iTnews
  • Home
  • News
  • Technology
  • Security

Poor countries suffer more from malware: report

By Joshua Gliddon on Feb 8, 2013 11:01AM
Poor countries suffer more from malware: report

Membership of security groups indicates good cybersecurity performance.

A new Microsoft report has found a strong correlation between levels of economic development and the security of information infrastructure.

The report, Linking Cybersecurity Policy and Performance (pdf), was authored by Microsoft’s Global and Security Strategy and Diplomacy (GSSD) team.

The reports' authors use statistical analysis based on the number of times the company’s Malicious Software Removal Tool – distributed to Windows users via Microsoft Update – was run, and the number of malicious applications it cleared.

The paper comes up with a metric it dubs CCM to measure the level of exposure to cyber security risk. The paper outlines the statistical calculations used to arrive at its conclusions.

According to the authors, the MSRT tool is run around 600 million times per month, providing a strong statistical basis for drawing conclusions about malware infections.

“This represents a large proportion of the global personal computer install base, making the results a reasonable proxy for overall cybersecurity levels,” they wrote.

The paper indicates there are strong correlations between countries adopting measures such as international treaties like the Council of Europe Convention on Cybercrime and voluntary codes of conduct like the London Action Plan, and the levels of malware infection.

The authors, however, are careful to point out the statistical tools used are imperfect. The measurement index they adopted, called CCM, does not measure and report important cybersecurity outcomes, including actual damage caused by infections, they wrote. 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
developmenteconomicmalwaremicrosoftsecurity

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Joshua Gliddon
Feb 8 2013
11:01AM
0 Comments

Related Articles

  • Microsoft observes destructive malware in Ukraine govt agency systems
  • Don't remove PowerShell: US, UK and NZ security agencies
  • Microsoft patched Azure bugs without notifying users, Tenable claims
  • Microsoft patches exploited 'Follina' remote code exec bug
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.