P325 - Open Identity Summit 2022
Permanent URI for this collectionhttps://dl.gi.de/handle/20.500.12116/38695
Authors with most Documents
Browse
2 results
Search Results
Conference Paper Risk variance: Towards a definition of varying outcomes of IT security risk assessment(Gesellschaft für Informatik e.V., 2022) Kurowski, Sebastian; Schunck, Christian H.; Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, SebastianAssessing IT-security risks in order to achieve adequate and efficient protection measures has become the core idea of various industry practices and regulatory frameworks in the last five years. Some research however suggests that the practice of assessing IT security risks may be subject to varying outcomes depending on personal, situational and contextual factors. In this contribution we first provide a definition of risk variance as the variation of risk assessment outcomes due to individual traits, the processual environment, the domain of the assessor, and possibly the target of the assessed risk. We then present the outcome of an interview series with 9 decision makers from different companies that aimed at discussing whether risk variance is an issue in their risk assessment procedures. Finally, we elaborate on the generalizability of the concept of risk variance, despite the low sample size in light of varying risk assessment procedures discussed in the interviews. We find that risk variance could be a general problem of current risk assessment procedures.Conference Paper Adversary Tactics and Techniques specific to Cryptocurrency Scams(Gesellschaft für Informatik e.V., 2022) Horch, Andrea; Schunck, Christian H.; Ruff, Christopher; Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, SebastianAt the end of the year 2020, there was a steep uptrend of the cryptocurrency market. The global market capitalization of cryptocurrencies climbed from 350 billion US$ in October 2020 to almost 2.5 trillion US$ in May 2021 and reached 3 trillion US$ in November 2021. Currently, there are more than 17,600 cryptocurrencies listed on CoinMarketCap. The ample amount of money within the market attracts investors as well as scammers and hackers. Recent incidents like the BadgerDAO hack have shown how easy it is to steal cryptocurrencies. While all the standard scamming and hacking techniques such as identity theft, social engineering and web application hacking are successfully employed by attackers, new scams very specific to cryptocurrencies emerged, which are the focus of this paper.
Load citations