LEADER 00976nam0-2200337---450- 001 990009328000403321 005 20110309142908.0 010 $a978-0-230-24120-6 035 $a000932800 035 $aFED01000932800 035 $a(Aleph)000932800FED01 035 $a000932800 100 $a20110309d2010----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa-------001yy 200 1 $aGlobal political economy$eevolution and dynamica$fRobert O'Brien and Marc Williams 205 $a3. ed 210 $aBasingstoke$cPalgrave Macmillan$d2010 215 $axx, 523 p.$d25 cm 610 0 $aRelazioni economiche internazionali 676 $a337.09$v21$zita 700 1$aO'Brien,$bRobert$f<1963- >$0510364 701 1$aWilliams,$bMarc$0510365 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a990009328000403321 952 $aVI M 137$b46314$fFSPBC 959 $aFSPBC 996 $aGlobal political economy$9766124 997 $aUNINA LEADER 03707nam 2200613 450 001 9910220142803321 005 20200520144314.0 010 $a0-8330-9103-4 035 $a(CKB)3710000000435535 035 $a(EBL)2075897 035 $a(SSID)ssj0001529701 035 $a(PQKBManifestationID)12619571 035 $a(PQKBTitleCode)TC0001529701 035 $a(PQKBWorkID)11523980 035 $a(PQKB)10983332 035 $a(Au-PeEL)EBL2075897 035 $a(CaPaEBR)ebr11068409 035 $a(OCoLC)912237900 035 $a(MiAaPQ)EBC2075897 035 $a(EXLCZ)993710000000435535 100 $a20150706h20152015 uy| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe defender?s dilemma $echarting a course toward cybersecurity /$fMartin C. Libicki, Lillian Ablon, Tim Webb 210 1$aSanta Monica, California :$cRAND Corporation,$d[2015] 210 4$dİ2015 215 $a1 online resource (162 p.) 300 $aDescription based upon print version of record. 311 $a0-8330-8911-0 320 $aIncludes bibliographical references. 327 $aCover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up 327 $aThe Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets 327 $aSome Conclusions Chapter Five: A Heuristic Cyber security Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography 330 $aCyber security is a constant, and, by all accounts growing, challenge. This report, the second in a multi-phase study on the future of cyber security, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. 606 $aCyberterrorism$xPrevention 606 $aComputer networks$xSecurity measures 606 $aComputer security 615 0$aCyberterrorism$xPrevention. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a005.8 700 $aLibicki$b Martin C.$0877014 702 $aAblon$b Lillian 702 $aWebb$b Tim$c(Children's story adapter), 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910220142803321 996 $aThe defender?s dilemma$92455058 997 $aUNINA