Knowing the Enemy at the Gates: Measuring Attacker Motivation

  • Authors:
  • George P. Corser;Suzan Arslanturk;Jared Oluoch;Huirong Fu;George E. Corser

  • Affiliations:
  • Oakland University, Rochester, MI, USA;Oakland University, Rochester, MI, USA;Oakland University, Rochester, MI, USA;Oakland University, Rochester, MI, USA;Destination Imagination, Houghton, MI, USA

  • Venue:
  • International Journal of Interdisciplinary Telecommunications and Networking
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Traditional cost-benefit analysis CBA quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-í-vis two typical network attacks, identity theft and intellectual property theft.