The defender's dilemma charting a course toward cybersecurity

Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide o...

Full description

Main Authors: Libicki, Martin C., Ablon, Lillian (Author), Webb, Tim (Author)
Corporate Author: Rand Corporation National Security Research Division
Format: eBook
Language:English
Published: Santa Monica, Calif. RAND [2015]©2015, 2015
Series:[Research Report]
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
Summary:Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities
Item Description:At head of title: RAND National Security Research Division. - "Prepared for Juniper Networks, Inc."
Physical Description:xxv, 135 pages
ISBN:0833089110
9780833091024
9780833089113
0833091026