The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
Terrorism, Security, and Computation

The Global Cyber-Vulnerability Report

V.S. Subrahmanian and Others
    • 87,99 €
    • 87,99 €

Publisher Description

This is the first book  that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. 

Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general.

The Global Cyber-Vulnerability Report targets researchers and  professionals including government and military workers, policy-makers and law-makers  working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

GENRE
Computing & Internet
RELEASED
2015
9 December
LANGUAGE
EN
English
LENGTH
308
Pages
PUBLISHER
Springer International Publishing
SIZE
15.4
MB

More Books by V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras & Aditya Prakash

The Android Malware Handbook The Android Malware Handbook
2023
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Cyber Deception Cyber Deception
2016
Cyber Warfare Cyber Warfare
2015
Data-driven Generation of Policies Data-driven Generation of Policies
2014
Indian Mujahideen Indian Mujahideen
2013

Other Books in This Series

Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
2023
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
2021
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
2020
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
2017
Anomaly Detection Principles and Algorithms Anomaly Detection Principles and Algorithms
2017
Violence in Nigeria Violence in Nigeria
2015