Query Result Set
Skip Navigation Links
   ActiveUsers:1109Hits:18700573Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBERSECURITY POLICY (5) answer(s).
 
SrlItem
1
ID:   192522


Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity / Leal, Marcelo M; Musgrave, Paul   Journal Article
Musgrave, Paul Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.
        Export Export
2
ID:   186764


Case for cyber-realism: geopolitical problems don’t have technical solutions / Alperovitch, Dmitri   Journal Article
Alperovitch, Dmitri Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
3
ID:   150177


Natural and quasi-natural experiments to evaluate cybersecurity policies / Dean, Benjamin   Journal Article
Dean, Benjamin Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
4
ID:   146361


Securing cyberspace: international and Asian perspectives / Samuel, Cherian (ed.); Sharma, Munish (ed.) 2016  Book
Samuel, Cherian (ed.) Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Pentagon Press, 2016.
Description xiv, 346p.hbk
Standard Number 9788182749184
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058748005.8/SAM 058748MainOn ShelfGeneral 
058749005.8/SAM 058749MainOn ShelfGeneral 
5
ID:   171961


unexpected norm-setters: Intelligence agencies in cyberspace / Georgieva, Ilina   Journal Article
Georgieva, Ilina Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract By implementing novel intelligence techniques in cyberspace, security and intelligence agencies have become major actors in the cybersecurity landscape. As they no longer just passively gather information for their governments but conduct both defense and offense operations in cyberspace, they signal international actors that their conduct is at least tolerable, even if not officially acceptable. Thereby, the intelligence agencies generate norms for the rest of the international community. Yet, they remain under the international regulation radar for being sub-state entities. Consequently, the main argument of this article is the following: To prevent the hollowing-out of cyber regulation efforts, the norm-setting role of intelligence actors should be taken into account when designing cyber norms.
        Export Export