-
Book Overview & Buying
-
Table Of Contents
How to Measure Anything in Cybersecurity Risk
By :
Studies have shown that a high percentage of external espionage attacks enter via phishing,1 and install malware on the phished user’s computer. One technique for countering these attacks is anti-phish decoy training, using fake phishing e-mails.2 But a decoy program can be expensive and even politically sensitive. Actuarial data led us to an unexpected but even more effective approach.
Crucial data in this case came from Microsoft’s published data3 on malware clean rates on various operating systems. Unsurprisingly, the data show that more recent versions of Windows are substantially more secure against malware attacks, and MacOS and Linux are more secure than Windows. What is perhaps unexpected is the degree to which the OS version can affect the frequency of successful attack.
Figure B.1 shows an analysis of a high-tech company in a highly competitive industry where espionage is a very real business...
Change the font size
Change margin width
Change background colour