03707nam 2200613 450 991022014280332120200520144314.00-8330-9103-4(CKB)3710000000435535(EBL)2075897(SSID)ssj0001529701(PQKBManifestationID)12619571(PQKBTitleCode)TC0001529701(PQKBWorkID)11523980(PQKB)10983332(Au-PeEL)EBL2075897(CaPaEBR)ebr11068409(OCoLC)912237900(MiAaPQ)EBC2075897(EXLCZ)99371000000043553520150706h20152015 uy| 0engurcnu||||||||txtccrThe defendeŕs dilemma charting a course toward cybersecurity /Martin C. Libicki, Lillian Ablon, Tim WebbSanta Monica, California :RAND Corporation,[2015]©20151 online resource (162 p.)Description based upon print version of record.0-8330-8911-0 Includes bibliographical references.Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped UpThe Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) GadgetsSome Conclusions Chapter Five: A Heuristic Cyber security Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; BibliographyCyber security is a constant, and, by all accounts growing, challenge. This report, the second in a multi-phase study on the future of cyber security, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.CyberterrorismPreventionComputer networksSecurity measuresComputer securityCyberterrorismPrevention.Computer networksSecurity measures.Computer security.005.8Libicki Martin C.877014Ablon LillianWebb Tim(Children's story adapter),MiAaPQMiAaPQMiAaPQBOOK9910220142803321The defendeŕs dilemma2455058UNINA