Files

Name/Description Type Size Uploaded By Uploaded On

Anderson-Measuring_t­he_cost_of_cybercrim­e-2012

Measuring the Cost of Cybercrime sets out to debunk the scaremongering around online crime that governments and defence contractors are using to justify everything from increased surveillance to preparations for cyberwar. By Ross Anderson, et all.

Adobe Acrobat file 338K Marcin A. Jun 18, 2012

empirical_analysis_o­f_data_breach_litiga­tion-2012

The paper investigates which data breaches are being litigated and which are being settled, with interesting data. This is very useful material for folks with insane security policies and an in house counsel.

Adobe Acrobat file 222K Marcin A. Jun 19, 2012

Lockheed-Intel-Drive­n-Defense

This paper describes a way to decompose attacks into phases, and a methodology to describe and analyze intrusions. I have a feeling that no further work from them will be made public. Very interesting approach, but not fully developed.

Adobe Acrobat file 1.2M Marcin A. Jun 19, 2012

Morris_Thompson-Pass­word_Security_A_case­_Study-1979

Paper reviewing Unix password security by Robert Morris and Ken Thompson. They mention key strengthening (salts), algorithms designed to ensure slow key-derivation (key stretching), and timing attacks. All in one, in 1979.

Adobe Acrobat file 436K Marcin A. Jun 18, 2012

MS_Research-Sex_Lies­_and_Cybercrime_Surv­eys

Here researchers from Microsoft Research single handedly prove that security surveys are mostly FUD, and often very bad science. This paper is another classic, very readable even though it talks about sampling and distributions.

Adobe Acrobat file 420K Marcin A. Jun 18, 2012

MS_Research-where_do­_all_the_attacks_go-­2011

MS Research strikes back, explaining why, regardless of the seemingly horrid state of computer security, not everyone is recording losses from breaches and other incidents. A very good paper.

Adobe Acrobat file 282K Marcin A. Jun 19, 2012

While Meetup.com has scanned these files for viruses, we recommend that you have up-to-date virus-scanning software on your own computer as well.

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy