A taxonomy and comparison of computer security incidents from the commercial and government sectors

被引:43
|
作者
Kjaerland, Maria [1 ]
机构
[1] Univ Stavanger, Fac Social Sci, Stavanger, Norway
关键词
commercial; government; sectors; cyber incidents; taxonomy; CERT/CC; reporting; facet theory; multidimensional scaling;
D O I
10.1016/j.cose.2006.08.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber incidents are growing in intensity and severity. Several industry groups are therefore taking steps to better coordinate and improve information security across sectors. Also, various different types of public-private partnerships are developing, where cyber incident information is shared across institutions. This cooperation may improve the understanding of various types of cyber incidents, their severity, and impact on various types of targets. Research has shown that different types of attackers may be distinguished in terms of sophistication, skill level, attacking style, and objective of attack. It may further be proposed that different sectors experience different types of attacks. Attack characteristics and information about the modus operandi of criminal offenders have been used to learn more about the attacker and the motive of an attack. This information may also be used to distinguish between cyber attacks towards different types of targets. The current study focuses on reported cyber intrusions by the commercial and government sectors. The reported data come from CERT (R) Coordination Center (CERT/CC), which has categorized the aspects of cyber intrusions in the current study. The aspects analyzed are: 'Method of Operation (MO)' which refers to the methods used by perpetrator to carry out an attack; 'Impact' which refers to the effect of the attack; 'Source' which refers to the source of the attack, and 'Target' which refers to the victim of the attack. The current study uses 839 cases of cyber attacks towards the commercial sector and 558 cases towards the government sector. The 23 variables from the four different cyber intrusion aspects; MO, impact, source sector and target sector, were analyzed using multidimensional scaling (MDS), which is a technique that has often been used when profiling traditional types of crimes. The analysis gave a Guttman-Lingoes' coefficient of alienation of 0.19 with 42 iterations in a 3-dimensional solution. It was shown that the commercial and government sectors experience different types of attacks, with different types of impact, stemming from different sources. The findings and implications are discussed in relation to the benefits of standardization, reporting, and sharing of cyber incident information. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:522 / 538
页数:17
相关论文
共 50 条
  • [1] Towards to Security Incidents Taxonomy in Internet
    Ortiz Bayona, Zulima
    Galindo Pulido, Francisco
    INGENIERIA, 2006, 11 (01): : 37 - 42
  • [2] ISS lab popular with commercial and government sectors
    Collicott, Steven
    AEROSPACE AMERICA, 2017, 55 (11) : 66 - 66
  • [3] A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India
    Mehra, Payal
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 198 - 209
  • [4] A socio-technical perspective on computer mediated communication: Comparison of government and non government sectors in India
    Mehra P.
    Communications in Computer and Information Science, 2010, 54 : 198 - 209
  • [5] SECURITY STANDARDS - GOVERNMENT AND COMMERCIAL
    BARKER, LK
    NELSON, LD
    AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 9 - 18
  • [6] STRAIN MAY BE DEVELOPING BETWEEN GOVERNMENT, COMMERCIAL SECTORS
    RHODES, WL
    INFOSYSTEMS, 1987, 34 (06): : 10 - 10
  • [7] Security risk analysis used by Kuwait government sectors
    Al-Enezi, Khalid Abdulkareem
    Al-shaikhli, Imad Fakhri
    Alhatem, Khaled
    Al-kandari, Abdul Rahman
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 44 - 49
  • [8] A COMPARISON OF METHODS FOR COMPUTER TAXONOMY
    BEERS, RJ
    MEGRAW, S
    LOCKHART, WR
    FISHER, J
    JOURNAL OF GENERAL MICROBIOLOGY, 1962, 28 (04): : 641 - &
  • [9] An empirically derived loss taxonomy based on publicly known security incidents
    Innerhofer-Oberperfler, Frank
    Breu, Ruth
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 66 - 73
  • [10] Analysis of Computer Security Incidents Using Fuzzy Logic
    Vorobiev, E. G.
    Petrenko, S. A.
    Kovaleva, I. V.
    Abrosimov, I. K.
    PROCEEDINGS OF 2017 XX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2017, : 369 - 371