Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security, cybercrime, and scale
Herley C. Communications of the ACM57 (9):64-71,2014.Type:Article
Date Reviewed: Sep 30 2014

This article analyzes the traditional threat model for cybersecurity and proposes a new model that considers scalability and financial motivation. In the new threat model, the author splits cybercrime into two categories: financial and non-financial. The financial category further divides into scalable and non-scalable. The author presents a formula for financially motivated attackers and concludes that “the average gain minus average cost of an attack must be positive.”

The author points out, “when we ignore attacker constraints, we make things more difficult than they need to be for defenders.” Some potential attacks should be minimally addressed, since they will be threats that pose no gain for financially motivated attackers. Through an analysis of “the difficulties of profitably finding targets and monetizing them,” the author presents a new approach to analyzing potential cybercrimes.

I recommend this article to researchers in the cybercrime area since it provides a potentially useful new threat model. If we adopt the new threat model, we will be able to save on costs by defending attacks at scale and also be able to fully understand the motivations of attackers.

Reviewer:  De Wang Review #: CR142776 (1501-0052)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Electronic Commerce (K.4.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy