Cyber insecurity navigating the perils of the next information age
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, acade...
Saved in:
| Other Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Lanham, Md.
Rowman & Littlefield Publishers
[2016]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Foreword / Honorable Richard J. Danzig
- Introduction / Trey Herr and Richard M. Harrison
- Section I: Securing Data, Devices, and Networks. Understanding information assurance / Eric Ormes and Trey Herr
- A path to collective security: information sharing at the state and local level / David Weinstein
- Protecting industrial control systems in critical infrastructure / Robert M. Lee
- Safety at any speed: the roads ahead for automotive cyber safety policy / Joshua Corman and Beau Woods
- Bad code: exploring liability in software development / Jane Chong
- Section II: Combating Cyber Crime. Understanding cyber crime / Sasha Romanosky and Trey Herr
- Disrupting malware markets / Trey Herr and Ryan Ellis
- The Computer Fraud and Abuse Act: structure, controversies, and proposals for reform / Paul Ohm
- Breach notification laws: the policy and practice / Sasha Romanosky
- Cyber insurance: a market-based approach to information assurance / Robert Morgus
- Section III: Governing the Security of the Internet. Understanding internet security governance / Trey Herr and Heather West
- A holistic approach to the encryption debate / Aaron Brantly
- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen
- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. Hill
- Countering the proliferation of malware / Trey Herr and Paul Rosenzweig
- Section IV: Military Cyber Operations. Understanding military cyber operations / Trey Herr and Drew Herrick
- Government acquisition and use of zero-day software vulnerabilities / Mailyn Fidler
- The Joint Cyber Force: challenges and opportunities / Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa
- The practical impact of classification regarding offensive cyber operations / Herbert S. Lin and Taylor Grossman
- Creating influence through information / Kat Dransfield, Abraham Wagner, and Rand Waltzman
- Concluding remarks / Trey Herr an Richard M. Harrison


