dc.contributor.author | Wolff, Josephine | |
dc.date.accessioned | 2022-04-04T05:21:25Z | |
dc.date.available | 2022-04-04T05:21:25Z | |
dc.date.issued | 2012-11-06 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/141617 | |
dc.description | Poster presented in the workshop on “Who Controls Cyberspace,” MIT, Cambridge, MA, United States, November 6-7, 2012. | en_US |
dc.description.abstract | Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on the frequency of breaches, the costs associated with those breaches, and the effectiveness of countermeasures, for organizations to be able to perform meaningful ALE calculations. With rising rates of both IT security spending and online attacks, surveys indicate that many business and government executives are unsure of how to allocate resources for defense and whether their investments in security measures are making any | en_US |
dc.description.sponsorship | This material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Explorations in Cyber International Relations | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.title | Cyber defense resources & vulnerabilities | en_US |
dc.type | Other (Poster) | en_US |
dc.identifier.citation | Wolff, J. (2012, November 6–7). Cyber defense resources & vulnerabilities [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA. | en_US |
dc.eprint.version | Final published version. | en_US |