Show simple item record

dc.contributor.advisorNancy G. Leveson.en_US
dc.contributor.authorZipkin, David Sen_US
dc.contributor.otherMassachusetts Institute of Technology. Technology and Policy Program.en_US
dc.date.accessioned2006-03-29T18:30:43Z
dc.date.available2006-03-29T18:30:43Z
dc.date.copyright2005en_US
dc.date.issued2005en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/32285
dc.descriptionThesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2005.en_US
dc.descriptionIncludes bibliographical references.en_US
dc.description.abstractMy advisor, Professor Leveson has developed an accident modeling framework called STAMP (Systems Theoretic Accident Modeling and Processes.) Traditional accident models typically focus on component failure; in contrast, STAMP includes interactions between components as well as social, economic, and legal factors. My research extends Leveson's STAMP accident model and applies it to a security problem. I have chosen to investigate the threat posed by malicious computer software such as computer viruses. The problem is especially interesting because surrounding the technical aspects of malicious software is a rich socio-technical system. The first part of the thesis investigates two recent computer worm outbreaks and identifies the numerous ways in which the security system failed. For both outbreaks, there were multiple points of failure including the existence of un-patched workstations, software organizations that distributed insecure software, the lack of sufficient legal disincentives to dissuade hackers, as well as many others. The thesis goes on to examine why the system was operating in such an insecure manner. As is generally the case when modeling an accident, the explanation goes beyond any single factor. I argue that that lack of Internet security can be largely attributed to the fact that those providing critical parts of Internet security do not have sufficient incentives to make good security decisions; instead they often make decisions at odds with Internet security. The thesis concludes with a discussion of policy and technical recommendations for addressing computer security.en_US
dc.description.statementofresponsibilityby David S. Zipkin.en_US
dc.format.extent117 p.en_US
dc.format.extent6186103 bytes
dc.format.extent6193215 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582
dc.subjectTechnology and Policy Program.en_US
dc.titleUsing STAMP to understand recent increases in malicious software activityen_US
dc.title.alternativeUsing Systems Theoretic Accident Modeling and Processes to understand recent increases in malicious software activityen_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering Systems Division
dc.contributor.departmentTechnology and Policy Program
dc.identifier.oclc61325851en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record