Vai al contenuto principale della pagina
| Autore: |
Libicki Martin C.
|
| Titolo: |
The defendeŕs dilemma : charting a course toward cybersecurity / / Martin C. Libicki, Lillian Ablon, Tim Webb
|
| Pubblicazione: | Santa Monica, California : , : RAND Corporation, , [2015] |
| ©2015 | |
| Descrizione fisica: | 1 online resource (162 p.) |
| Disciplina: | 005.8 |
| Soggetto topico: | Cyberterrorism - Prevention |
| Computer networks - Security measures | |
| Computer security | |
| Persona (resp. second.): | AblonLillian |
| WebbTim (Children's story adapter) | |
| Note generali: | Description based upon print version of record. |
| Nota di bibliografia: | Includes bibliographical references. |
| Nota di contenuto: | Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up |
| The Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets | |
| Some Conclusions Chapter Five: A Heuristic Cyber security Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography | |
| Sommario/riassunto: | Cyber security is a constant, and, by all accounts growing, challenge. This report, the second in a multi-phase study on the future of cyber security, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. |
| Titolo autorizzato: | The defendeŕs dilemma ![]() |
| ISBN: | 0-8330-9103-4 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910220142803321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |