Economics of Cybersecurity: Users and Attackers | TU Delft Online (2024)

About this online course

Overview

Are humans the weakest link in cybersecurity? Using an economics perspective, this course will give you the latest insights into the behavior of users, and how they and their criminal adversaries fit into larger systems, so that you can design the best responses to guard against your most critical risks.

Many organizational security breaches can be traced back to the actions of individuals. These may include systems not being patched, malicious attachments being opened, credentials being entered into phishing sites. So the security of organizations critically depends on the security behaviors of their users. This insight is often summarized as the “humans are the weakest link”.

But this widely held view is both incorrect and unproductive. Organizations often misunderstand the reasons why their users are not complying with security policies. Security comes with costs, and human users of security protocols experience costs of their own. These may be time, effort and switching between security and other tasks. With a multitude of other pressures, it is understandable that individuals will sometimes ignore security advice.

The first part of this course provides you with an understanding of user behavior informed by a wealth of empirical research in security economics. This will help professionals in IT, consulting and security in designing better policies to safeguard the security of organizations. It will also support professionals working on broader policies to protect and empower home users to improve their security.

The second part of the course shifts the focus from the defenders to the attackers. What threat actors do organizations face? Here, we bring together the latest insights from research into attacker economics. What are the categories of cybercriminals? How do they operate? How effective are interventions to disrupt criminal marketplaces? These insights will help professionals doing risk assessment and threat analysis, as well as law enforcement professionals designing interventions against criminal actors.

In short the course will provide you with insights and practical measures to design effective policies to mitigate the most critical risks.

What You'll Learn

After completion of the course, participants should be in a position to:

  1. Explain a variety of security behaviors of individuals
  2. Design policies and interventions that are based on a full understanding of user behavior
  3. Explain a variety of attacker behaviors
  4. Design policies and interventions that are based on a true understanding of attacker behavior

Details

Course Syllabus

Week 1:
In this week we will introduce the comprehensive human aspects of security and privacy within complex computer systems.
Topics covered this week:

  • Introduction to user research
  • Analyzing users’ security behavior in organizations
  • Exploring security considerations for home users

Week 2:
The focus of this week will be on broader aspects of human decision-making in the context of digital security and privacy.
Topics covered this week:

  • Exploring the choices users make when interacting with security systems
  • Analyzing the different privacy considerations users are faced with

Week 3:
This week we will conclude the section analyzing users by looking into the costs and interventions associated with cybersecurity and privacy at the user level.
Topics covered this week:

  • Factors that influence security and privacy behaviors
  • Analysis of security and privacy interventions

Week 4:
In this week we will introduce key concepts of cybercrime, examining the diverse range of offenders, their motivations, and the theoretical frameworks that explain their behaviors.
Topics covered in this week:

  • Different types of criminal actors
  • Key theoretical approaches influencing cybercrime
  • Addressing the myth of cybercrime’s sophistication
  • Exploring the cybercrime markets

Week 5:
This week we will focus on the evolving landscape of cybercrime by exploring its commoditization, resources and the services that drive this illicit industry.
Topics covered in this week:

  • The concept of cybercrime as a service
  • Approaches to measuring threat
  • Measuring cybercrime infrastructure
  • The ethics of using stolen and scraped data

Week 6:
In the final week we will investigate the different approaches used to combat cybercrime, focusing both on offender perspective as well as enforcement strategies.
Topics covered this week:

  • Analysis of the methodologies used for interviewing cybercrime perpetrators
  • Law enforcement interventions
  • The Budapest convention
  • Investigation of the measures taken to prevent cybercrime

Qualifications

Certificates

If you successfully complete this course you will earn a professional education certificate and you are eligible to receive 2.5Continuing Education Units (CEUs).

Economics of Cybersecurity: Users and Attackers | TU Delft Online (1)View sample certificateEconomics of Cybersecurity: Users and Attackers | TU Delft Online (2)

Admission

This course is primarily geared towards working professionals.

Prerequisites:

Participants are encouraged to combine this course with the course “Economics of Cybersecurity: Foundations and Measurements” and “Economics of Cybersecurity: Solutions”.

Contact

If you have any questions about this course or the TU Delft online learning environment, please visit ourpage.

Enroll now Enroll with STAP

Start your Enrollment

  • Start date
    Jan 08, 2025
  • Course Fee
    € 1050.00

NEXT STEPS:
1) Make your payment through credit card, PayPal, iDeal or bank transfer
2) You will be given access to the course shortly before start date

Continue

Cancel

Start your Enrollment with STAP

  • Start date
    Jan 08, 2025
  • Course Fee
    €1050.00 €0

Warning

Please only continue when applying with STAP budget. For more information see our STAP page.

If you are not applying with STAP budget, please click the CANCEL button and enroll again by clicking the ENROLL NOW button.

NEXT STEPS:
1) You will receive a STAP Aanmeldbewijs (registration certificate) via email. For further instructions read this email carefully.
2) If eligible, you will be given access to the course shortly before start date.

Continue

Cancel

  • Create Account

    Login

Note: if you do not have an account, first create one. You will receive a confirmation email with a link to activate it.
After clicking the activation link, click the Start Admission/Enroll button on the course page to continue your enrollment.

  • Starts: Jan 08, 2025
  • Fee: €1050
  • Group fee: contact us
  • Enrollment open until: Jan 01, 2025
  • Length: 6 weeks
  • Effort: 4 - 6 hours per week

Show all details

Related courses and programs

Learn moreEconomics of Cybersecurity: Foundation and MeasurementLearn why cybersecurity failures occur and recur in your organization and how to remediate them. Identify the economic …PE6 weeksno logic Oct 02, 2024
Learn moreEconomics of Cybersecurity: SolutionsCybersecurity breaches are the outcome of bad incentives. This course teaches you how to think about rational security …PE6 weeksno logic Mar 05, 2025
Learn moreCybersecurity for Managers and Executives: Taking the LeadThis course will equip you with the framework, vocabulary and understanding of cyber risks, and will give you the confi…PE5 weeksno logic Future dates to be announced
Economics of Cybersecurity: Users and Attackers | TU Delft Online (2024)
Top Articles
2020 Honda CR-V for sale - Irvine, CA - craigslist
2017 Honda CR-V for sale - Baltimore, MD - craigslist
Spasa Parish
Rentals for rent in Maastricht
159R Bus Schedule Pdf
Sallisaw Bin Store
Black Adam Showtimes Near Maya Cinemas Delano
Espn Transfer Portal Basketball
Pollen Levels Richmond
11 Best Sites Like The Chive For Funny Pictures and Memes
Things to do in Wichita Falls on weekends 12-15 September
Craigslist Pets Huntsville Alabama
Paulette Goddard | American Actress, Modern Times, Charlie Chaplin
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
What's the Difference Between Halal and Haram Meat & Food?
R/Skinwalker
Rugged Gentleman Barber Shop Martinsburg Wv
Jennifer Lenzini Leaving Ktiv
Justified - Streams, Episodenguide und News zur Serie
Epay. Medstarhealth.org
Olde Kegg Bar & Grill Portage Menu
Cubilabras
Half Inning In Which The Home Team Bats Crossword
Amazing Lash Bay Colony
Juego Friv Poki
Dirt Devil Ud70181 Parts Diagram
Truist Bank Open Saturday
Water Leaks in Your Car When It Rains? Common Causes & Fixes
What’s Closing at Disney World? A Complete Guide
New from Simply So Good - Cherry Apricot Slab Pie
Fungal Symbiote Terraria
modelo julia - PLAYBOARD
Poker News Views Gossip
Abby's Caribbean Cafe
Joanna Gaines Reveals Who Bought the 'Fixer Upper' Lake House and Her Favorite Features of the Milestone Project
Tri-State Dog Racing Results
Navy Qrs Supervisor Answers
Trade Chart Dave Richard
Lincoln Financial Field Section 110
Free Stuff Craigslist Roanoke Va
Wi Dept Of Regulation & Licensing
Pick N Pull Near Me [Locator Map + Guide + FAQ]
Crystal Westbrooks Nipple
Ice Hockey Dboard
Über 60 Prozent Rabatt auf E-Bikes: Aldi reduziert sämtliche Pedelecs stark im Preis - nur noch für kurze Zeit
Wie blocke ich einen Bot aus Boardman/USA - sellerforum.de
Infinity Pool Showtimes Near Maya Cinemas Bakersfield
Dermpathdiagnostics Com Pay Invoice
How To Use Price Chopper Points At Quiktrip
Maria Butina Bikini
Busted Newspaper Zapata Tx
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 6796

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.