Emerging Threats to Internet Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications ==Full Citation== Michel van Eeten and Johannes M. Bauer, ''Emergi...)
 
No edit summary
 
(8 intermediate revisions by 2 users not shown)
Line 2: Line 2:


Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications  
Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications  


==Full Citation==
==Full Citation==


Michel van Eeten and Johannes M. Bauer, ''Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications'', (2010) Journal of Contingencies and Crisis Management, Vol. 17, No. 4 [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1508844  ''Web'']
Michel van Eeten and Johannes M. Bauer, ''Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications'', (2010) Journal of Contingencies and Crisis Management, Vol. 17, No. 4 [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1508844  ''SSRN'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=vanEeten_Bauer:2019&f=wikibiblio.bib ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=vanEeten_Bauer:2019&f=wikibiblio.bib ''BibTeX'']
Line 12: Line 11:
==Categorization==
==Categorization==


Issues: [[Government networks (.gov)]], [[Incentives]], [[Economics of Cybersecurity]], [[Cybercrime]]
* Issues: [[Economics of Cybersecurity]]; [[Cybercrime]]; [[Government Networks (.gov)]]; [[Incentives]]


==Key Words==  
==Key Words==  
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Botnet Botnets]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Botnet Botnets],
 
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware Malware]
 
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Crimeware Crimeware]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Crimeware Crimeware]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware Malware],
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Social_Engineering Social Engineering]


==Synopsis==
==Synopsis==

Latest revision as of 14:24, 18 June 2010

Full Title of Reference

Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications

Full Citation

Michel van Eeten and Johannes M. Bauer, Emerging Threats to Internet Security: Incentives, Externalities and Policy Implications, (2010) Journal of Contingencies and Crisis Management, Vol. 17, No. 4 SSRN

BibTeX

Categorization

Key Words

Botnets, Crimeware Malware, Social Engineering

Synopsis

Somewhere around 10% of all machines connected to the Internet are thought to be infected with malicious software. This has allowed the emergence of so-called ‘botnets’– networks of sometimes millions of infected machines that are remotely controlled by malicious actors. Botnets are mostly used for criminal purposes, but they also enable large-scale failures that might even reach disastrous proportions. We explain the rise of botnets as the outcome of the incentive structures of market players and present new empirical evidence on these incentives. The resulting externalities require some form of voluntary or government-led collective action. Our findings have implications for the controversial debate on the appropriate policy measures, where two perspectives on cybersecurity fight for dominance: national security and law enforcement.

Additional Notes and Highlights