Consumer attitudes toward data breach notifications and loss of personal information / / Lillian Ablon [and three others] |
Autore | Ablon Lillian |
Pubbl/distr/stampa | Santa Monica, California : , : RAND, , 2016 |
Descrizione fisica | 1 online resource (79 p.) |
Disciplina | 381.340973 |
Soggetto topico |
Consumer protection - United States
Consumers - United States - Attitudes Disclosure of information - United States |
ISBN | 0-8330-9494-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Title Page; Copyright; Contents; Preface; Figures and Tables; Summary; Acknowledgments; CHAPTER ONE: Introduction; The Purpose of This Study; The Survey; CHAPTER TWO: Survey Results; Frequency of Data Breach Notifications; How Respondents Learned of a Breach; Types of Data Compromised; Consumer Responses to the Breach; Consumer Costs of Dealing with a Data Breach; Consumer Satisfaction with Company Response to the Breach; CHAPTER THREE: Conclusions and Implications; Can a Federal Breach Disclosure Law Help?; APPENDIXES; A. Survey Instrument; B. Supporting Tables and Charts; References |
Record Nr. | UNINA-9910219966703321 |
Ablon Lillian | ||
Santa Monica, California : , : RAND, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor |
Autore | Andress Jason |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xvii, 306 pages) : illustrations (some color) |
Disciplina | 355.3/43 |
Collana | Gale eBooks |
Soggetto topico |
Information warfare
Computer networks - Security measures |
ISBN | 0-12-416633-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. |
Record Nr. | UNINA-9910790539503321 |
Andress Jason | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor |
Autore | Andress Jason |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xvii, 306 pages) : illustrations (some color) |
Disciplina | 355.3/43 |
Collana | Gale eBooks |
Soggetto topico |
Information warfare
Computer networks - Security measures |
ISBN | 0-12-416633-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. |
Record Nr. | UNINA-9910821491503321 |
Andress Jason | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber warfare : techniques, tactics and tools for security practitioners |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts, : Syngress, an imprint of Elsevier, [2014] |
Descrizione fisica | 1 online resource (325 p.) |
Altri autori (Persone) |
WinterfeldSteve
AblonLillian AndressJason |
Soggetto topico |
Information warfare
Computer networks - Security measures Cyberkrig |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-416633-4 |
Classificazione | 355.02 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. |
Record Nr. | UNINA-9910453152003321 |
Waltham, Massachusetts, : Syngress, an imprint of Elsevier, [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The defendeŕs dilemma : charting a course toward cybersecurity / / Martin C. Libicki, Lillian Ablon, Tim Webb |
Autore | Libicki Martin C. |
Pubbl/distr/stampa | Santa Monica, California : , : RAND Corporation, , [2015] |
Descrizione fisica | 1 online resource (162 p.) |
Disciplina | 005.8 |
Soggetto topico |
Cyberterrorism - Prevention
Computer networks - Security measures Computer security |
ISBN | 0-8330-9103-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up
The Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets Some Conclusions Chapter Five: A Heuristic Cyber security Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography |
Record Nr. | UNINA-9910220142803321 |
Libicki Martin C. | ||
Santa Monica, California : , : RAND Corporation, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|