Cover image for The Defender’s Dilemma : Charting a Course Toward Cybersecurity.
The Defender’s Dilemma : Charting a Course Toward Cybersecurity.
Title:
The Defender’s Dilemma : Charting a Course Toward Cybersecurity.
Author:
Libicki, Martin C.
ISBN:
9780833091031
Personal Author:
Physical Description:
1 online resource (162 pages)
Contents:
Cover -- Title Page -- Copyright -- Preface -- Contents -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One: Introduction -- Organization of This Report -- Chapter Two: Chief Information Security Officers Surveyed -- Common Knowledge Confirmed -- Reasonable Suppositions Validated -- Surprises -- Some Conclusions -- Chapter Three: The Efficacy of Security Systems -- Measures and Countermeasures to Mitigate the Likelihood of an Attack -- Attackers and Defenders Often Employ the Same Tools and Techniques -- Security Product Development Has Sped Up -- Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates -- The Shift from Signature-Only to Behavior-Based Detection -- Measures and Countermeasures Developed to Mitigate the Impact of an Attack -- Human Element Continues to Be a Great Weakness -- A Cycle of Market Offerings -- Ideal Solutions Can Depend on the Size of an Organization -- Some Conclusions -- Chapter Four: Improving Software -- When Vulnerabilities Matter -- Markets for Zero-Days -- In the Short Run, Vulnerability Discovery Might Worsen Matters -- Can Software Become Good Enough? -- A Wave of (Connected) Gadgets -- Some Conclusions -- Chapter Five: A Heuristic Cybersecurity Model -- Model Structure -- Results -- Sensitivity Analyses -- Conclusions -- Chapter Six: Lessons for Organizations and Public Policy -- Lessons for Organizations -- Lessons for Public Policy -- Some Conclusions -- APPENDIXES -- A. Questionnaire -- B. Model Specification -- C. Baseline Parameters -- Bibliography.
Abstract:
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: