Access over 20 million homework & study documents

Cyber security seminar intro lecture

Content type
User Generated
School
International School
Rating
Showing Page:
1/16
Cybersecurity

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/16
Background
Some Research

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/16
Background - Cybersecurity
Much of the work in the field has been undertaken by
computer scientists/engineers and legal scholars
Nascent literature at the “intersection” of computer
science/engineering and economics on cyber security.
Why Economists?
Ross Anderson: “As systems scale globally, incentives start to matter
as much as technology. Systems break when the people who could fix
them are not the people who suffer the costs of failure. So it's not
enough for security engineers to understand crypto, mathematics and
the theory of operating systems; we have to understand game theory
and microeconomics too. This has led to a rapidly growing interest in
‘security economics’

Sign up to view the full document!

lock_open Sign Up
Showing Page:
4/16

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 16 pages?
Access Now
Unformatted Attachment Preview
Cybersecurity • Background • Some Research Background - Cybersecurity • Much of the work in the field has been undertaken by computer scientists/engineers and legal scholars • Nascent literature at the “intersection” of computer science/engineering and economics on cyber security. • Why Economists? • Ross Anderson: “As systems scale globally, incentives start to matter as much as technology. Systems break when the people who could fix them are not the people who suffer thecosts of failure. So it's not enough for security engineers tounderstand crypto, mathematics and the theory of operating systems; we have to understand game theory and microeconomics too. This has led to a rapidly growing interest in ‘security economics’ “ Viruses: huge potential damages • The Slammer, Blaster, and Sobig.F virusesexploited vulnerabilities even though security updates had been released. • According to the Economist, the vulnerabilities exploited by these viruseswere reverse engineered by hackers. • Time between the disclosure of a vulnerability and an attack exploiting thevulnerability has declined significantly. • Zero-day vulnerabilities Economics & Public Policy of Cybersecurity • Why has Internet security worsened even as investmenthas increased? • According to a report from the US Secret Service, nearly2/3 of all data breaches could have been prevented using "simple and cheap" countermeasures. Why aren't they deployed? • How much should firms ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4