DEVIANT SECURITY EHAVANDESANDT.pdf


Aperçu du fichier PDF deviantsecurityehavandesandt.pdf - page 8/311

Page 1...6 7 8910311



Aperçu texte


List of Figures
1.1

A visualization of the known knowns and known unknowns of
attacks and defences . . . . . . . . . . . . . . . . . . . . . . . . .

5

2.1
2.2
2.3
2.4

Security process cycle . . . . . . . . . . . . . . . . . . . . .
Venn-diagram of cyber security and cyber crime discourses
Cyber crimes incorporated into the cyber security discourse
Deviant security process cycle . . . . . . . . . . . . . . . . .

.
.
.
.

.
.
.
.

.
.
.
.

14
18
19
26

3.1
3.2
3.3
3.4

Security
Security
Security
Security

.
.
.
.

.
.
.
.

.
.
.
.

31
34
36
38

4.1

Conditional and consequential matrix . . . . . . . . . . . . . . .

64

5.1
5.2

Visual oversight of Chapter 5 . . . . . . . . . . . . . . . . . . . .
Visualization of intangible and tangible protective assets . . . .

76
98

6.1
6.2
6.3
6.4
6.5
6.6
6.7

Visual oversight of Chapter 6 . . . . . . . . . . . . . . . . . . .
Crime script analysis of cyber crime services and products . . .
Network chart of intertwined roles . . . . . . . . . . . . . . . .
Visualization of dilemmas because of information asymmetries .
Continuum of hosting service providers . . . . . . . . . . . . . .
Process description of deviant trust . . . . . . . . . . . . . . . .
Visual comparison of trust and distrust continuums . . . . . . .

7.1
7.2
7.3
7.4

Conditional/consequential matrix with temporal-spatial concepts 149
Visual oversight of Chapter 7 . . . . . . . . . . . . . . . . . . . . 150
Circle diagram of the reversed electronic panopticon . . . . . . . 154
Comparison of deviant security mechanisms between underground
economies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Euler-diagram of various deviant security cultures . . . . . . . . 165
Visualization of points of attack and their relation . . . . . . . . 171
Visualization of the Netherlands as a low-risk point of attack linkage172
Visualization of distribution as a countermeasure . . . . . . . . . 176

7.5
7.6
7.7
7.8

process
process
process
process

cycles on anti-forensics . . .
cycle on botnet protection .
cycle on authorship analysis
cycle on attacker economics .

vi

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.
.
.
.

106
112
120
122
124
136
138