RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM

作者: DAVID MAIMON , MARIEL ALPER , BERTRAND SOBESTO , MICHEL CUKIER

DOI: 10.1111/1745-9125.12028

关键词: Set (psychology)Duration (project management)CybercrimeRelevance (law)Computer securityEngineeringBannerDeterrence theoryCommunication bandwidthHoneypot

摘要: System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights to explore the effectiveness security means deter unauthorized access systems. Drawing on deterrence perspective, we employ large set target computers built for sole purpose being attacked and conduct two independent experiments investigate influence warning banner progression, frequency, duration system incidents. In both experiments, (86 in first experiment 502 second) were either display or not once had successfully infiltrated systems; 1,058 incidents observed 3,768 second. The findings reveal that although does lead an immediate termination reduction frequency incidents, it significantly reduces their duration. Moreover, find effect message repeated attenuated with bandwidth capacity. These emphasize relevance restrictive constructs study trespassing.

参考文章(65)
Cormac Herley, Baris Coskun, Dinei Florêncio, Do strong web passwords accomplish anything usenix conference on hot topics in security. pp. 10- ,(2007)
Richard E. Hayes, Gary Wheatley, Information Warfare and Deterrence ,(1996)
Jack P. Gibbs, Crime, punishment, and deterrence ,(1975)
Robert Firth, Gary Ford, Barbara Fraser, John Kochmar, Suresh Konda, Detecting Signs of Intrusion. Defense Technical Information Center. ,(1997) , 10.21236/ADA329629
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Janet M. Box-Steffensmeier, R. Michael Alvarez, Nathaniel L. Beck, Bradford S. Jones, Lawrence L. Wu, Event History Modeling: A Guide for Social Scientists ,(2004)