Cargando…

The defender's dilemma : charting a course toward cybersecurity /

Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Libicki, Martin C. (Autor), Ablon, Lillian (Autor), Webb, Tim (Engineer) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, CA : RAND, 2015.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000001i 4500
001 EBOOKCENTRAL_ocn912237900
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 150817s2015 cau ob 000 0 eng
010 |a  2015032164 
040 |a DLC  |b eng  |e rda  |c DLC  |d TXQ  |d Q2U  |d OCLCF  |d OCLCQ  |d OCLCO  |d UEJ 
019 |a 915083836  |a 961529891  |a 1008950452  |a 1055345385  |a 1066460801  |a 1081269973  |a 1115072776  |a 1228530468  |a 1339841796  |a 1401733746 
020 |a 9780833091017  |q (epub) 
020 |a 0833091018 
020 |a 9780833091024  |q (prc) 
020 |a 0833091026 
020 |a 9780833091031  |q ( ebook pdf) 
020 |a 0833091034 
020 |z 9780833089113 (pbk. : alk. paper) 
029 1 |a GBVCP  |b 100866426X 
029 1 |a DEBSZ  |b 472868527 
029 1 |a DEBBG  |b BV043785998 
029 1 |a DEBBG  |b BV043620941 
029 1 |a AU@  |b 000055163601 
035 |a (OCoLC)912237900  |z (OCoLC)915083836  |z (OCoLC)961529891  |z (OCoLC)1008950452  |z (OCoLC)1055345385  |z (OCoLC)1066460801  |z (OCoLC)1081269973  |z (OCoLC)1115072776  |z (OCoLC)1228530468  |z (OCoLC)1339841796  |z (OCoLC)1401733746 
042 |a pcc 
043 |a n-us--- 
050 1 0 |a TK5105.59 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Libicki, Martin C.,  |e author. 
245 1 4 |a The defender's dilemma :  |b charting a course toward cybersecurity /  |c Martin C. Libicki, Lillian Ablon, Tim Webb. 
264 1 |a Santa Monica, CA :  |b RAND,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b n  |2 rdamedia 
338 |a online resource  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 |a Description based on print version record and CIP data provided by publisher. 
505 0 |a Introduction. -- Chief information security officers surveyed. -- The efficacy of security systems. -- Improving software. -- A heuristic cybersecurity model. -- Lessons for organizations and public policy. -- Appendixes. -- Bibliography. 
505 0 |a Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction; Organization of This Report; Chapter Two: Chief Information Security Officers Surveyed; Common Knowledge Confirmed; Reasonable Suppositions Validated; Surprises; Some Conclusions; Chapter Three: The Efficacy of Security Systems; Measures and Countermeasures to Mitigate the Likelihood of an Attack; Attackers and Defenders Often Employ the Same Tools and Techniques; Security Product Development Has Sped Up. 
505 8 |a The Shift from Signature-Only to Behavior-Based Detection Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates; Measures and Countermeasures Developed to Mitigate the Impact of an Attack; Human Element Continues to Be a Great Weakness; A Cycle of Market Offerings; Ideal Solutions Can Depend on the Size of an Organization; Some Conclusions; Chapter Four: Improving Software; When Vulnerabilities Matter; Markets for Zero-Days; In the Short Run, Vulnerability Discovery Might Worsen Matters; Can Software Become Good Enough?; A Wave of (Connected) Gadgets. 
505 8 |a Some Conclusions Chapter Five: A Heuristic Cybersecurity Model; Model Structure; Results; Sensitivity Analyses; Conclusions; Chapter Six: Lessons for Organizations and Public Policy; Lessons for Organizations; Lessons for Public Policy; Some Conclusions; APPENDIXES; A. Questionnaire; B. Model Specification; C. Baseline Parameters; Bibliography. 
520 |a Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a JSTOR  |b Books at JSTOR Open Access 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Security measures  |x Government policy  |z United States. 
650 0 |a Industries  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Industrie  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Security measures  |x Government policy  |2 fast 
650 7 |a Industries  |x Security measures  |2 fast 
651 7 |a United States  |2 fast 
700 1 |a Ablon, Lillian,  |e author. 
700 1 |a Webb, Tim  |c (Engineer),  |e author. 
773 0 |t Books at JSTOR: Open Access  |d JSTOR 
776 0 8 |i Print version:  |a Libicki, Martin C., author.  |t Defender's dilemma  |d Santa Monica, CA : RAND, 2015  |z 9780833089113  |w (DLC) 2015024392 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=2075897  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 12500925 
938 |a EBSCOhost  |b EBSC  |n 1017988 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL2075897 
938 |a Books 24x7  |b B247  |n bkg00092018 
994 |a 92  |b IZTAP