메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-22

Dynamic modeling of the cyber security threat problem: The black market for vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords


EID: 79952066310     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-60566-326-5.ch001     Document Type: Chapter
Times cited : (1)

References (48)
  • 2
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314, 610-613.
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 8
    • 84900585209 scopus 로고    scopus 로고
    • Vulnerability disclosure policy
    • CERT/CC, Retrieved June 10, 2007
    • CERT/CC. (2000). Vulnerability disclosure policy. CERT Coordination Center. Retrieved June 10, 2007.
    • (2000) CERT Coordination Center
  • 13
    • 84900654598 scopus 로고    scopus 로고
    • Paper presented at the 21st National Information Systems Security Conference, Crystal City, Virginia, VA
    • Du, W., & Mathur, A. P. (1998). Categorization of software errors that led to security breaches. Paper presented at the 21st National Information Systems Security Conference, Crystal City, Virginia, VA.
    • (1998) Categorization of Software Errors that Led to Security Breaches
    • Du, W.1    Mathur, A.P.2
  • 14
    • 84900577575 scopus 로고    scopus 로고
    • [Electronic Version], 2007. Retrieved from
    • Evers, J. (2007). Offering a bounty for security bugs [Electronic Version], 2007. Retrieved from http://news.com.com/Offering+a+bounty+for+se curity+bugs/2100-7350_3-5802411.html?tag=sas.email
    • (2007) Offering a Bounty for Security Bugs
    • Evers, J.1
  • 15
    • 84900647955 scopus 로고    scopus 로고
    • Retrieved April 28, 2007, from
    • Francis, B. (2005). Know thy hacker. Retrieved April 28, 2007, from http://www.infoworld.com/article/05/01/28/05OPsecadvise_1.html
    • (2005) Know Thy Hacker
    • Francis, B.1
  • 18
    • 84900574131 scopus 로고    scopus 로고
    • Retrieved June 19, 2007, from
    • Grimes, R. A. (2005). The full disclosure debate. Retrieved June 19, 2007, from http://www.infoworld.com/article/05/09/30/40OPsecadvise_1.html
    • (2005) The Full Disclosure Debate
    • Grimes, R.A.1
  • 19
    • 84869263662 scopus 로고    scopus 로고
    • IBM, [Electronic Version], Retrieved January, from
    • IBM. (2007). IBM internet security systems X-Force 2006 trend statistics [Electronic Version]. Retrieved January, from http://www.iss.net/documents/whitepapers/X_Force_Exec_Brief.pdf
    • (2007) IBM Internet Security Systems X-Force 2006 Trend Statistics
  • 20
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities?
    • Kannan, K., & Telang, R. (2005). Market for software vulnerabilities? Think again. Management Science, 51(5), 726-740.
    • (2005) Think again Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 22
    • 84900631898 scopus 로고    scopus 로고
    • Retrieved June 10, 2007, from
    • Lemos, R. (2004). Mozilla puts bounty on bugs. Retrieved June 10, 2007, from http://news.com.com/Mozilla+puts+bounty+on+bugs/2100-1002_3-5293659.html
    • (2004) Mozilla Puts Bounty on Bugs
    • Lemos, R.1
  • 24
    • 84900609925 scopus 로고    scopus 로고
    • Retrieved April 10 2007, from
    • Middleton, J. (2001). Coalition condemns full disclosure. Retrieved April 10 2007, from http://www.vnunet.com/vnunet/news/2116546/coalition-condemns-full-disclosure
    • (2001) Coalition Condemns Full Disclosure
    • Middleton, J.1
  • 26
    • 84900676925 scopus 로고    scopus 로고
    • Paper presented at the Workshop of Economics and Information Security (WEIS), Minneapolis, MN
    • Ozment, A. (2004). Bug auctions: vulnerability market reconsidered. Paper presented at the Workshop of Economics and Information Security (WEIS), Minneapolis, MN.
    • (2004) Bug Auctions: Vulnerability Market Reconsidered
    • Ozment, A.1
  • 27
    • 84877999984 scopus 로고    scopus 로고
    • Paper presented at the The Fifteenth Usenix Security Symposium. July 31 - August 4 2006, Vancouver, BC, Canada
    • Ozment, A., & Schechter, S. (2006). Milk or wine: does software security improve with age? Paper presented at the The Fifteenth Usenix Security Symposium. July 31 - August 4 2006, Vancouver, BC, Canada.
    • (2006) Milk or Wine: Does Software Security Improve with Age
    • Ozment, A.1    Schechter, S.2
  • 28
    • 84900569223 scopus 로고    scopus 로고
    • PandaLabs, Electronic Version, Retrieved July 15, 2007, from
    • PandaLabs. (2007). Quarterly report PandaLabs [Electronic Version]. Retrieved July 15, 2007, from http://www.pandasecurity.com/
    • (2007) Quarterly Report PandaLabs
  • 30
    • 0003534217 scopus 로고    scopus 로고
    • (Fourth Edition ed.). Boston: Pearson, Addison Wesley
    • Perloff, J. M. (2007). Microeconomics (Fourth Edition ed.). Boston: Pearson, Addison Wesley.
    • (2007) Microeconomics
    • Perloff, J.M.1
  • 33
    • 84900649672 scopus 로고    scopus 로고
    • Retrieved June 19, 2007, from
    • Rauch, J. (1999). The Future of vulnerability disclosure? Retrieved June 19, 2007, from http://www.usenix.org/publications/login/1999-11/features/disclosure.html
    • (1999) The Future of Vulnerability Disclosure
    • Rauch, J.1
  • 35
    • 84900628898 scopus 로고    scopus 로고
    • Paper presented at the The Third Workshop on the Economics of Information Security, Minneapolis
    • Rescola, E. (2004). Is finding security holes a good idea? Paper presented at the The Third Workshop on the Economics of Information Security, Minneapolis.
    • (2004) Is Finding Security Holes a Good Idea
    • Rescola, E.1
  • 38
    • 78649277196 scopus 로고    scopus 로고
    • a, Crypto-Gram Newsletter Retrieved March 10, 2006, from
    • Schneier, B. (2000a). Full disclosure and the window of exposure. Crypto-Gram Newsletter Retrieved March 10, 2006, from http://www.schneier.com/crypto-gram-0009.html#1
    • (2000) Full Disclosure and the Window of Exposure
    • Schneier, B.1
  • 39
    • 84900585816 scopus 로고    scopus 로고
    • b, Retrieved April 10, 2007, from
    • Schneier, B. (2000b). Publicizing vulnerabilities. Retrieved April 10, 2007, from http://www.schneier.com/crypto-gram-0002.html
    • (2000) Publicizing Vulnerabilities
    • Schneier, B.1
  • 40
    • 33947412832 scopus 로고    scopus 로고
    • Retrieved April 10, 2007, from
    • Schneier, B. (2001). Bug secrecy vs. full disclosure. Retrieved April 10, 2007, from http://news.zdnet.com/2100-9595_22-531066.html
    • (2001) Bug Secrecy Vs. Full Disclosure
    • Schneier, B.1
  • 41
    • 84900676434 scopus 로고    scopus 로고
    • Retrieved December 12, 2006, from
    • Schneier, B. (2006). Economics and information security. Retrieved December 12, 2006, from http://www.schneier.com/blog/archives/2006/06/economics_and_i_1.html
    • (2006) Economics and Information Security
    • Schneier, B.1
  • 45
    • 84900646704 scopus 로고    scopus 로고
    • Paper presented at the The Fifth Workshop on the Economics of Information Security (WEIS), Robinson College, University of Cambridge, England
    • Sutton, M., & Nagle, F. (2006). Emerging economic models for vulnerability research. Paper presented at the The Fifth Workshop on the Economics of Information Security (WEIS), Robinson College, University of Cambridge, England.
    • (2006) Emerging Economic Models for Vulnerability Research
    • Sutton, M.1    Nagle, F.2
  • 46
    • 66249106228 scopus 로고    scopus 로고
    • Symantec, [Electronic Version]. Retrieved January, from
    • Symantec. (2008). Symantec Global Internet Threat Report: Trend for July - Dec 07, [Electronic Version]. Retrieved January, from http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf
    • (2008) Symantec Global Internet Threat Report: Trend for July - Dec 07


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.