Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem
Schibsted Media Group.ORCID iD: 0009-0008-2442-4058
Försvarshögskolan, Militärtekniska avdelningen (MTA).ORCID iD: 0000-0002-4376-9800
2016 (English)In: The 30th International Conference on Information Networking: ICOIN 2016, IEEE , 2016, p. 1-6, article id 15837791Conference paper, Published paper (Refereed)
Abstract [en]

Hypertext Transfer Protocol Secure (HTTPS) is the de facto standard for secure end-to-end web communication. However, numerous flaws discovered during recent years, such as Apple’s “goto fail” bug, and cryptographic weaknesses as illustrated by the Poodlebleed vulnerability, have brought the efficiency of the mostly self-regulated web security market into question. In this cross-disciplinary paper, the authors survey some 160.000 HTTPS-enabled servers among popular web sites over a time period of three years. The research question is what effect the introduction of best practices and vulnerability publication have on web server security in the form of protocol support. Main findings include that (i) insecure configurations, although well known, can remain widespread for over a decade, (ii) the introduction of best practices affect the decline of insecure configurations only moderately, whereas highly publicized security flaws have a significant impact, and (iii) economic incentives for website owners to provide secure services are weak, motivating such other levers of influence as legislation or blocking of noncompliant sites.

Place, publisher, year, edition, pages
IEEE , 2016. p. 1-6, article id 15837791
Series
International Conference on Information Networking, ISSN 1976-7684
Keywords [en]
Internet governance, network security, security economics, HTTPS
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
URN: urn:nbn:se:kau:diva-103867DOI: 10.1109/ICOIN.2016.7427064Scopus ID: 2-s2.0-84963973909Libris ID: 19859055ISBN: 9781509017256 (print)ISBN: 9781509017249 (electronic)OAI: oai:DiVA.org:kau-103867DiVA, id: diva2:1950440
Conference
30th International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, January 13-15, 2016
Available from: 2017-04-24 Created: 2025-04-07 Last updated: 2025-04-08
In thesis
1. Expanding the view on Offensive Cyber Operations
Open this publication in new window or tab >>Expanding the view on Offensive Cyber Operations
2025 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Society relies upon the internet, a globally interconnected collection of networked information systems. These systems are imperfectly designed and implemented with critical flaws and vulnerabilities. Criminal hackers attack these shortcomings for financial gains, but there are also compelling reasons for states and state-sponsored groups to act in and through cyberspace. While state-sponsored cyberattacks can be both permissible and effective, they commonly have unintended effects: cyber collateral damage. 

Most offensive cyber operations are conducted below the threshold of force recognized in international law and do not qualify for a military response. This means that they can be used both for clandestine sabotage, for intelligence gathering, and to implant vulnerabilities in preparation for larger-scale attacks in the future. These activities have caused considerable harm beyond their intended targets. Such collateral effects have been seen in some of the most infamous and costly cyberattacks, such as the 2010 Stuxnet attack, the 2017 NotPetya attack, and the 2022 attack on ViaSat as part of the invasion of Ukraine.

An under-investigated metric when analyzing the impact of cyber op-erations is their economic cost, both in terms of production and (es-pecially) in their collateral cost to society. The economic cost is also subject to considerable externalization in the planning of cyber operations. This thesis thus investigates the balance between the op-erational effects of cyber operations and their collateral costs; the cost/benefit dilemma of offensive cyber operations. It does so by con-sidering the potential benefit of high-impact cyberattacks, e.g. supply chain vulnerability implantation against hardened targets, and by us-ing econometric methods to calculate the cost of collateral damage engendered when cyberspace is used as a domain of warfare. In doing so, it provides the first quantitative comparison of military utility to civilian harm in a cyber context. Although cyberattacks have long been considered a central component in asymmetric warfare, the the-sis presents a bottom-up analysis which shows that the economic damage caused by cyberattacks in the Russo-Ukrainian conflict 2014-2021 is an insignificant part of the Ukrainian GDP.

Finally, the thesis argues that the full cost of attacks should be meas-ured and included in models for collateral damage estimation. Such estimates should be included into national cyber doctrines to mini-mize unintended effects and ensure efficient and appropriate use of cyber capabilities.

Abstract [en]

Society relies upon the internet, a globally interconnected collection of networked information systems. These systems often contain critical vulnerabilities, giving states and state-sponsored groups compelling reasons to act in and through cyberspace. While state-sponsored cyberattacks can be both permissible and effective, they commonly have unintended effects: cyber collateral damage.  This thesis investigates the balance between the operational effects of cyber operations and their collateral costs; the cost/benefit dilemma of offensive cyber operations. It does so by considering the potential benefit of high-impact cyberattacks, e.g. supply chain vulnerability implantation, and by using econometric methods to calculate the cost of collateral damage engendered when cyberspace is used as a domain of warfare. The thesis further presents a bottom-up analysis which shows that the economic damage caused by cyberattacks in the Russo-Ukrainian conflict 2014-2021 to be an insignificant part of the Ukrainian GDP. Finally, the thesis argues that the full cost of attacks should be measured and included in models for collateral damage estimation. Such estimates should be included into national cyber doctrines to minimize unintended effects and ensure efficient and appropriate use of cyber capabilities.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2025. p. 35
Series
Karlstad University Studies, ISSN 1403-8099 ; 2025:20
Keywords
Cybersecurity, cyber warfare, collateral damage, structured literature review, applied econometrics
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-103876 (URN)10.59217/bdrf5749 (DOI)978-91-7867-572-2 (ISBN)978-91-7867-573-9 (ISBN)
Presentation
2025-06-02, Sjöström 1E309, Universitetsvägen 2, Karlstad, 13:00 (English)
Opponent
Supervisors
Funder
Knowledge Foundation, 20220129-H-01
Available from: 2025-04-30 Created: 2025-04-08 Last updated: 2025-04-30Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Larsson, EmilSigholm, Johan

Search in DiVA

By author/editor
Larsson, EmilSigholm, Johan
Information Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 4 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf