Measuring the changing cost of cybercrime

R Anderson, C Barton, R Böhme… - The 2019 workshop …, 2019 - research.tudelft.nl
R Anderson, C Barton, R Böhme, R Clayton, CH Ganan, T Grasso, M Levi, T Moore
The 2019 workshop on the economics of information security, 2019research.tudelft.nl
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform
evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of
choice, with Android replacing Windows, and with many services moving to the cloud. The
use of social networks has become extremely widespread. The executive summary is that
about half of all property crime, by volume and by value, is now online. We hypothesised in …
Abstract
In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the cloud. The use of social networks has become extremely widespread. The executive summary is that about half of all property crime, by volume and by value, is now online. We hypothesised in 2012 that this might be so; it is now established by multiple victimisation studies. Many cybercrime patterns appear to be fairly stable, but there are some interesting changes. Payment fraud, for example, has more than doubled in value but has fallen slightly as a proportion of payment value; the payment system has simply become bigger, and slightly more efficient. Several new cybercrimes are significant enough to mention, including business email compromise and crimes involving cryptocurrencies. The move to the cloud means that system misconfiguration may now be responsible for as many breaches as phishing. Some companies have suffered large losses as a side-effect of denial-of-service worms released by state actors, such as NotPetya; we have to take a view on whether they count as cybercrime. The infrastructure supporting cybercrime, such as botnets, continues to evolve, and specific crimes such as premium-rate phone scams have evolved some interesting variants. The overall picture is the same as in 2012: traditional offences that are now technically ‘computer
research.tudelft.nl
以上显示的是最相近的搜索结果。 查看全部搜索结果