首页> 外文学位 >Quantitative economics of security: Software vulnerabilities and data breaches.
【24h】

Quantitative economics of security: Software vulnerabilities and data breaches.

机译:安全性的定量经济学:软件漏洞和数据泄露。

获取原文
获取原文并翻译 | 示例

摘要

Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the developing organization. These vulnerabilities are often exchanged for monetary rewards or a negotiated selling price, giving rise to vulnerability markets. Some of these markets are regulated, while some are unregulated. Many buyers in the unregulated markets include individuals, groups, or government organizations who intend to use the vulnerabilities for potential attacks. Vulnerabilities traded through such markets can cause great economic, organizational, and national security risks. Vulnerability markets can reduce risks if the vulnerabilities are acquitted and remedied by the software developers. Studying vulnerability markets and their related issues will provide an insight into their underlying mechanisms, which can be used to assess the risks and develop approaches for reducing and mitigating the potential risks to enhance the security against the data breaches.;Some of the aspects of vulnerability---discovery, dissemination, and disclosure---have received some recent attention. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. This dissertation suggests that a major fraction of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored.;Reports of buying and selling the vulnerabilities are now appearing in the press; however, the nature of the actual vulnerability markets needs to be analyzed. We have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located outside of the US. We have contacted several of the most prolific discoverers in order to collect firsthand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. We found that the discoverers had enough experience and good reputation to work officially with a good salary in some well-known software development companies.;Many security breaches have been reported in the past few years, impacting both large and small organizations. Such breaches may occur through the exploitation of system vulnerabilities. There has been considerable disagreement about the overall cost and probability of such breaches. No significant formal studies have yet addressed this issue of risk assessment, though some proprietary approaches for evaluating partial data breach costs and probabilities have been implemented. These approaches have not been formally evaluated or compared and have not been systematically optimized. This study proposes a consolidated approach for identifying key factors contributing to the breach cost by minimizing redundancy among the factors. Existing approaches have been evaluated using the data from some of the well-documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined and the need for better models is identified. A complete computational model for estimating the costs and probabilities of data breaches for a given organization has been developed. We consider both the fixed and variable costs and the economy of scale. Assessing the impact of data breaches will allow organizations to assess the risks due to potential breaches and to determine the optimal level of resources and effort needed for achieving target levels of security.
机译:安全漏洞可能给社会和商业组织带来巨大风险。开发组织外部的个人发现了很大一部分软件漏洞。这些漏洞通常被交换为金钱奖励或协商的销售价格,从而引发了漏洞市场。其中一些市场受到监管,而另一些则不受监管。在不受管制的市场中,许多购买者包括打算利用该漏洞进行潜在攻击的个人,团体或政府组织。通过此类市场交易的漏洞可能造成巨大的经济,组织和国家安全风险。如果安全漏洞被软件开发人员取消和补救,则漏洞市场可以降低风险。研究漏洞市场及其相关问题将提供对其潜在机制的深刻见解,可用于评估风险并开发减少和减轻潜在风险的方法以增强针对数据泄露的安全性。漏洞的某些方面---发现,传播和公开---最近受到了一些关注。但是,漏洞发现者和漏洞获取者之间的交互作用尚未得到充分解决。本文表明,发现者的大部分(在某些情况下是大多数)与软件开发人员无关,因此可以自由散布他们喜欢的任何方式的发现漏洞。结果,出现了多个漏洞市场。在最近的漏洞发现文献中,漏洞发现者一直是匿名的。尽管已尝试对他们的工作水平进行建模,但尚未探索有关其身份,操作模式以及他们对已发现漏洞的处理方式的信息。按;但是,需要分析实际漏洞市场的性质。我们试图收集详细信息。我们已经确定了过去十年中最多产的漏洞发现者,并研究了它们的动机和方法。这些发现者中有很大一部分位于美国以外。我们已经联系了一些最丰富的发现者,以便收集有关他们的技术,动机以及对脆弱性市场的参与的第一手信息。我们研究了为什么许多发现者在成功完成漏洞发现职业后似乎都退休了。我们发现发现者有足够的经验和良好的声誉,可以在一些著名的软件开发公司中以高薪工作正式工作。过去几年中已经报道了许多安全漏洞,对大型和小型组织均造成了影响。这些漏洞可能是通过利用系统漏洞而发生的。对于此类破坏的总成本和可能性存在很大的分歧。尽管已经实施了一些评估部分数据泄露成本和概率的专有方法,但是尚未进行任何正式的正式研究来解决这一风险评估问题。这些方法尚未进行正式评估或比较,也未进行系统优化。这项研究提出了一种综合方法,可通过最大程度地减少因素之间的冗余来确定造成违规成本的关键因素。现有方法已经使用了一些有据可查的违规数据进行了评估。应当指出,现有模型得出的估计值差异很大。研究了这种变化的原因,并确定了对更好模型的需求。已经开发出了用于估算给定组织的数据泄露的成本和概率的完整计算模型。我们同时考虑固定成本和可变成本以及规模经济。评估数据泄露的影响将使组织能够评估由于潜在的泄露而引起的风险,并确定实现目标安全级别所需的最佳资源水平和工作量。

著录项

  • 作者

    Algarni, Abdullah Mahdi.;

  • 作者单位

    Colorado State University.;

  • 授予单位 Colorado State University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 127 p.
  • 总页数 127
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号