Cyber Insecurity
Navigating the Perils of the Next Information Age
Herausgeber: Harrison, Richard; Herr, Trey
Cyber Insecurity
Navigating the Perils of the Next Information Age
Herausgeber: Harrison, Richard; Herr, Trey
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
As Internet connectivity continues to spread, this book will offer readers greater awareness of the cyber threats of tomorrow-and serve to inform the policy debates about how to mitigate them.
Andere Kunden interessierten sich auch für
- The Cyber Deterrence Problem65,99 €
- The Cyber Deterrence Problem187,99 €
- Jenny JunNorth Korea's Cyber Operations65,99 €
- Charlie MitchellCyber in the Age of Trump47,99 €
- Scott JasperStrategic Cyber Deterrence136,99 €
- Scott JasperStrategic Cyber Deterrence65,99 €
- Cyber Security Education194,99 €
-
-
-
As Internet connectivity continues to spread, this book will offer readers greater awareness of the cyber threats of tomorrow-and serve to inform the policy debates about how to mitigate them.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Rowman & Littlefield Publishers
- Seitenzahl: 414
- Erscheinungstermin: 18. Oktober 2016
- Englisch
- Abmessung: 235mm x 157mm x 29mm
- Gewicht: 820g
- ISBN-13: 9781442272842
- ISBN-10: 1442272848
- Artikelnr.: 45187917
- Verlag: Rowman & Littlefield Publishers
- Seitenzahl: 414
- Erscheinungstermin: 18. Oktober 2016
- Englisch
- Abmessung: 235mm x 157mm x 29mm
- Gewicht: 820g
- ISBN-13: 9781442272842
- ISBN-10: 1442272848
- Artikelnr.: 45187917
Richard Harrison is the director of Operations and Defense Technology Programs at American Foreign Policy Council. His writings have appeared in Defense News, Jane's Defence Weekly, USA Today, U.S. News and World Report, and the Washington Times. Trey Herr is a fellow at the Belfer Center's Cyber Security Project at the Harvard Kennedy School and a non-resident fellow with New Amerca's Cybersecurity Initiative.
Acknowledgments Foreword by the Honorable Richard J. Danzig Introduction by Trey Herr and Richard M. Harrison SECTION I: SECURING DATA
DEVICES
AND NETWORKS 1. Understanding Information Assurance
by Eric Ormes and Trey Herr 2. A Path to Collective Security: Information Sharing at the State and Local Level
by David Weinstein 3. Protecting Industrial Control Systems in Critical Infrastructure
by Robert M. Lee 4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy
by Joshua Corman and Beau Woods 5. Bad Code: Exploring Liability in Software Development
by Jane Chong SECTION II: COMBATING CYBER CRIME 6. Understanding Cyber Crime
by Sasha Romanosky and Trey Herr 7. Disrupting Malware Markets
by Trey Herr and Ryan Ellis 8. The Computer Fraud and Abuse Act: Structure
Controversies
and Proposals for Reform
by Paul Ohm 9. Breach Notification Laws: The Policy and Practice
by Sasha Romanosky 10. Cyber Insurance: A Market-Based Approach to Information Assurance
by Robert Morgus SECTION III: GOVERNING THE SECURITY OF THE INTERNET 11. Understanding Internet Security Governance
by Trey Herr and Heather West 12. A Holistic Approach to the Encryption Debate
by Aaron Brantly 13. Certificate Authorities: Modernizing the Internet's Chain of Trust
by Adrienne Allen 14. Multistakeholder Approaches to Cybersecurity Challenges
by Allan Friedman and Jonah F. Hill 15. Countering the Proliferation of Malware
by Trey Herr and Paul Rosenzweig SECTION IV: MILITARY CYBER OPERATIONS 16. Understanding Military Cyber Operations
by Trey Herr and Drew Herrick 17. Government Acquisition and Use of Zero-Day Software Vulnerabilities
by Mailyn Fidler 18. The Joint Cyber Force: Challenges and Opportunities
by Jason Rivera
Lauren Boas Hayes
Anastasia Mark
Matthew Russell
and Nathaniel Tisa 19. The Practical Impact of Classification Regarding Offensive Cyber Operations
by Herbert S. Lin and Taylor Grossman 20. Creating Influence through Information
by Kat Dransfield
Abraham Wagner
and Rand Waltzman Concluding Remarks by Trey Herr and Richard M. Harrison Glossary Index Contributors
DEVICES
AND NETWORKS 1. Understanding Information Assurance
by Eric Ormes and Trey Herr 2. A Path to Collective Security: Information Sharing at the State and Local Level
by David Weinstein 3. Protecting Industrial Control Systems in Critical Infrastructure
by Robert M. Lee 4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy
by Joshua Corman and Beau Woods 5. Bad Code: Exploring Liability in Software Development
by Jane Chong SECTION II: COMBATING CYBER CRIME 6. Understanding Cyber Crime
by Sasha Romanosky and Trey Herr 7. Disrupting Malware Markets
by Trey Herr and Ryan Ellis 8. The Computer Fraud and Abuse Act: Structure
Controversies
and Proposals for Reform
by Paul Ohm 9. Breach Notification Laws: The Policy and Practice
by Sasha Romanosky 10. Cyber Insurance: A Market-Based Approach to Information Assurance
by Robert Morgus SECTION III: GOVERNING THE SECURITY OF THE INTERNET 11. Understanding Internet Security Governance
by Trey Herr and Heather West 12. A Holistic Approach to the Encryption Debate
by Aaron Brantly 13. Certificate Authorities: Modernizing the Internet's Chain of Trust
by Adrienne Allen 14. Multistakeholder Approaches to Cybersecurity Challenges
by Allan Friedman and Jonah F. Hill 15. Countering the Proliferation of Malware
by Trey Herr and Paul Rosenzweig SECTION IV: MILITARY CYBER OPERATIONS 16. Understanding Military Cyber Operations
by Trey Herr and Drew Herrick 17. Government Acquisition and Use of Zero-Day Software Vulnerabilities
by Mailyn Fidler 18. The Joint Cyber Force: Challenges and Opportunities
by Jason Rivera
Lauren Boas Hayes
Anastasia Mark
Matthew Russell
and Nathaniel Tisa 19. The Practical Impact of Classification Regarding Offensive Cyber Operations
by Herbert S. Lin and Taylor Grossman 20. Creating Influence through Information
by Kat Dransfield
Abraham Wagner
and Rand Waltzman Concluding Remarks by Trey Herr and Richard M. Harrison Glossary Index Contributors
Acknowledgments Foreword by the Honorable Richard J. Danzig Introduction by Trey Herr and Richard M. Harrison SECTION I: SECURING DATA
DEVICES
AND NETWORKS 1. Understanding Information Assurance
by Eric Ormes and Trey Herr 2. A Path to Collective Security: Information Sharing at the State and Local Level
by David Weinstein 3. Protecting Industrial Control Systems in Critical Infrastructure
by Robert M. Lee 4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy
by Joshua Corman and Beau Woods 5. Bad Code: Exploring Liability in Software Development
by Jane Chong SECTION II: COMBATING CYBER CRIME 6. Understanding Cyber Crime
by Sasha Romanosky and Trey Herr 7. Disrupting Malware Markets
by Trey Herr and Ryan Ellis 8. The Computer Fraud and Abuse Act: Structure
Controversies
and Proposals for Reform
by Paul Ohm 9. Breach Notification Laws: The Policy and Practice
by Sasha Romanosky 10. Cyber Insurance: A Market-Based Approach to Information Assurance
by Robert Morgus SECTION III: GOVERNING THE SECURITY OF THE INTERNET 11. Understanding Internet Security Governance
by Trey Herr and Heather West 12. A Holistic Approach to the Encryption Debate
by Aaron Brantly 13. Certificate Authorities: Modernizing the Internet's Chain of Trust
by Adrienne Allen 14. Multistakeholder Approaches to Cybersecurity Challenges
by Allan Friedman and Jonah F. Hill 15. Countering the Proliferation of Malware
by Trey Herr and Paul Rosenzweig SECTION IV: MILITARY CYBER OPERATIONS 16. Understanding Military Cyber Operations
by Trey Herr and Drew Herrick 17. Government Acquisition and Use of Zero-Day Software Vulnerabilities
by Mailyn Fidler 18. The Joint Cyber Force: Challenges and Opportunities
by Jason Rivera
Lauren Boas Hayes
Anastasia Mark
Matthew Russell
and Nathaniel Tisa 19. The Practical Impact of Classification Regarding Offensive Cyber Operations
by Herbert S. Lin and Taylor Grossman 20. Creating Influence through Information
by Kat Dransfield
Abraham Wagner
and Rand Waltzman Concluding Remarks by Trey Herr and Richard M. Harrison Glossary Index Contributors
DEVICES
AND NETWORKS 1. Understanding Information Assurance
by Eric Ormes and Trey Herr 2. A Path to Collective Security: Information Sharing at the State and Local Level
by David Weinstein 3. Protecting Industrial Control Systems in Critical Infrastructure
by Robert M. Lee 4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy
by Joshua Corman and Beau Woods 5. Bad Code: Exploring Liability in Software Development
by Jane Chong SECTION II: COMBATING CYBER CRIME 6. Understanding Cyber Crime
by Sasha Romanosky and Trey Herr 7. Disrupting Malware Markets
by Trey Herr and Ryan Ellis 8. The Computer Fraud and Abuse Act: Structure
Controversies
and Proposals for Reform
by Paul Ohm 9. Breach Notification Laws: The Policy and Practice
by Sasha Romanosky 10. Cyber Insurance: A Market-Based Approach to Information Assurance
by Robert Morgus SECTION III: GOVERNING THE SECURITY OF THE INTERNET 11. Understanding Internet Security Governance
by Trey Herr and Heather West 12. A Holistic Approach to the Encryption Debate
by Aaron Brantly 13. Certificate Authorities: Modernizing the Internet's Chain of Trust
by Adrienne Allen 14. Multistakeholder Approaches to Cybersecurity Challenges
by Allan Friedman and Jonah F. Hill 15. Countering the Proliferation of Malware
by Trey Herr and Paul Rosenzweig SECTION IV: MILITARY CYBER OPERATIONS 16. Understanding Military Cyber Operations
by Trey Herr and Drew Herrick 17. Government Acquisition and Use of Zero-Day Software Vulnerabilities
by Mailyn Fidler 18. The Joint Cyber Force: Challenges and Opportunities
by Jason Rivera
Lauren Boas Hayes
Anastasia Mark
Matthew Russell
and Nathaniel Tisa 19. The Practical Impact of Classification Regarding Offensive Cyber Operations
by Herbert S. Lin and Taylor Grossman 20. Creating Influence through Information
by Kat Dransfield
Abraham Wagner
and Rand Waltzman Concluding Remarks by Trey Herr and Richard M. Harrison Glossary Index Contributors