1 - 5 of 5 Chapters
[This chapter summarizes the results of a study analyzing 2 years of data provided by Symantec, monitoring over 4M host machines per year and a total of over 20B telemetry reports from these hosts. By focusing on 44 countries for which at least 500 hosts were monitored per year, we are able to...
[The goal of this chapter is to provide a brief overview of different types of malware that have been used to carry out cyber-attacks. In most cases, we will provide examples of each category of malware. Moreover, malware tends to be distributed in different ways and propagate in different ways....
[Our Global Cyber-Vulnerability Report was created by analyzing over 20 billion telemetry records (both binary reputation and malware reports) during a 2-year period in which we had data on over 4M machines per year. In this chapter, we briefly overview the methodology used in the creation of...
[While human users are often considered to be the weakest link in security systems, the risks associated with their typical day-to-day computing habits are not well understood. Using Symantec’s WINE platform, we conduct a detailed study of 13.7B pieces of malware over a population of 1.6 million...
[In this chapter, we present a detailed summary of the cyber-vulnerability of each of the 44 countries in our study. We start with a summary of the national cybersecurity strategy for that country. In some cases, the country has not published a national cybersecurity strategy, but most of the 44...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.