Cyber Insecurity
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Cyber Insecurity

Navigating the Perils of the Next Information Age
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9781442272859
Veröffentl:
2016
Seiten:
412
Autor:
Richard Harrison
eBook Typ:
EPUB
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

As Internet connectivity continues to spread, this book will offer readers greater awareness of the cyber threats of tomorrow—and serve to inform the policy debates about how to mitigate them.
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow—and serve to inform public debate into the next information age.

Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison, Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm, Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig, Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West, and Beau Woods.

Acknowledgments

Foreword by the Honorable Richard J. Danzig

Introduction by Trey Herr and Richard M. Harrison

SECTION I: SECURING DATA, DEVICES, AND NETWORKS

1. Understanding Information Assurance, by Eric Ormes and Trey Herr
2. A Path to Collective Security: Information Sharing at the State and Local Level, by David Weinstein
3. Protecting Industrial Control Systems in Critical Infrastructure, by Robert M. Lee
4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy, by Joshua Corman and Beau Woods
5. Bad Code: Exploring Liability in Software Development, by Jane Chong

SECTION II: COMBATING CYBER CRIME
6. Understanding Cyber Crime, by Sasha Romanosky and Trey Herr
7. Disrupting Malware Markets, by Trey Herr and Ryan Ellis
8. The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform, by Paul Ohm
9. Breach Notification Laws: The Policy and Practice, by Sasha Romanosky
10. Cyber Insurance: A Market-Based Approach to Information Assurance, by Robert Morgus

SECTION III: GOVERNING THE SECURITY OF THE INTERNET
11. Understanding Internet Security Governance, by Trey Herr and Heather West
12. A Holistic Approach to the Encryption Debate, by Aaron Brantly
13. Certificate Authorities: Modernizing the Internet’s Chain of Trust, by Adrienne Allen
14. Multistakeholder Approaches to Cybersecurity Challenges, by Allan Friedman and Jonah F. Hill
15. Countering the Proliferation of Malware, by Trey Herr and Paul Rosenzweig

SECTION IV: MILITARY CYBER OPERATIONS
16. Understanding Military Cyber Operations, by Trey Herr and Drew Herrick
17. Government Acquisition and Use of Zero-Day Software Vulnerabilities, by Mailyn Fidler
18. The Joint Cyber Force: Challenges and Opportunities, by Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa
19. The Practical Impact of Classification Regarding Offensive Cyber Operations, by Herbert S. Lin and Taylor Grossman
20. Creating Influence through Information, by Kat Dransfield, Abraham Wagner, and Rand Waltzman

Concluding Remarks by Trey Herr and Richard M. Harrison

Glossary
Index
Contributors

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.