Jump to ContentJump to Main Navigation

You are looking at 1-20 of 37 items

  • Keywords: cyber-security x
Clear All Modify Search

View:

Security: Politics, Humanity, and the Philology of Care

John T. Hamilton

Published in print:
2013
Published Online:
October 2017
ISBN:
9780691157528
eISBN:
9781400846474
Item type:
book
Publisher:
Princeton University Press
DOI:
10.23943/princeton/9780691157528.001.0001
Subject:
Literature, Criticism/Theory

From national security and social security to homeland and cyber-security, “security” has become one of the most overused words in culture and politics today. Yet it also remains one of the most ... More


Advances in Cyber Security: Technology, Operations, and Experiences

D. Frank Hsu and Dorothy Marinucci (eds)

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
book
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.001.0001
Subject:
Information Science, Information Science

In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ... More


Why American Elections Are Flawed (and How to Fix Them)

Pippa Norris

Published in print:
2017
Published Online:
September 2017
ISBN:
9781501713408
eISBN:
9781501712753
Item type:
book
Publisher:
Cornell University Press
DOI:
10.7591/cornell/9781501713408.001.0001
Subject:
Political Science, American Politics

The flaws in the American electoral process have become increasingly apparent in recent years. The contemporary tipping point in public awareness occurred during the 2000 election count, and concern ... More


Public-Private Partnerships Changing the World

Kathleen L. Kiernan and Dyann Bradbury

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0013
Subject:
Information Science, Information Science

This chapter focuses on InfraGard, a public-private partnership aimed at providing owners and operators of Critical Infrastructure and Key Resources (CI/KR) the opportunity to share information about ... More


Cyber Security: Securing Our Cyber Ecosystem

Howard A. Schmidt

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0016
Subject:
Information Science, Information Science

This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's ... More


Securing the Information Supply Chain

Yossi Sheffi

in The Power of Resilience: How the Best Companies Manage the Unexpected

Published in print:
2015
Published Online:
May 2016
ISBN:
9780262029797
eISBN:
9780262330626
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262029797.003.0009
Subject:
Economics and Finance, Financial Economics

Internet technologies are now indispensable communications tools within and between companies. Yet the openness of these networks and the high potential value of corporate and personal information ... More


After the Internet

Laura DeNardis

in The Internet in Everything: Freedom and Security in a World with No Off Switch

Published in print:
2020
Published Online:
May 2020
ISBN:
9780300233070
eISBN:
9780300249330
Item type:
chapter
Publisher:
Yale University Press
DOI:
10.12987/yale/9780300233070.003.0001
Subject:
Political Science, Public Policy

This introductory chapter provides an overview of how digital systems have leapt from human-facing display screens into the physical world of material objects and artificial intelligence. The ... More


Everyday Cryptography: Fundamental Principles and Applications

Keith Martin

Published in print:
2017
Published Online:
July 2017
ISBN:
9780198788003
eISBN:
9780191829956
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198788003.001.0001
Subject:
Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing ... More


Building a Secure and Sustainable Cyberspace Ecosystem: An Overview

D. Frank Hsu

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0017
Subject:
Information Science, Information Science

This chapter provides a historical and contemporary perspective on various issues pertaining to the security and sustainability of the emerging cyberspace, which is embedded with intelligent ... More


Meddling in the Ballot Box: The Causes and Effects of Partisan Electoral Interventions

Dov H. Levin

Published in print:
2020
Published Online:
September 2020
ISBN:
9780197519882
eISBN:
9780197519929
Item type:
book
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780197519882.001.0001
Subject:
Political Science, Comparative Politics, International Relations and Politics

This book examines why partisan electoral interventions occur as well as their effects on the election results in countries in which the great powers intervened. A new dataset shows that the U.S. and ... More


Introducing the 10 Toxicities

Eric D. Perakslis and Martin Stanley

in Digital Health: Understanding the Benefit-Risk Patient-Provider Framework

Published in print:
2021
Published Online:
April 2021
ISBN:
9780197503133
eISBN:
9780197503171
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780197503133.003.0008
Subject:
Public Health and Epidemiology, Public Health

The history of medical benefit-risk assessment shows that medical benefits tend to be far easier to demonstrate and quantify. The risks, on the other hand, tend to appear in other bodily systems than ... More


Improving Cyber Security

Ruby B. Lee

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0001
Subject:
Information Science, Information Science

This chapter discusses some promising game-changing strategies for improving cyber security: enabling tailored trustworthy spaces, thwarting attackers with proactive moving target strategies, and ... More


Practical Vulnerabilities of the Tor Anonymity Network

Paul Syverson

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0002
Subject:
Information Science, Information Science

Onion routing is a technology designed at the U.S. Naval Research Laboratory to protect the security and privacy of network communications. In particular, Tor, the current widely used onion routing ... More


Defending Software Systems against Cyber Attacks throughout Their Lifecycle

Hira Agrawal, Thomas F. Bowen, and Sanjai Narain

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0003
Subject:
Information Science, Information Science

Malware enters a software system along three avenues: it is hidden surreptitiously within applications by a malicious developer; it is inserted into the system due to an accidental or a deliberate ... More


Improve Availability of Networks: Internet Exchange Points and Their Role in Cyberspace

Akio Sugeno

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0004
Subject:
Information Science, Information Science

The Internet could not exist without Internet exchange points (IXPs). IXPs provide the mechanisms (physical connections in a data center or carrier hotel) that enable Internet service providers ... More


Tor: Uses and Limitations of Online Anonymity

Andrew Lewman

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0005
Subject:
Information Science, Information Science

Tor is a network of virtual tunnels that allows people and groups to improve their anonymity and security on the Internet. It also enables software developers to create new communication tools with ... More


Authoritative Data Sources: Cyber Security Intelligence Perspectives

Kuan-Tsae Huang and Hwai-Jan Wu

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0006
Subject:
Information Science, Information Science

The United States currently faces a multifaceted, technologically based vulnerability. Its information systems are being exploited on an unprecedented scale by state and non-state actors, resulting ... More


The Evolving Consumer Online Threat Landscape: Creating an Effective Response

Adam Palmer

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0007
Subject:
Information Science, Information Science

The proliferation of Internet-connected devices in the consumer market has created a dramatic shift from a single point PC-based threat risk to an expanded threat perimeter that includes tablet ... More


Partners in Cybercrime

Eileen Monsma, Vincent Buskens, Melvin Soudijn, and Paul Nieuwbeerta

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0008
Subject:
Information Science, Information Science

This chapter looks at cyber crime by analyzing social networks used by cybercriminals. Because a social network is defined as a set of actors (usually individuals) connected by ties (usually the ... More


Securing IT Networks Incorporating Medical Devices: Risk Management and Compliance in Health Care Cyber Security

Nicholas J. Mankovich

in Advances in Cyber Security: Technology, Operations, and Experiences

Published in print:
2013
Published Online:
September 2015
ISBN:
9780823244560
eISBN:
9780823268948
Item type:
chapter
Publisher:
Fordham University Press
DOI:
10.5422/fordham/9780823244560.003.0009
Subject:
Information Science, Information Science

The increasingly digital nature of medical imaging means that medical device output represents the highest volume of digital data in the medical record. Information technology has allowed the direct ... More


View: