Rethinking cybersecurity : strategy, mass effect, and states / author: James Andrew Lewis.
By: Lewis, James Andrew [author.].
Contributor(s): Center for Strategic and International Studies (Washington, D.C.) [issuing body.].
Publisher: Washington, DC : Lanham, MD : Center for Strategic & International Studies ; Rowman & Littlefield, [2018]Description: iii, 41 pages ; 28 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781442280519.Subject(s): Computer securityGenre/Form: Print books.Summary: Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9.A25 L48 2018 (Browse shelf) | Available | AU00000000012614 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
QA76.9.A25 K36 2015 Introduction to modern cryptography / | QA76.9.A25 K36 2021 Introduction to modern cryptography / | QA76.9 .A25 K63463 2017 Implementing cybersecurity : a guide to the National Institute of Standards and Technology Risk Management Framework / | QA76.9.A25 L48 2018 Rethinking cybersecurity : strategy, mass effect, and states / | QA76.9.A25 L485 2018 Passwords : philology, security, authentication / | QA76.9 .A25 M33 2017 RIoT control : understanding and managing risks and the internet of things / | QA76.9.A25 M36 2017 CompTIA cybersecurity analyst (CSA+) cert guide / |
"January 2018."
A report of the CSIS Technology Program.
Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity.