000 03738nam a22005055i 4500
003 DE-He213
005 20231104114448.0
007 cr nn 008mamaa
008 151209s2015 gw | s |||| 0|eng d
020 _a9783319257600
_z978-3-319-25760-0
024 7 _a10.1007/978-3-319-25760-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
100 1 _aSubrahmanian, V.S.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 4 _aThe Global Cyber-Vulnerability Report /
_cby V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aTerrorism, Security, and Computation,
_x2197-8778
505 0 _aIntroduction -- Types of Malware and Malware Distribution Strategies.- Methodology and Measurement.- Human Behavior and Susceptibility to Cyber-Attacks -- Country by Country Analysis.
520 _aThis is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
650 0 _aComputer security.
650 0 _aStatistics.
650 0 _aArtificial intelligence.
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aSecurity Science and Technology.
_0http://scigraph.springernature.com/things/product-market-codes/P31080
650 2 4 _aStatistics for Social Sciences, Humanities, Law.
_0http://scigraph.springernature.com/things/product-market-codes/S17040
650 2 4 _aInformation Systems Applications (incl. Internet).
_0http://scigraph.springernature.com/things/product-market-codes/I18040
650 2 4 _aArtificial Intelligence.
_0http://scigraph.springernature.com/things/product-market-codes/I21000
700 1 _aOvelgonne, Michael.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aDumitras, Tudor.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aPrakash, Aditya.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
856 4 0 _uhttps://doi.org/10.1007/978-3-319-25760-0
_3Springer eBooks
_zOnline access link to the resource
912 _aZDB-2-SCS
999 _c200434623
_d52835
942 _2lcc
_cEBK
041 _aeng