Knowing the Enemy at the Gates: Measuring Attacker Motivation

Knowing the Enemy at the Gates: Measuring Attacker Motivation

George P. Corser, Suzan Arslanturk, Jared Oluoch, Huirong Fu, George E. Corser
Copyright: © 2013 |Volume: 5 |Issue: 2 |Pages: 13
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781466632660|DOI: 10.4018/jitn.2013040107
Cite Article Cite Article

MLA

Corser, George P., et al. "Knowing the Enemy at the Gates: Measuring Attacker Motivation." IJITN vol.5, no.2 2013: pp.83-95. http://doi.org/10.4018/jitn.2013040107

APA

Corser, G. P., Arslanturk, S., Oluoch, J., Fu, H., & Corser, G. E. (2013). Knowing the Enemy at the Gates: Measuring Attacker Motivation. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(2), 83-95. http://doi.org/10.4018/jitn.2013040107

Chicago

Corser, George P., et al. "Knowing the Enemy at the Gates: Measuring Attacker Motivation," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 5, no.2: 83-95. http://doi.org/10.4018/jitn.2013040107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. The authors propose a new set of equations and examine their implications vis-à-vis two typical network attacks, identity theft and intellectual property theft.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.