首页> 外文期刊>Computers & Security >A taxonomy and comparison of computer security incidents from the commercial and government sectors
【24h】

A taxonomy and comparison of computer security incidents from the commercial and government sectors

机译:商业和政府部门的计算机安全事件的分类和比较

获取原文
获取原文并翻译 | 示例

摘要

Cyber incidents are growing in intensity and severity. Several industry groups are therefore taking steps to better coordinate and improve information security across sectors. Also, various different types of public-private partnerships are developing, where cyber incident information is shared across institutions. This cooperation may improve the understanding of various types of cyber incidents, their severity, and impact on various types of targets. Research has shown that different types of attackers may be distinguished in terms of sophistication, skill level, attacking style, and objective of attack. It may further be proposed that different sectors experience different types of attacks. Attack characteristics and information about the modus operandi of criminal offenders have been used to learn more about the attacker and the motive of an attack. This information may also be used to distinguish between cyber attacks towards different types of targets. The current study focuses on reported cyber intrusions by the commercial and government sectors. The reported data come from CERT®Coordination Center (CERT/CC), which has categorized the aspects of cyber intrusions in the current study. The aspects analyzed are: 'Method of Operation (MO)' which refers to the methods used by perpetrator to carry out an attack; 'Impact' which refers to the effect of the attack; 'Source' which refers to the source of the attack, and 'Target' which refers to the victim of the attack. The current study uses 839 cases of cyber attacks towards the commercial sector and 558 cases towards the government sector. The 23 variables from the four different cyber intrusion aspects; MO, impact, source sector and target sector, were analyzed using multidimensional scaling (MDS), which is a technique that has often been used when profiling traditional types of crimes. The analysis gave a Guttman-Lingoes' coefficient of alienation of 0.19 with 42 iterations in a 3-dimensional solution. It was shown that the commercial and government sectors experience different types of attacks, with different types of impact, stemming from different sources. The findings and implications are discussed in relation to the benefits of standardization, reporting, and sharing of cyber incident information.
机译:网络事件的强度和严重性正在增长。因此,几个行业团体正在采取措施,以更好地协调和改善跨部门的信息安全。此外,各种不同类型的公私合作伙伴关系正在发展,网络事件信息在各个机构之间共享。这种合作可以增进对各种类型的网络事件,其严重性以及对各种类型目标的影响的理解。研究表明,可以根据技巧,技巧水平,攻击方式和攻击目标来区分不同类型的攻击者。可以进一步提出,不同的扇区遭受不同类型的攻击。攻击特征和有关犯罪分子作案手法的信息已被用来了解有关攻击者和攻击动机的更多信息。此信息还可用于区分针对不同类型目标的网络攻击。当前的研究重点是商业和政府部门对网络入侵的报道。报告的数据来自CERT®协调中心(CERT / CC),该中心在当前研究中对网络入侵的各个方面进行了分类。分析的方面是:“操作方法(MO)”,是指施暴者进行攻击的方法; “影响”指攻击的影响; “来源”指的是攻击的来源,“目标”指的是攻击的受害者。当前的研究使用针对商业部门的839例网络攻击和针对政府部门的558例。来自四个不同的网络入侵方面的23个变量;使用多维标度(MDS)对MO,影响,源部门和目标部门进行了分析,这是在分析传统类型的犯罪时经常使用的一种技术。分析在3维解中给出了42次迭代的Guttman-Lingoes异化系数为0.19。结果表明,商业和政府部门遭受不同类型的攻击,具有不同类型的影响,其来源不同。将就网络事件信息的标准化,报告和共享的好处来讨论这些发现和含义。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号