Beschreibung
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrowand serve to inform public debate into the next information age.Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison, Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm, Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig, Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West, and Beau Woods.
Autorenportrait
Richard Harrison is the director of Operations and Defense Technology Programs at American Foreign Policy Council. His writings have appeared inDefense News, Janes Defence Weekly, USA Today, U.S. News and World Report, and theWashington Times.Trey Herr is a fellow at the Belfer Centers Cyber Security Project at the Harvard Kennedy School and a non-resident fellow with New Amercas Cybersecurity Initiative.
Inhalt
AcknowledgmentsForeword by the Honorable Richard J. DanzigIntroduction by Trey Herr and Richard M. HarrisonSECTION I: SECURING DATA, DEVICES, AND NETWORKS1. Understanding Information Assurance, by Eric Ormes and Trey Herr2. A Path to Collective Security: Information Sharing at the State and Local Level, by David Weinstein3. Protecting Industrial Control Systems in Critical Infrastructure, by Robert M. Lee4. Safer at Any Speed: The Roads Ahead for Automotive Cyber Safety Policy, by Joshua Corman and Beau Woods5. Bad Code: Exploring Liability in Software Development, by Jane ChongSECTION II: COMBATING CYBER CRIME6. Understanding Cyber Crime, by Sasha Romanosky and Trey Herr7. Disrupting Malware Markets, by Trey Herr and Ryan Ellis8. The Computer Fraud and Abuse Act: Structure, Controversies, and Proposals for Reform, by Paul Ohm9. Breach Notification Laws: The Policy and Practice, by Sasha Romanosky10. Cyber Insurance: A Market-Based Approach to Information Assurance, by Robert MorgusSECTION III: GOVERNING THE SECURITY OF THE INTERNET11. Understanding Internet Security Governance, by Trey Herr and Heather West12. A Holistic Approach to the Encryption Debate, by Aaron Brantly13. Certificate Authorities: Modernizing the Internets Chain of Trust, by Adrienne Allen14. Multistakeholder Approaches to Cybersecurity Challenges, by Allan Friedman and Jonah F. Hill15. Countering the Proliferation of Malware, by Trey Herr and Paul RosenzweigSECTION IV: MILITARY CYBER OPERATIONS16. Understanding Military Cyber Operations, by Trey Herr and Drew Herrick17. Government Acquisition and Use of Zero-Day Software Vulnerabilities, by Mailyn Fidler18. The Joint Cyber Force: Challenges and Opportunities, by Jason Rivera, Lauren Boas Hayes, Anastasia Mark, Matthew Russell, and Nathaniel Tisa19. The Practical Impact of Classification Regarding Offensive Cyber Operations, by Herbert S. Lin and Taylor Grossman20. Creating Influence through Information, by Kat Dransfield, Abraham Wagner, and Rand WaltzmanConcluding Remarks by Trey Herr and Richard M. HarrisonGlossaryIndexContributors
Informationen zu E-Books
Individuelle Erläuterung zu E-Books