Muutke küpsiste eelistusi

Defender's Dilemma: Charting a Course Toward Cybersecurity [Pehme köide]

  • Formaat: Paperback / softback, 162 pages, kõrgus x laius: 229x152 mm
  • Ilmumisaeg: 30-Jun-2015
  • Kirjastus: RAND
  • ISBN-10: 0833089110
  • ISBN-13: 9780833089113
  • Formaat: Paperback / softback, 162 pages, kõrgus x laius: 229x152 mm
  • Ilmumisaeg: 30-Jun-2015
  • Kirjastus: RAND
  • ISBN-10: 0833089110
  • ISBN-13: 9780833089113
This report, the second in a series, reveals insights from chief information security officers; examines network defense measures and attacker-created countermeasures; and explores software vulnerabilities and inherent weaknesses.
Preface iii
Figures
vii
Tables
ix
Summary xi
Acknowledgments xxiii
Abbreviations xxv
Chapter One Introduction
1(8)
Organization of This Report
4(5)
Chapter Two Chief Information Security Officers Surveyed
9(14)
Common Knowledge Confirmed
10(3)
Reasonable Suppositions Validated
13(6)
Surprises
19(2)
Some Conclusions
21(2)
Chapter Three The Efficacy of Security Systems
23(18)
Measures and Countermeasures to Mitigate the Likelihood of an Attack
24(2)
Attackers and Defenders Often Employ the Same Tools and Techniques
26(1)
Security Product Development Has Sped Up
27(1)
The Shift from Signature-Only to Behavior-Based Detection
27(1)
Having More-Sophisticated Tools Do Not Necessarily Equate to Smaller Error Rates
28(2)
Measures and Countermeasures Developed to Mitigate the Impact of an Attack
30(3)
Human Element Continues to Be a Great Weakness
33(1)
A Cycle of Market Offerings
34(2)
Ideal Solutions Can Depend on the Size of an Organization
36(3)
Some Conclusions
39(2)
Chapter Four Improving Software
41(20)
When Vulnerabilities Matter
42(2)
Markets for Zero-Days
44(5)
In the Short Run, Vulnerability Discovery Might Worsen Matters
49(1)
Can Software Become Good Enough?
50(6)
A Wave of (Connected) Gadgets
56(3)
Some Conclusions
59(2)
Chapter Five A Heuristic Cybersecurity Model
61(38)
Model Structure
62(5)
Results
67(11)
Sensitivity Analyses
78(18)
Conclusions
96(3)
Chapter Six Lessons for Organizations and Public Policy
99(10)
Lessons for Organizations
100(4)
Lessons for Public Policy
104(3)
Some Conclusions
107(2)
APPENDIXES
A Questionnaire
109(4)
B Model Specification
113(10)
C Baseline Parameters
123(4)
Bibliography 127