We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape

by Anshu Tripathi, Umesh Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 17
Year of Publication: 2012
Authors: Anshu Tripathi, Umesh Kumar Singh
10.5120/8137-1882

Anshu Tripathi, Umesh Kumar Singh . Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape. International Journal of Computer Applications. 51, 17 ( August 2012), 41-47. DOI=10.5120/8137-1882

@article{ 10.5120/8137-1882,
author = { Anshu Tripathi, Umesh Kumar Singh },
title = { Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 17 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 41-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number17/8137-1882/ },
doi = { 10.5120/8137-1882 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:50:40.303934+05:30
%A Anshu Tripathi
%A Umesh Kumar Singh
%T Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 17
%P 41-47
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is often viewed as an arms race between attackers, who try to exploit vulnerabilities and security administrators, who try to protect system against these attacks. In this regard, analysis of emerging security trends can be helpful in planning proper countermeasures to ensure security. Several studies and surveys exist that provide statistical information on security trends and issues. By comparative and aggregate analysis of these surveys, good understanding of the current information security trends and issues can be gained. So, in order to get a holistic picture of current state of information security landscape, this paper made an analysis of the seven well known information security surveys conducted in year 2011. Results are generated by aggregating and analyzing recent survey reports to present a complete and comprehensive picture of current information security landscape. Furthermore, this paper also highlights key findings derived from this analysis.

References
  1. Gelbstein E. , "Information security for policy makers: what it means- why it matters- what to do about it?", [Online] Available: http://www. unitarny. org/mm/File/ Webinars /Unitar%20eg%20presentation%2030_08. pdf, (Accessed on 14-05-12).
  2. Schneier B. , "The speed of security", IEEE Security and Privacy, Vol. 1, Issue 4, 2003.
  3. Carey L. , "The evolution of computer virus and anti virus protection", [Online] Available: http://www. identitytheftsecrets. com/the-evolution-of-computer-virusesand-anti-virus-p. html, (Accessed 14-05-12).
  4. Symantec Global Internet Security Threat Report 2011, [Online] Available: http://eval. symantec. com/mktginfo/ enterprise/white_papers/b-whitepaper_internet_security _threat_report_xv_04-2010. en-us. pdf, (Accessed on 25-05-2012).
  5. Robert Richardson, "15th Annual 2010/2011 Computer Crime and Security Survey", 2011.
  6. 2011 Top Cyber Security Risks Report, [Online] Available: http://www. hpenterprisesecurity. com/ solutions/2011-cyber-security-risk-report, (Accessed on 25-05-2012).
  7. Secunia Yearly Report, 2011, [Online] Available: http://secunia. com/company/2011_yearly_report, (Accessed on 25-05-2012).
  8. Microsoft Security Intelligence Report, Volume 11, 2011, [Online] Available: http://www. microsoft. com/ security/sir/, (Accessed on 25-05-2012).
  9. Verizon 2010 Data Breach Investigations Report, [Online] Available: http://www. verizonbusiness. com/ resources/reports/rp_2010-data-breach-report_en_xg. pdf, (Accessed on 25-05-2012).
  10. Ponemon Institute 2009 Annual Study: Cost of a Data Breach, [Online] Available: http://www. ponemon. org/ local/upload/fckjail/generalcontent/18/file/US_Ponemon_CODB_09_012209_sec. pdf, (Accessed on 25-05-2012).
  11. National Vulnerability Database (NVD), [Online] Available: http://nvd. nist. gov/scap. cfm (Accessed on 27-05-2012).
  12. OSVDB, "The open source vulnerability database", [Online] Available: http://www. osvdb. org/ (Accessed on 27-05-2012).
  13. The MITRE Corporation. "Common Vulnerabilities and Exposures (CVE)," [Online] Available: http://www. cve. mitre. org/, (Accessed on 27-05-2012).
  14. CERT/CC Statistics, [Online] Available: http://www. /CERT Statistics Full Statistics. mht (Accessed on 27-05-2012).
  15. Robert Richardson, "14th Annual CSI/FBI Computer Crime and Security Survey- 2009", 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Information security trends Security survey Vulnerability trends Attack trends Security countermeasures