Measuring Security Practices

被引:1
|
作者
DeKoven, Louis F. [1 ]
Randall, Audrey [1 ]
Mirian, Ariana [1 ]
Akiwate, Gautam [1 ]
Blume, Ansel [1 ]
Saul, Lawrence K. [1 ]
Schulman, Aaron [1 ]
Voelker, Geoffrey M. [1 ]
Savage, Stefan [1 ]
机构
[1] Univ Calif San Diego, San Diego, CA 92103 USA
关键词
This work was supported in part by NSF grants CNS-1629973 and CNS-1705050; DHS grant AFRL-FA8750-18-2-0087; and the Irwin Mark and Joan Klein Jacobs Chair in Information and Computer Science;
D O I
10.1145/3547133
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users are encouraged to adopt a wide array of technologies and behaviors to reduce their security risk. However, the adoption of these "best practices," ranging from the use of antivirus products to keeping software updated, is not well understood, nor is their practical impact on security risk well established. To explore these issues, we conducted a large-scale measurement of 15,000 computers over six months. We use passive monitoring to infer and characterize the prevalence of various security practices as well as a range of other potentially security-relevant behaviors. We then explore the extent to which differences in key security behaviors impact the real-world outcomes (i.e., that a device shows clear evidence of having been compromised).
引用
收藏
页码:93 / 102
页数:10
相关论文
共 50 条
  • [41] Measuring protocol strength with security goals
    Rowe, Paul D.
    Guttman, Joshua D.
    Liskov, Moses D.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (06) : 575 - 596
  • [42] A Framework for Measuring the Costs of Security at Runtime
    Ivkic, Igor
    Pichler, Harald
    Zsilak, Mario
    Mauthe, Andreas
    Tauber, Markus
    [J]. CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 488 - 494
  • [43] MEASURING FOOD SECURITY IN THE REPUBLIC OF SERBIA
    Brankov, Tatjana Papic
    Milovanovic, Milos
    [J]. EKONOMIKA POLJOPRIVREDA-ECONOMICS OF AGRICULTURE, 2015, 62 (03): : 801 - 812
  • [44] Measuring protocol strength with security goals
    Paul D. Rowe
    Joshua D. Guttman
    Moses D. Liskov
    [J]. International Journal of Information Security, 2016, 15 : 575 - 596
  • [45] Measuring Countries' Performance in Ecological Security
    Chehabeddine, Mohamad
    Tvaronaviciene, Manuela
    Vinogradova-Zinkevic, Irina
    [J]. ACTA MONTANISTICA SLOVACA, 2023, 28 (03) : 603 - 620
  • [46] READING FACTOR IN MEASURING SECURITY IN CHILDREN
    BROCKMAN, LM
    [J]. ALBERTA JOURNAL OF EDUCATIONAL RESEARCH, 1974, 20 (03): : 244 - 250
  • [47] Analysis of Big Data Security Practices
    Revathy, P.
    Mukesh, Rajeswari
    [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 264 - 267
  • [48] Best Practices for Software Security: An Overview
    Yasar, Ansar-Ul-Haque
    Preuveneers, Davy
    Berbers, Yolande
    Bhatti, Ghasan
    [J]. INMIC: 2008 INTERNATIONAL MULTITOPIC CONFERENCE, 2008, : 169 - +
  • [49] International Security Cooperation: Intelligence Practices
    Kosal, Sonmez
    [J]. INTELLIGENCE COOPERATION PRACTICES IN THE 21ST CENTURY: TOWARDS A CULTURE OF SHARING, 2010, 71 : 3 - 6
  • [50] Control System Security Perceptions and Practices
    Luallen, Matthew E.
    Hamburg, Steven E.
    [J]. CONTROL ENGINEERING, 2010, 57 (01) : 46 - 48