My Account Log in

7 options

The defendeŕs dilemma : charting a course toward cybersecurity / Martin C. Libicki, Lillian Ablon, Tim Webb.

DOAB Directory of Open Access Books Available online

View online

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost Ebook Public Library Collection - North America Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

JSTOR Books Open Access Available online

View online

RAND Reports Available online

View online
Format:
Book
Author/Creator:
Libicki, Martin C., author.
Ablon, Lillian, author.
Webb, Tim (Children's story adapter), author.
Language:
English
Subjects (All):
Cyberterrorism--Prevention.
Cyberterrorism.
Computer networks--Security measures.
Computer networks.
Computer security.
Physical Description:
1 online resource (162 p.)
Edition:
1st ed.
Place of Publication:
RAND Corporation 2015
Santa Monica, California : RAND Corporation, [2015]
Language Note:
English
Summary:
Cyber security is a constant, and, by all accounts growing, challenge. This report, the second in a multi-phase study on the future of cyber security, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
Contents:
Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up
The Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets
Some Conclusions Chapter Five: A Heuristic Cyber security Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography
Notes:
Description based upon print version of record.
Includes bibliographical references.
Description based on online resource; title from PDF title page (ebrary, viewed July 7, 2015).
ISBN:
0-8330-9103-4
OCLC:
912237900

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account