« Previous |
131 - 136 of 136
|
Next »
Number of results to display per page
Search Results
132. A Framework for Categorizing Disruptive Cyber Activity and Assessing its Impact
- Author:
- Charles Harry
- Publication Date:
- 08-2015
- Content Type:
- Working Paper
- Institution:
- Center for International and Security Studies at Maryland (CISSM)
- Abstract:
- While significant media attention has been given to the volume and range of cyber attacks, the inability to measure and categorize disruptive events has complicated efforts of policy makers to push comprehensive responses that address the range of cyber activity. While organizations and public officials have spent significant time and resources attempting to grapple with the complex nature of these threats, a systematic and comprehensive approach to categorize and measure disruptive attacks remains elusive. This paper addresses this issue by differentiating between exploitive and disruptive cyber events, proposes a formal method to categorize five types of disruptive events, and measures their impact along three dimensions of analysis. Scope, magnitude, and duration of disruptive cyber events are analyzed to locate each event on a Cyber Disruption Index (CDI) so organizations and policymakers can estimate the aggregated effect of a malicious act aimed at impacting their operations. Using the five different event classes and the CDI estimation method makes it easier for organizations and policy makers to disaggregate a complex topic, contextualize and process individual threats to their network, target where increased investment can reduce the risk of specific disruptive cyber events, and distinguish between events that represent a private-sector problem from those that merit a more serious public-sector concern.
- Topic:
- Mass Media and Cybersecurity
- Political Geography:
- United States, North America, Washington, and D.C.
133. Journal of Public and International Affairs 2014
- Author:
- Daphne McCurdy, Chikara Onda, Aaron Aitken, Lucia Adriana Baltazar Vazquez, John Paul Bumpus, John Speed Meyers, Pierina Ana Sanchez, Yolaine Frossard de Saugy, Melanie Harris, Steve Moilanen, Stephen Pritchard, Nicolas Collin dit de Montesson, and Naomi Crowther
- Publication Date:
- 05-2014
- Content Type:
- Journal Article
- Journal:
- Woodrow Wilson School Journal of Public and International Affairs
- Institution:
- Woodrow Wilson School of Public and International Affairs, Princeton University
- Abstract:
- From pressing foreign policy issues such as territorial disputes in the South China Sea and homicide rates in Honduras to contentious domestic policy debates such as the rights of Mexican immigrants in the United States and the construction of the Keystone pipeline, the topics in this year’s journal are wide-ranging in both functional and geographic focus. However, they all share a strong commitment to seeking solutions to the world’s most serious challenges through sound policy.
- Topic:
- Crime, Government, Oil, Poverty, Sovereignty, Bilateral Relations, Territorial Disputes, Foreign Aid, Immigration, Governance, Law, Cybersecurity, and Grand Strategy
- Political Geography:
- Africa, China, Iran, Canada, Philippines, Mexico, Honduras, United States of America, and South China Sea
134. An Independent Review of Foreign National Access Management for the National Aeronautics and Space Administration
- Author:
- Dick Thornburgh
- Publication Date:
- 01-2014
- Content Type:
- Working Paper
- Institution:
- The National Academy of Public Administration
- Abstract:
- Over the last year, security incidents involving foreign nationals at the National Aeronautics and Space Administration's (NASA) research Centers have drawn the attention of the NASA Administrator and other agency leaders, Congress, and the media. Recognizing the growing threat of cyber-attacks and espionage aimed at government agencies by hostile nation-states and foreign adversaries, NASA asked the National Academy of Public Administration (the Academy) to conduct this review of its foreign national management processes. Having a well-run Foreign National Access Management (FNAM) program is in the best interests of NASA, both in terms of protecting vital U.S. security and proprietary information, as well as capitalizing on the talents of foreign nationals. This Academy review examined the Agency’s entire FNAM process from the initial request from a requestor or sponsor through foreign national vetting, credentialing, information technology security, counterintelligence, hosting and escort procedures, and export controls.
- Topic:
- Diplomacy, Military Strategy, Cybersecurity, and Space
- Political Geography:
- United States and North America
135. Regional Cyber Security: Moving Towards a Resilient ASEAN Cyber Security Regime
- Author:
- Caitriona Heinl
- Publication Date:
- 09-2013
- Content Type:
- Working Paper
- Institution:
- Centre for Non-Traditional Security Studies (NTS)
- Abstract:
- This paper outlines regional level cooperation efforts of the Association for Southeast Asian Nations (ASEAN) to counter serious cross-border cyber threats and identifies where gaps might exist, which require further and urgent consideration. It considers whether more might be done to create a comprehensive approach to cyber security in the ASEAN region. Finally, it aims to fill identified gaps by providing several recommendations for possible future development and implementation to create a resilient regional cyber security regime.
- Topic:
- Security, Regional Cooperation, Terrorism, Cybersecurity, and Digital Economy
- Political Geography:
- Asia and Southeast Asia
136. Deterring Cyber War: A U.S.-Led Cybersecurity Summit
- Author:
- Andy Johnson and Kyle Spector
- Publication Date:
- 10-2006
- Content Type:
- Working Paper
- Institution:
- Third Way
- Abstract:
- Every day, U.S. military and civilian networks are probed thousands of times for cyber weaknesses. As a result of the mounting threat, there is a growing consensus that international action is required to reduce the threat of cyber war. The U.S. should take the lead in deterring cyber war by hosting a cybersecurity summit—a key first step to building an international cyber accord
- Topic:
- Security, Defense Policy, Diplomacy, International Cooperation, and Cybersecurity
- Political Geography:
- United States, North America, and Global Focus