Show simple item record

dc.contributor.authorWolff, Josephine
dc.date.accessioned2022-04-04T05:21:25Z
dc.date.available2022-04-04T05:21:25Z
dc.date.issued2012-11-06
dc.identifier.urihttps://hdl.handle.net/1721.1/141617
dc.descriptionPoster presented in the workshop on “Who Controls Cyberspace,” MIT, Cambridge, MA, United States, November 6-7, 2012.en_US
dc.description.abstractInvestment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on the frequency of breaches, the costs associated with those breaches, and the effectiveness of countermeasures, for organizations to be able to perform meaningful ALE calculations. With rising rates of both IT security spending and online attacks, surveys indicate that many business and government executives are unsure of how to allocate resources for defense and whether their investments in security measures are making anyen_US
dc.description.sponsorshipThis material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.en_US
dc.language.isoen_USen_US
dc.publisherExplorations in Cyber International Relationsen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.titleCyber defense resources & vulnerabilitiesen_US
dc.typeOther (Poster)en_US
dc.identifier.citationWolff, J. (2012, November 6–7). Cyber defense resources & vulnerabilities [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.en_US
dc.eprint.versionFinal published version.en_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record