Economics of Cybersecurity, Part 1

September/October 2015

IEEE Security & Privacy magazine cover

In This Issue

The articles in this special issue, together with those in the companion issue, highlight the need for large, complex observational and empirical studies and represent the kind of studies that will advance our understanding of cybersecurity economics. Read full article »

About IEEE Security & Privacy

IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

Articles from IEEE Security & Privacy

Toward Anti-fragility: A Malware-Halting Technique

Toward Anti-fragility: A Malware-Halting Technique

A combination of software diversity and imperfect malware detection can make networked computing systems anti-fragile to certain types of malware. Read full article »

Mass-Marketing Fraud: A Growing Concern

Mass-Marketing Fraud: A Growing Concern

Mass marketing fraud robs victims of their money and confidence. Understanding how criminals use technology and psychology to trick consumers is key to prevention. Read full article »


Authentication at Scale

Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »


Silver Bullet Security Podcast with Gary McGraw

Silver Bullet Security Podcast logo

Steve Bellovin and Matt Green discuss “Crypto Wars II”
We thought the “crypto wars” were resolved in the late 1990s. But the introduction of encrypted devices — specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat — has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they call “going dark” and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released Keys Under Doormats paper, discuss the dangerous ramifications of this request. More podcast episodes »