عرض عادي

Cyber insecurity : navigating the perils of the next information age / edited by Richard M. Harrison and Trey Herr.

المساهم (المساهمين):نوع المادة : نصنصالناشر:Lanham : Rowman and Littlefield, 2016وصف:xx, 391 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781442272842 (cloth : alk. paper)
  • 1442272848 (cloth : alk. paper)
الموضوع:تصنيف مكتبة الكونجرس:
  • HV6773 .C9174 2016
المحتويات:
Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison.
ملخص:Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow--and serve to inform public debate into the next information age.-- Provided by Publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HV6773 .C9174 2016 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30020000031894
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HV6773 .C9174 2016 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30020000031893

Published in association with The America Foreign Policy Council.

Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow--and serve to inform public debate into the next information age.-- Provided by Publisher.

Includes bibliographical references and index.

Foreword / Honorable Richard J. Danzig -- Introduction / Trey Herr and Richard M. Harrison -- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr -- A path to collective security: information sharing at the state and local level / David Weinstein -- Protecting industrial control systems in critical infrastructure / Robert M. Lee -- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods -- Bad code: exploring liability in software development / Jane Chong -- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr -- Disrupting malware markets / Trey Herr and Ryan Ellis -- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm -- Breach notification laws: the policy and practice / Sasha Romanosky -- Cyber insurance: a market-based approach to information assurance / Robert Morgus -- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill -- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig -- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick -- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler -- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa -- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman -- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman -- Concluding remarks / Trey Herr an Richard M. Harrison.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة