|
|
1 | (32) |
|
|
4 | (1) |
|
1.2 The World's Most Cyber-Vulnerable Countries |
|
|
5 | (4) |
|
1.3 The Relationship Between Cyber-Attacks and GDP |
|
|
9 | (2) |
|
1.4 The Relationship between Cyber-Attacks and the Human Development Index |
|
|
11 | (2) |
|
1.5 The Relationship between Cyber-Attacks and HDI Health Index |
|
|
13 | (2) |
|
1.6 The Relationship Between Cyber-Attacks and Education |
|
|
15 | (2) |
|
1.6.1 The Overall Education Index |
|
|
16 | (1) |
|
1.6.2 Combined Gross Enrollment in Education |
|
|
17 | (1) |
|
1.6.3 Expected Years of Schooling |
|
|
17 | (1) |
|
1.7 Is Software Piracy Relevant to Cyber-Risk? |
|
|
17 | (2) |
|
|
19 | (3) |
|
1.9 National Cybersecurity Policies: A Quick Summary |
|
|
22 | (4) |
|
|
26 | (4) |
|
|
26 | (1) |
|
1.10.2 Building up a National Cyber-Defense Capability |
|
|
27 | (1) |
|
1.10.3 Building Up Timely Cybersecurity Legislation and Regulation |
|
|
28 | (1) |
|
1.10.4 International Cybersecurity Cooperation |
|
|
29 | (1) |
|
1.10.5 Cybersecurity Attack Forecasting |
|
|
29 | (1) |
|
|
30 | (3) |
|
|
31 | (2) |
|
2 Types of Malware and Malware Distribution Strategies |
|
|
33 | (14) |
|
|
34 | (4) |
|
|
34 | (2) |
|
|
36 | (1) |
|
|
37 | (1) |
|
2.1.4 Other Forms of Malware |
|
|
38 | (1) |
|
|
38 | (2) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (2) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
2.4 Cross-Country Studies |
|
|
42 | (1) |
|
|
43 | (4) |
|
|
44 | (3) |
|
3 Methodology and Measurement |
|
|
47 | (22) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (2) |
|
|
50 | (3) |
|
3.4.1 Host-Based Features |
|
|
50 | (2) |
|
3.4.2 Macro-Economic Features |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (16) |
|
3.6.1 Time-Series Analysis of Attacks |
|
|
54 | (1) |
|
3.6.2 Macro Economic Factors |
|
|
54 | (4) |
|
|
58 | (1) |
|
3.6.4 Percentage of Downloaded Binaries and Risk |
|
|
58 | (3) |
|
3.6.5 Percentage Low Prevalence Binary and Risk |
|
|
61 | (1) |
|
3.6.6 Percentage Unsigned Binaries and Risk |
|
|
61 | (1) |
|
3.6.7 Attacks of Misleading Applications and Spy ware |
|
|
61 | (3) |
|
3.6.8 Country Similarity by Host-Based Features |
|
|
64 | (1) |
|
3.6.9 Multivariate Analysis |
|
|
65 | (2) |
|
|
67 | (2) |
|
4 Human Behavior and Susceptibility to Cyber-Attacks |
|
|
69 | (24) |
|
|
69 | (2) |
|
|
71 | (3) |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (2) |
|
4.5 User Behavior and Cyber-Attacks |
|
|
78 | (11) |
|
|
79 | (1) |
|
4.5.2 Number of Binaries and Risk |
|
|
80 | (1) |
|
4.5.3 Percentage of Low/High Prevalence and Unique Binaries and Risk |
|
|
81 | (4) |
|
4.5.4 Percentage of Unsigned Binaries and Risk |
|
|
85 | (1) |
|
4.5.5 Percentage of Downloaded Binaries and Risk |
|
|
86 | (2) |
|
4.5.6 User Travel History and Risk |
|
|
88 | (1) |
|
|
89 | (1) |
|
4.7 Discussion and Conclusion |
|
|
90 | (3) |
|
|
91 | (2) |
|
5 Country by Country Analysis |
|
|
93 | (200) |
|
|
94 | (4) |
|
|
98 | (5) |
|
|
103 | (6) |
|
|
109 | (2) |
|
|
111 | (7) |
|
|
118 | (4) |
|
|
122 | (4) |
|
|
126 | (5) |
|
|
131 | (4) |
|
|
135 | (5) |
|
|
140 | (4) |
|
|
144 | (6) |
|
|
150 | (3) |
|
|
153 | (5) |
|
|
158 | (3) |
|
|
161 | (5) |
|
|
166 | (5) |
|
|
171 | (4) |
|
|
175 | (5) |
|
|
180 | (4) |
|
|
184 | (6) |
|
|
190 | (4) |
|
|
194 | (3) |
|
|
197 | (5) |
|
|
202 | (4) |
|
|
206 | (5) |
|
|
211 | (4) |
|
|
215 | (5) |
|
|
220 | (4) |
|
|
224 | (3) |
|
|
227 | (5) |
|
|
232 | (6) |
|
|
238 | (3) |
|
|
241 | (5) |
|
|
246 | (4) |
|
|
250 | (4) |
|
|
254 | (3) |
|
|
257 | (5) |
|
|
262 | (4) |
|
|
266 | (4) |
|
|
270 | (4) |
|
5.42 United Arab Emirates |
|
|
274 | (4) |
|
|
278 | (5) |
|
|
283 | (10) |
|
|
288 | (5) |
Index |
|
293 | |