Overview
- Establishes metrics to measure cyber-vulnerability of countries and quantify the cyber-vulnerability of countries
- Offers useful data-driven policy advice for law-makers and policy-makers in each country
- Demonstrates how enterprise security managers can understand behaviors linked to cyber-vulnerability
- Includes supplementary material: sn.pub/extras
Part of the book series: Terrorism, Security, and Computation (TESECO)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.
Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general.
The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
Similar content being viewed by others
Keywords
Table of contents (5 chapters)
Authors and Affiliations
Bibliographic Information
Book Title: The Global Cyber-Vulnerability Report
Authors: V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash
Series Title: Terrorism, Security, and Computation
DOI: https://doi.org/10.1007/978-3-319-25760-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Hardcover ISBN: 978-3-319-25758-7Published: 16 December 2015
Softcover ISBN: 978-3-319-79836-3Published: 14 March 2019
eBook ISBN: 978-3-319-25760-0Published: 09 December 2015
Series ISSN: 2197-8778
Series E-ISSN: 2197-8786
Edition Number: 1
Number of Pages: XII, 296
Number of Illustrations: 1 b/w illustrations, 398 illustrations in colour
Topics: Systems and Data Security, Security Science and Technology, Statistics for Social Sciences, Humanities, Law, Information Systems Applications (incl. Internet), Artificial Intelligence