DocumentCode
2418652
Title
Information Security: User Precautions, Attacker Efforts, and Enforcement
Author
Png, I.P.L. ; Qiu-Hong Wang
Author_Institution
Sch. of Bus., Nat. Univ. of Singapore, Singapore
fYear
2009
fDate
5-8 Jan. 2009
Firstpage
1
Lastpage
11
Abstract
We analyze the strategic interactions among end-users and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by end-users are strategic substitutes. This explains the inertia among users in taking precautions even in the face of grave potential consequences. Generally, information security can be addressed from two angles - facilitating end-user precautions and enforcement against attackers. We show that, enforcement is more effective as an all-round policy to enhance information security.Facilitating user precautions leads to increased precautions and increased end-user demand, which have conflicting effects on the total harm suffered by end-users. Hence, reduced form estimates of the impact of facilitating precautions may over- or under- estimate the impact, depending on which effect is stronger. Further, in targeted attacks, the outcome of interaction between users and attackers depends on the specific cost functions. Attackers may target low-valuation users as they take fewer precautions.
Keywords
computer crime; security of data; attacker efforts; information security; low-valuation users; mass attacks; user precautions; Computer crime; Computer security; Computer viruses; Computer worms; Cost function; Government; Information analysis; Information security; Internet; National security;
fLanguage
English
Publisher
ieee
Conference_Titel
System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on
Conference_Location
Big Island, HI
ISSN
1530-1605
Print_ISBN
978-0-7695-3450-3
Type
conf
DOI
10.1109/HICSS.2009.256
Filename
4755689
Link To Document