategy, Feb 2015 Center for Cyber Security (2015) The Danish Cyber and Information Security Strategy, Feb 2015
18.
Zurück zum Zitat Azaria A, Richardson A, Kraus S, Subrahmanian VS (2014) Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data, In: IEEE Transactions on Computational Social Systems, 1.2 (2014):135–155, Nov 2014 Azaria A, Richardson A, Kraus S, Subrahmanian VS (2014) Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data, In: IEEE Transactions on Computational Social Systems, 1.2 (2014):135–155, Nov 2014
24.
Zurück zum Zitat Tabansky L (2013) Cyberdefense Policy of Israel: Evolving Threats and Responses, Chair de Cyberdefense et Cybersecurite, Jan 2013—Article n° III.12 Tabansky L (2013) Cyberdefense Policy of Israel: Evolving Threats and Responses, Chair de Cyberdefense et Cybersecurite, Jan 2013—Article n° III.12
25.
Zurück zum Zitat Tabansky L, Aviv I (2013) “Critical National Infrastructure Protection: Evolution of Israeli Policy.” In: Proceedings of the 12th European Conference on Information Warfare and Security: ECIW 2013, Academic Conferences Limited Tabansky L, Aviv I (2013) “Critical National Infrastructure Protection: Evolution of Israeli Policy.” In: Proceedings of the 12th European Conference on Information Warfare and Security: ECIW 2013, Academic Conferences Limited
28.
Zurück zum Zitat Guri, M., Kedma, G., Kachlon, A., & Elovici, Y. (2014, October). AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. In Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on (pp. 58–67). IEEE. Guri, M., Kedma, G., Kachlon, A., & Elovici, Y. (2014, October). AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. In Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on (pp. 58–67). IEEE.
30.
Zurück zum Zitat Ministry of Science, Technology, and Innovation (Malaysia) (2008) National Cyber Security Ministry of Science, Technology, and Innovation (Malaysia) (2008) National Cyber Security
31.
Zurück zum Zitat Trend Micro and Organization of American States (2015) Report on Cybersecurity and Critical Infrastructure in the Americas, Retrieved June 15 2015. Trend Micro and Organization of American States (2015) Report on Cybersecurity and Critical Infrastructure in the Americas, Retrieved June 15 2015.
Metadaten
Titel
Country by Country Analysis
verfasst von
V. S. Subrahmanian
Michael Ovelgönne
Tudor Dumitras
B. Aditya Prakash
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-25760-0_5

Premium Partner