Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity: Challenging rhetoric ...
~
Rumsey, Matthew Joseph.
Linked to FindBook
Google Book
Amazon
博客來
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors./
Author:
Rumsey, Matthew Joseph.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
Description:
145 p.
Notes:
Source: Masters Abstracts International, Volume: 56-01.
Contained By:
Masters Abstracts International56-01(E).
Subject:
Criminology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10150236
ISBN:
9781369052770
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
Rumsey, Matthew Joseph.
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 145 p.
Source: Masters Abstracts International, Volume: 56-01.
Thesis (M.S.)--San Diego State University, 2016.
Corporations and particularly defense industries have long relied on computers to automate and protect critical and national infrastructure. They have also served to advance scientific exploration in ways never thought possible. Through ever-evolving technological breakthroughs there is a constant march towards ever-improved network architectures that allow more flexible and efficient protocols to be used. The Internet has become a cornerstone of modern society at home and is rapidly moving into a world saturated by mini-, micro- and nano-sized sensor devices collectively known as the "Internet of Things." We increasingly trust our personal, private, and confidential data and information to private and public institutions that we are relying on to protect it. Because this data is so valuable and yet also continually needed, it is critical that it is kept both available and confidential so that the integrity can be maintained but still allowing near real-time use of the data. The value of data makes it the target of criminals, hackers and nation states. The media warn us to expect a "cyber Pearl Harbor", a "cyber Katrina" and a "cyber Armageddon". This thesis will analyze some of the historical and current approaches to cybersecurity, the rhetoric used to describe cyber incidents and discuss defensive and offensive measures against real threat actors. It will outline a path forward as the world enters an era of quantum computing and sensor-network saturation unseen in past human history. By challenging rhetoric, we ensure the threat is understood accurately and that we maintain an appropriate cybersecurity posture. By not challenging rhetoric, we risk becoming a society whereby we our technology is limited by being too secure and not functional or easy enough to use. Therefore, the recommendations are multi-faceted since, in cybersecurity, there is no single implementation that can protect against all threats. The recommendations can be applied to cybersecurity concerns whether they are personal, corporate or government.
ISBN: 9781369052770Subjects--Topical Terms:
533274
Criminology.
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
LDR
:03009nmm a2200301 4500
001
2121739
005
20170811100936.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781369052770
035
$a
(MiAaPQ)AAI10150236
035
$a
AAI10150236
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rumsey, Matthew Joseph.
$3
3283672
245
1 0
$a
Cybersecurity: Challenging rhetoric to identify the future of defensive and offensive measures against defined threat actors.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
145 p.
500
$a
Source: Masters Abstracts International, Volume: 56-01.
500
$a
Adviser: Eric G. Frost.
502
$a
Thesis (M.S.)--San Diego State University, 2016.
520
$a
Corporations and particularly defense industries have long relied on computers to automate and protect critical and national infrastructure. They have also served to advance scientific exploration in ways never thought possible. Through ever-evolving technological breakthroughs there is a constant march towards ever-improved network architectures that allow more flexible and efficient protocols to be used. The Internet has become a cornerstone of modern society at home and is rapidly moving into a world saturated by mini-, micro- and nano-sized sensor devices collectively known as the "Internet of Things." We increasingly trust our personal, private, and confidential data and information to private and public institutions that we are relying on to protect it. Because this data is so valuable and yet also continually needed, it is critical that it is kept both available and confidential so that the integrity can be maintained but still allowing near real-time use of the data. The value of data makes it the target of criminals, hackers and nation states. The media warn us to expect a "cyber Pearl Harbor", a "cyber Katrina" and a "cyber Armageddon". This thesis will analyze some of the historical and current approaches to cybersecurity, the rhetoric used to describe cyber incidents and discuss defensive and offensive measures against real threat actors. It will outline a path forward as the world enters an era of quantum computing and sensor-network saturation unseen in past human history. By challenging rhetoric, we ensure the threat is understood accurately and that we maintain an appropriate cybersecurity posture. By not challenging rhetoric, we risk becoming a society whereby we our technology is limited by being too secure and not functional or easy enough to use. Therefore, the recommendations are multi-faceted since, in cybersecurity, there is no single implementation that can protect against all threats. The recommendations can be applied to cybersecurity concerns whether they are personal, corporate or government.
590
$a
School code: 0220.
650
4
$a
Criminology.
$3
533274
650
4
$a
Military studies.
$3
2197382
650
4
$a
Information science.
$3
554358
690
$a
0627
690
$a
0750
690
$a
0723
710
2
$a
San Diego State University.
$b
Homeland Security.
$3
2099554
773
0
$t
Masters Abstracts International
$g
56-01(E).
790
$a
0220
791
$a
M.S.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10150236
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9332355
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login