The Defender's Dilemma Charting a Course Toward Cybersecurity
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasu...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2015
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115488 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2015 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt15r3x78 | ||
020 | |a 9780833091031 | ||
020 | |a 9780833089113 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt15r3x78 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a URJ |2 bicssc | |
072 | 7 | |a UB |2 bicssc | |
072 | 7 | |a UD |2 bicssc | |
100 | 1 | |a Libicki, Martin C. |4 auth | |
700 | 1 | |a Ablon, Lillian |4 auth | |
700 | 1 | |a Webb, Tim |4 auth | |
245 | 1 | 0 | |a The Defender's Dilemma |b Charting a Course Toward Cybersecurity |
260 | |b RAND Corporation |c 2015 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Computer viruses, Trojans & worms |2 bicssc | |
650 | 7 | |a Information technology: general issues |2 bicssc | |
650 | 7 | |a Digital lifestyle |2 bicssc | |
653 | |a Technology | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt15r3x78 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115488 |7 0 |z DOAB: description of the publication |