Cyber Insecurity (eBook)
412 Seiten
Rowman & Littlefield Publishers (Verlag)
978-1-4422-7285-9 (ISBN)
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age.Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods.* Learn more at the book's website at http://www.cyberinsecuritybook.org
Richard Harrison is the director of Operations and Defense Technology Programs at American Foreign Policy Council. His writings have appeared in Defense News, Jane’s Defence Weekly, USA Today, U.S. News and World Report, and the Washington Times. Trey Herr is a fellow at the Belfer Center’s Cyber Security Project at the Harvard Kennedy School and a non-resident fellow with New Amerca’s Cybersecurity Initiative.
Acknowledgments Foreword by the Honorable Richard J. Danzig Introduction by Trey Herr and Richard M. Harrison SECTION I: SECURING DATA, DEVICES, AND NETWORKS1. Understanding Information Assurance, by Eric Ormes and Trey Herr 2. A Path to Collective Security: Information Sharing at the State and Local Level, by David Weinstein 3. Protecting Industrial Control Systems in Critical Infrastructure, by Robert M. Lee 4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy, by Joshua Corman and Beau Woods 5. Bad Code: Exploring Liability in Software Development, by Jane Chong SECTION II: COMBATING CYBER CRIME 6. Understanding Cyber Crime, by Sasha Romanosky and Trey Herr 7. Disrupting Malware Markets, by Trey Herr and Ryan Ellis 8. The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform, by Paul Ohm 9. Breach Notification Laws: The Policy and Practice, by Sasha Romanosky 10. Cyber Insurance: A Market-Based Approach to Information Assurance, by Robert Morgus SECTION III: GOVERNING THE SECURITY OF THE INTERNET 11. Understanding Internet Security Governance, by Trey Herr and Heather West 12. A Holistic Approach to the Encryption Debate, by Aaron Brantly 13. Certificate Authorities: Modernizing the Internet’s Chain of Trust, by Adrienne Allen 14. Multistakeholder Approaches to Cybersecurity Challenges, by Allan Friedman and Jonah F. Hill 15. Countering the Proliferation of Malware, by Trey Herr and Paul Rosenzweig SECTION IV: MILITARY CYBER OPERATIONS 16. Understanding Military Cyber Operations, by Trey Herr and Drew Herrick 17. Government Acquisition and Use of Zero-Day Software Vulnerabilities, by Mailyn Fidler 18. The Joint Cyber Force: Challenges and Opportunities, by Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa 19. The Practical Impact of Classification Regarding Offensive Cyber Operations, by Herbert S. Lin and Taylor Grossman 20. Creating Influence through Information, by Kat Dransfield, Abraham Wagner, and Rand Waltzman Concluding Remarks by Trey Herr and Richard M. Harrison Glossary Index Contributors
| Erscheint lt. Verlag | 18.10.2016 |
|---|---|
| Vorwort | Richard J. Danzig |
| Zusatzinfo | 43 Illustrations including: - 11 Charts; - 7 Tables; - 25 Text Boxes. |
| Sprache | englisch |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Sozialwissenschaften ► Politik / Verwaltung ► Europäische / Internationale Politik | |
| Schlagworte | Cyber • security |
| ISBN-10 | 1-4422-7285-6 / 1442272856 |
| ISBN-13 | 978-1-4422-7285-9 / 9781442272859 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich