Cyber insecurity navigating the perils of the next information age

Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, acade...

Full description

Saved in:
Bibliographic Details
Other Authors: Harrison, Richard M. 1981- (Editor), Herr, Trey (Editor)
Format: Book
Language:English
Published: Lanham, Md. Rowman & Littlefield Publishers [2016]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Foreword / Honorable Richard J. Danzig
  • Introduction / Trey Herr and Richard M. Harrison
  • Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr
  • A path to collective security: information sharing at the state and local level / David Weinstein
  • Protecting industrial control systems in critical infrastructure / Robert M. Lee
  • Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods
  • Bad code: exploring liability in software development / Jane Chong
  • Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr
  • Disrupting malware markets / Trey Herr and Ryan Ellis
  • The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm
  • Breach notification laws: the policy and practice / Sasha Romanosky
  • Cyber insurance: a market-based approach to information assurance / Robert Morgus
  • Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West
  • A holistic approach to the encryption debate / Aaron Brantly
  • Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen
  • Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill
  • Countering the proliferation of malware / Trey Herr and Paul Rosenzweig
  • Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick
  • Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler
  • The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa
  • The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman
  • Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman
  • Concluding remarks / Trey Herr an Richard M. Harrison