dc.contributor.author | Goldsmith, Daniel | |
dc.contributor.author | Siegel, Michael | |
dc.date.accessioned | 2022-04-07T17:37:06Z | |
dc.date.available | 2022-04-07T17:37:06Z | |
dc.date.issued | 2012 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/141759 | |
dc.description.abstract | Recent developments have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, and attacks. While current efforts are underway to introduce new methodologies and techniques to manage risks, particularly localized risks (such as those at a particular firm), developing resiliency at the system level requires transformative thinking to increase collaborative situational awareness, improve our understanding of risk, foster strategic coordination, and define actionable plans at the sector level to address pervasive sector-wide risk. The overall goal of this research is to develop innovative management and operational approaches using experts, emerging data sets, policy analysis, and relevant theory, along with simulation- modeling, to enable real-world implementation of high-leverage opportunities to promote corporate resiliency to cyber threats. | en_US |
dc.description.sponsorship | This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | © Massachusetts Institute of Technology | en_US |
dc.relation.ispartofseries | ECIR Working Paper No. 2012-5 | |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.title | Systematic approaches to cyber insecurity | en_US |
dc.type | Working Paper | en_US |
dc.identifier.citation | Goldsmith, D., & Siegal, M. (2012). Systematic approaches to cyber insecurity (ECIR Working Paper No. 2012-5). MIT Political Science Department. | en_US |
dc.eprint.version | Author's final manuscript. | en_US |