Vai al contenuto principale della pagina
Autore: | Libicki Martin C. |
Titolo: | The defendeŕs dilemma : charting a course toward cybersecurity / / Martin C. Libicki, Lillian Ablon, Tim Webb |
Pubblicazione: | Santa Monica, California : , : RAND Corporation, , [2015] |
©2015 | |
Descrizione fisica: | 1 online resource (162 p.) |
Disciplina: | 005.8 |
Soggetto topico: | Cyberterrorism - Prevention |
Computer networks - Security measures | |
Computer security | |
Persona (resp. second.): | AblonLillian |
WebbTim (Children's story adapter) | |
Note generali: | Description based upon print version of record. |
Nota di bibliografia: | Includes bibliographical references. |
Nota di contenuto: | Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up |
The Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets | |
Some Conclusions Chapter Five: A Heuristic Cyber security Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography | |
Sommario/riassunto: | Cyber security is a constant, and, by all accounts growing, challenge. This report, the second in a multi-phase study on the future of cyber security, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. |
Titolo autorizzato: | The defendeŕs dilemma |
ISBN: | 0-8330-9103-4 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910220142803321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |