語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity: Challenging rhetoric ...
~
Rumsey, Matthew Joseph.
FindBook
Google Book
Amazon
博客來
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors./
作者:
Rumsey, Matthew Joseph.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
面頁冊數:
145 p.
附註:
Source: Masters Abstracts International, Volume: 56-01.
Contained By:
Masters Abstracts International56-01(E).
標題:
Criminology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10150236
ISBN:
9781369052770
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
Rumsey, Matthew Joseph.
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 145 p.
Source: Masters Abstracts International, Volume: 56-01.
Thesis (M.S.)--San Diego State University, 2016.
Corporations and particularly defense industries have long relied on computers to automate and protect critical and national infrastructure. They have also served to advance scientific exploration in ways never thought possible. Through ever-evolving technological breakthroughs there is a constant march towards ever-improved network architectures that allow more flexible and efficient protocols to be used. The Internet has become a cornerstone of modern society at home and is rapidly moving into a world saturated by mini-, micro- and nano-sized sensor devices collectively known as the "Internet of Things." We increasingly trust our personal, private, and confidential data and information to private and public institutions that we are relying on to protect it. Because this data is so valuable and yet also continually needed, it is critical that it is kept both available and confidential so that the integrity can be maintained but still allowing near real-time use of the data. The value of data makes it the target of criminals, hackers and nation states. The media warn us to expect a "cyber Pearl Harbor", a "cyber Katrina" and a "cyber Armageddon". This thesis will analyze some of the historical and current approaches to cybersecurity, the rhetoric used to describe cyber incidents and discuss defensive and offensive measures against real threat actors. It will outline a path forward as the world enters an era of quantum computing and sensor-network saturation unseen in past human history. By challenging rhetoric, we ensure the threat is understood accurately and that we maintain an appropriate cybersecurity posture. By not challenging rhetoric, we risk becoming a society whereby we our technology is limited by being too secure and not functional or easy enough to use. Therefore, the recommendations are multi-faceted since, in cybersecurity, there is no single implementation that can protect against all threats. The recommendations can be applied to cybersecurity concerns whether they are personal, corporate or government.
ISBN: 9781369052770Subjects--Topical Terms:
533274
Criminology.
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
LDR
:03009nmm a2200301 4500
001
2121739
005
20170811100936.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781369052770
035
$a
(MiAaPQ)AAI10150236
035
$a
AAI10150236
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rumsey, Matthew Joseph.
$3
3283672
245
1 0
$a
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
145 p.
500
$a
Source: Masters Abstracts International, Volume: 56-01.
500
$a
Adviser: Eric G. Frost.
502
$a
Thesis (M.S.)--San Diego State University, 2016.
520
$a
Corporations and particularly defense industries have long relied on computers to automate and protect critical and national infrastructure. They have also served to advance scientific exploration in ways never thought possible. Through ever-evolving technological breakthroughs there is a constant march towards ever-improved network architectures that allow more flexible and efficient protocols to be used. The Internet has become a cornerstone of modern society at home and is rapidly moving into a world saturated by mini-, micro- and nano-sized sensor devices collectively known as the "Internet of Things." We increasingly trust our personal, private, and confidential data and information to private and public institutions that we are relying on to protect it. Because this data is so valuable and yet also continually needed, it is critical that it is kept both available and confidential so that the integrity can be maintained but still allowing near real-time use of the data. The value of data makes it the target of criminals, hackers and nation states. The media warn us to expect a "cyber Pearl Harbor", a "cyber Katrina" and a "cyber Armageddon". This thesis will analyze some of the historical and current approaches to cybersecurity, the rhetoric used to describe cyber incidents and discuss defensive and offensive measures against real threat actors. It will outline a path forward as the world enters an era of quantum computing and sensor-network saturation unseen in past human history. By challenging rhetoric, we ensure the threat is understood accurately and that we maintain an appropriate cybersecurity posture. By not challenging rhetoric, we risk becoming a society whereby we our technology is limited by being too secure and not functional or easy enough to use. Therefore, the recommendations are multi-faceted since, in cybersecurity, there is no single implementation that can protect against all threats. The recommendations can be applied to cybersecurity concerns whether they are personal, corporate or government.
590
$a
School code: 0220.
650
4
$a
Criminology.
$3
533274
650
4
$a
Military studies.
$3
2197382
650
4
$a
Information science.
$3
554358
690
$a
0627
690
$a
0750
690
$a
0723
710
2
$a
San Diego State University.
$b
Homeland Security.
$3
2099554
773
0
$t
Masters Abstracts International
$g
56-01(E).
790
$a
0220
791
$a
M.S.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10150236
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9332355
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入