The Community for Technology Leaders
RSS Icon
Issue No.02 - March-April (2013 vol.11)
pp: 89-92
Cormac Herley , Microsoft Research
How do so many Internet users escape harm? The range of attacks is enormous and growing; we know that most users neglect even basic defense measures. Yet things somehow muddle along: 2 billion people use the Internet and seem to derive more good than harm from it. If security is only as good as the weakest link, why don't worst-case outcomes happen regularly? Why isn't everyone hacked every day? The answer might lie in economics rather than technology.
Internet, Privacy, Computer security, Network security, targeted attacks, economics, scalability
Cormac Herley, "When Does Targeting Make Sense for an Attacker?", IEEE Security & Privacy, vol.11, no. 2, pp. 89-92, March-April 2013, doi:10.1109/MSP.2013.46
1. C. Herley, "The Plight of the Targeted Attacker in a World of Scale," Proc. Workshop Economics of Information Security, 2010; TargetedAttacker.pdf.
2. C. Shapiro and H. Varian, Information Rules, Harvard Business School Press, 1999.
3. K. Mitnick and W.L. Simon, The Art of Deception, Wiley, 2002.
4. E.L. Lazurus et al., "Applying a Reusable Election Threat Model at the County Level," Proc. 2011 Conf. Electronic Voting Technology/Workshop Trustworthy Elections (EVT/WOTE 11), Usenix, 2011, p. 12.
5. A. Odlyzko, "Providing Security with Insecure Systems," Proc. ACM Conf. Wireless Network Security (WiSec 10), ACM, 2010, pp. 87–88.
6. D. Florêncio and C. Herley, "Is Everything We Know about Password Stealing Wrong?," IEEE Security & Privacy, vol. 10, no. 6, pp. 63–69.
7. C. Kanich et al., "Spamalytics: An Empirical Analysis of Spam Marketing Conversion," Proc. 15th ACM Conf. Computer and Communications Security, ACM, 2008, pp. 3–14.
8. "Survey of Consumer Finances," Federal Reserve Board, 8 Feb. 2013;
9. C. Herley, "Why Do Nigerian Scammers Say They Are from Nigeria?," Proc. Workshop Economics of Information Security, (WEIS 12), 2012; WhyFromNigeria.pdf.
10. M. Backes, M. Duermuth, and D. Unruh, "Compromising Reflections: How to Read Computer Monitors around a Corner," IEEE Symp. Security and Privacy, IEEE CS, 2008, pp. 158–169.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool