Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on...
Main Author: | Audrey Guinchard |
---|---|
Format: | Article |
Language: | English |
Published: |
Henley-Putnam University
2011-01-01
|
Series: | Journal of Strategic Security |
Subjects: | |
Online Access: | http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1107&context=jss |
Similar Items
-
Forecasting Terrorism: The Need for a More Systematic Approach
by: Edwin Bakker
Published: (2012-01-01) -
Perspectives on Securing the Transportation System
by: Raj Bridgelall
Published: (2022-11-01) -
Going Global: The International Dimensions of U.S. Homeland Security Policy
by: Austen D. Givens, et al.
Published: (2018-10-01) -
Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses
by: Stephen Herzog
Published: (2011-01-01) -
The Geography of International Terrorism: An Introduction to Spaces and Places of Violent Non-State Groups. By Richard M. Medina and George F. Hepner. Boca Raton, FL: CRC Press, 2013. ISBN 978-1-4398-8686-1. Maps. Photographs. Sources cite. Index. Pp. xiii, 244. $79.95.
by: Mark Roberts
Published: (2013-12-01)