Showing 1 - 10 of 15
With the Russian government hack of the Democratic National Convention email servers, and further leaks expected over the coming months that could influence an election, the drama of the 2016 U.S. presidential race highlights an important point: Nefarious hackers do not just pose a risk to...
Persistent link: https://www.econbiz.de/10014124891
Persistent link: https://www.econbiz.de/10004736520
Persistent link: https://www.econbiz.de/10009519503
Persistent link: https://www.econbiz.de/10002538407
Persistent link: https://www.econbiz.de/10009654611
Persistent link: https://www.econbiz.de/10007590926
Persistent link: https://www.econbiz.de/10012096646
Despite recent work challenging offense dominance in cyberspace, scholars and policymakers still view offensive operations as dominating defense. Why do these sides come to very different conclusions about the nature and utility of offensive cyber capabilities? Disagreements are due to a poor...
Persistent link: https://www.econbiz.de/10012982200
Internet Security Governance covers the policy challenges that arise from building and governing security in the Internet’s architecture and key protocols. It includes the discussion of defensively oriented technical and legal topics that cross national boundaries and/or involve security of...
Persistent link: https://www.econbiz.de/10014131844
Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes...
Persistent link: https://www.econbiz.de/10014134844