Skip to main content

Introduction

  • Chapter
  • First Online:
  • 1420 Accesses

Part of the book series: Terrorism, Security, and Computation ((TESECO))

Abstract

This chapter summarizes the results of a study analyzing 2 years of data provided by Symantec, monitoring over 4M host machines per year and a total of over 20B telemetry reports from these hosts. By focusing on 44 countries for which at least 500 hosts were monitored per year, we are able to provide a comprehensive analysis of the cyber-vulnerability of countries according to two measures: number of attacks per machine in a given country, and percentage of machines in the country that are attacked. We provide an analysis of the cyber-vulnerability of these countries according to these measures, identifying the most vulnerable and the least vulnerable nations from a cyber-vulnerability perspective.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mezzour G, Carley KM, Carley LR (2015) “An empirical study of global malware encounters.” In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM, 2015

    Google Scholar 

  2. Bilge L, Dumitras T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: ACM Conference on Computer and Communications Security, pp 833–844

    Google Scholar 

  3. Symantec Corp (2013) Four years of DarkSeoul cyberattacks against South Korea continue on anniversary of Korean War. Technical report http://www.symantec.com/connect/blogs/four-years-darkseoul-cyberattacks-against-south-korea-continue-anniversary-korean-war

  4. Gantz JF et al (2013) International Data Corporation. The dangerous world of counterfeit and pirated software. Technical report http://www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/idc030513.pdf

  5. Federal Bureau of Investigation (2013) Consumer alert: Pirated software may contain malware. Technical report https://www.fbi.gov/news/stories/2013/august/pirated-software-may-contain-malware

  6. Business Software Alliance. Shadow market—2011 BSA global software piracy study, 2012. 9th edition, http://globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_Study-Standard.pdf

  7. McAfee Labs (2013) McAfee threats report: First quarter 2013. Technical report http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2013.pdf

  8. McAfee Labs (2014) McAfee threats report August 2014. Technical report. http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2014.pdf

  9. Symantec Corp (2014) Symantec internet security threat report 2014 appendix. Technical report http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v19_221284438.en-us.pdf

  10. Symantec Corp (2014) Symantec internet security threat report 2014. Technical report http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf.

  11. Chiacu D (2014) Homeland security struggles to tempt, retain cyber talent. In: Reuters, Apr 26, 2014 http://www.reuters.com/article/2014/04/26/us-usa-cybersecurity-dhs-idUSBREA3P05O20140426

  12. Hennessey K, O’Brien C (2014) Cybersecurity guidelines for companies are unveiled by white house. In: Los Angeles Times, Feb. 12, 2014 http://articles.latimes.com/2014/feb/12/business/la-fi-cyber-security-20140213

  13. Subrahmanian VS, Mannes A, Sliva A, Shakarian J, Dickerson J (2012) Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Aug 2012, Springer, Switzerland

    Google Scholar 

  14. Subrahmanian VS, Mannes A, Roul A, Raghavan RK (2013) Indian Mujahideen: Computational Analysis and Public Policy, Springer, Nov 2013

    Google Scholar 

  15. Ovelgonne M, Dumitras T, Prakash BA, Subrahmanian VS, Wang B (2015) Understanding the Relationship between Human Behavior and Susceptibility to Cyber-Attacks: A Data-Drive Approach, submitted to a technical journal, Feb 2015. Currently being revised

    Google Scholar 

  16. Kang C, Park N, Prakash A, Serra E, Subrahmanian VS (2015) Ensemble Models for Data-Drive Prediction of Malware Infections, to appear in: Proc. 9th ACM International Conference on Web Science and Data Mining (WSDM), San Francisco, Feb 2016

    Google Scholar 

  17. Matsubara Y, Sakurai Y, van Panhuis WG, Faloutsos C (2014) FUNNEL: automatic mining of spatially coevolving epidemics. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining pp 105–114 ACM, Aug 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Subrahmanian, V.S., Ovelgönne, M., Dumitras, T., Prakash, B.A. (2015). Introduction. In: The Global Cyber-Vulnerability Report. Terrorism, Security, and Computation. Springer, Cham. https://doi.org/10.1007/978-3-319-25760-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25760-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25758-7

  • Online ISBN: 978-3-319-25760-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics