Questions tagged [statistics]

28 questions
138
votes
8 answers

Are "man in the middle" attacks extremely rare?

In "Some thoughts on the iPhone contact list controversy and app security", cdixon blog Chris Dixon makes a statement about web security Many commentators have suggested that a primary security risk is the fact that the data is transmitted in plain…
Jeff Atwood
  • 4,542
  • 6
  • 25
  • 29
20
votes
2 answers

What statistics can be used to identify pseudorandom data?

I'm working on some code that attempts to identify files whose contents appear to be "random". As such, I'm looking for statistical measures that can be used to identify such randomness. I've implemented the following so far: Shannon entropy of the…
Polynomial
  • 132,208
  • 43
  • 298
  • 379
14
votes
2 answers

How many passwords does the average user know?

Looking for research on the count and complexity of passwords that an average user is actively using. Note: Also, just to be clear, by research, this is not a request for you to respond with an answer entirely based on opinions, rather than facts,…
blunders
  • 5,052
  • 4
  • 28
  • 45
14
votes
5 answers

Where can I find statistics on security breaches?

I am putting together a security presentation, and I would like statistics on the occurrence of and damages from security breaches. Does anyone know of a reliable, recently-updated source?
Sean W.
  • 835
  • 4
  • 14
10
votes
2 answers

Average number of exploitable bugs per thousand lines of code?

Over the years I've heard various estimates for the average number of exploitable bugs per thousand lines of code, a common figure being one exploitable bug per thousand lines of code. A Google search gives some much lower figures like 0.020 and…
David Wachtfogel
  • 5,512
  • 21
  • 35
7
votes
4 answers

What are the most common infection vectors for personal computers?

We have OWASP to tell us about common security vulnerabilities in webapps and such, but what are the most common infection vectors for personal computers? A few example vectors: Social engineering (trojans) Browser exploits Document / application…
Polynomial
  • 132,208
  • 43
  • 298
  • 379
7
votes
2 answers

What fraction of vulnerabilities does black-box pentesting find?

Black-box penetration testing is one to check a web application for vulnerabilities. It can find some vulnerabilities, but not all. What fraction of vulnerabilities does black-box pentesting find, on average? Is anyone aware of any data or…
D.W.
  • 98,420
  • 30
  • 267
  • 572
5
votes
4 answers

How to check for duplicate passwords?

Is it possible to check if a given number of people are using the same password, without risking anyone's password getting out? I heard that Google does this, not allowing the user to set a password 1000 people are using. What if users have access…
Behrooz
  • 191
  • 1
  • 7
5
votes
2 answers

Average time before a malware gets detected in the world

I am actually working on a scolar presentation about Careto malware. I was really impressed by the time it took to discover it (at least 6 years, according to some compilation stamps), so to improve my presentation I am looking for statistics about…
5
votes
3 answers

What fraction of web sites are vulnerable?

It is known that security vulnerabilities are common on the web: many web sites are vulnerable. Is there any data on what fraction of web sites are vulnerable, and what fraction are secure?
D.W.
  • 98,420
  • 30
  • 267
  • 572
4
votes
2 answers

What are the most common username-based password patterns?

I know that there are some common passwords like hunter6 or Password. These are very insecure since everybody knows to try them first. It is commonly thought that passwords derived from the username alone are also insecure. For instance, setting the…
Superbest
  • 1,094
  • 8
  • 20
4
votes
2 answers

Is there a benefit in measuring randomness? How would it be done?

Is there any benefit in determining how random a given file, stream, signal is? I guess this would be useful to determine If something is (poorly) encrypted To verify the proper encryption of a file, data (GCM, SALSA20, or unknown cipher) To…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
3
votes
1 answer

How to evaluate the security level of session ID generation?

For a few weeks we observed a collision in session ID generation, resulting in two operators independently connected to a test web application sharing the same session. We investigated the issue and exercised the session ID generation to generate…
3
votes
1 answer

How to identify call stats about 2/3/4G users in a room?

If someone can please provide some advice about the following problem I am trying to solve it will be great. Scenario: A standard office room, with (say) a couple of people in it What I want to find: (1) How many cell phones are in the room (2) What…
abby
  • 31
  • 3
3
votes
1 answer

What percent of publicly posted databases implemented password security?

I am trying to get some statistics on databases that were a part of data breaches, namely, I would like to be able to find out what percentages of publicly posted databases (from a data breach) had passwords stored in plain text form, hashed, salted…
leomercury
  • 33
  • 3
1
2