A framework for exploring cybersecurity policy options /

Saved in:
Bibliographic Details
Author / Creator:Mikolic-Torreira, Igor, author.
Imprint:Santa Monica, Calif. : RAND, [2016]
©2016
Description:xx, 85 pages : black and white illustrations, color illustrations ; 23 cm
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/10929872
Hidden Bibliographic Details
Other authors / contributors:Rand Corporation. National Security Research Division, publisher.
Rand Justice, Infrastructure, and Environment (Organization), issuing body.
ISBN:9780833096869
0833096869
Notes:"RR-1700-WFHF"--Cover page 4.
"November 23, 2016"--Table of contents page.
Includes bibliographical references (pages 83-85)
Summary:"Today's cyber environment presents unlimited opportunities for innovation, interaction, commerce, and creativity, but these benefits also bring serious security challenges. Satisfactory solutions will require building partnerships among public and private organizations, establishing mechanisms and incentives to foster routine information sharing and collective defense, and educating users about their role in thwarting increasingly sophisticated attacks. With a grant from the William and Flora Hewlett Foundation's Cyber Initiative, RAND developed and conducted two cybersecurity-focused discovery games in Washington, D.C., and California's Silicon Valley that aimed to capture the widest possible range of stakeholder perspectives. Participants represented the tech sector, government agencies, think tanks and academic institutions, advocacy organizations promoting civil liberties and privacy, technology users, and more. The goals were to explore opportunities for improving cybersecurity, assess the implications of possible solutions, and develop an initial framework to support debate and inform decisions regarding cybersecurity policies and practices. The games were structured around two plausible cybersecurity scenarios set in the near future. In the first scenario, malicious actors have exploited vulnerabilities in the Internet of Things, causing both virtual and physical harm; in the second, massive data breaches have compromised the financial system, including authentication processes. Participants debated dimensions of each problem in multidisciplinary teams, then shared potential solutions and strategies in a large-group setting. The format and findings of the exercises offer insights that can help guide holistic approaches to addressing future cybersecurity challenges"--Publisher's description.

Crerar, Lower Level, Bookstacks

Loading map link
Holdings details from Crerar, Lower Level, Bookstacks
Call Number: QA76.9.A25 M55 2016
c.1 Available Loan period: standard loan  Scan and Deliver Request for Pickup Need help? - Ask a Librarian