title:
Cyber-security : the vexed question of global rules : an independent report on cyber-preparedness around the world
creator:
Grauman, Brigid.
contributor:
Security and Defence Agenda
publisher:
Security & Defence Agenda
date:
Record modified: 2012-05-31
date:
Record created: 2012-05-31
date:
2012
description:
description:
Harvested from www.securitydefenceagenda.org/Portals/14/Documents/Publications/SDA_Cyber_report_FINAL.pdf on May 31, 2012.
description:
Extent: 1 online resource (104 p.) : ports. (digital, PDF file)
description:
Contents: Introduction. -- Recommendations. -- Part One. Section I. Clearing the booby traps from the cyber-security minefield. -- Section II. Tracking the cyber revolution: New threats and changing ethics. -- Section III. Cyber-defence strategies: The hottest debates and conditions for success. -- Section IV. The quest for rules and regulations to govern cyber-space. -- Section V. Breaking down the walls between the cyber-communities. -- Section VI. The private sector's privacy dilemma. -- Section VII. Bearing the costs of cyber-insecurity. -- Section VIII. Private citizens : issues of freedom and protection. -- PART TWO Section I. A worldwide brainstorming of experts. -- Section II. Country-by-country stress tests. -- Section III. Indices and glossaries.
description:
Abstract: This report is made up of a survey of some 250 leading authorities worldwide and of interviews carried out in late 2011 and early 2012 with over 80 cyber-security experts in government, companies, international organisations and academia. It offers a global snapshot of current thinking about the cyber-threat and the measures that should be taken to defend against it, and assesses the way ahead. It is aimed at the influential layperson, and deliberately avoids specialised language. For the moment, the 'bad guys' have the upper hand, whether they are attacking systems for industrial or political espionage reasons, or simply to steal money, because the lack of international agreements allows them to operate swiftly and mostly with impunity. Protecting data and systems against cyber-attack has so far been about dousing the flames, although recently the focus has been shifting towards more assertive self-protection.
subject:
Security, International
subject:
Cyberterrorism--Prevention--International cooperation
subject:
Computer networks--Security measures--International cooperation
subject:
Computer networks--Security measures--Government policy.; Computer networks--Security measures--International cooperation.; Computer crimes--Prevention--International cooperation.; Cyberterrorism--Prevention--International cooperation.; Security, International.
subject:
Computer networks--Security measures--Government policy.; Computer networks--Security measures--International cooperation.; Computer crimes--Prevention--International cooperation.; Cyberterrorism--Prevention--International cooperation.; Security, International.
subject:
Computer networks--Security measures--Government policy
subject:
Computer crimes--Prevention--International cooperation
relation:
OCLC No.: 775273325
relation:
Mode of access: World Wide Web.; System requirements: Adobe Reader.
type:
application/pdf
type:
Text
type:
PDF-1.6
source:
http://www.securitydefenceagenda.org/Portals/14/Documents/Publications/SDA_Cyber_report_FINAL.pdf
language:
ice
rights:
rights:
This work may be protected by copyright. It was originally published on the free Web and has been harvested for preservation purposes under a claim of fair use. Please consult the work itself for additional statements regarding copyright ownership and permissions. Access to this work is provided here for educational purposes only. If you are a copyright owner who objects to the preservation of your work in this fashion, or if you believe that your copyright has been violated by the project's efforts, please make that concern known to the Legal Information Archive.
identifier:
SDA_Cyber_report_FINAL