"Hacking Back – Offense/Defense in Enterprise IT Security", by Edgar Hurtado Jr, East Carolina University ICTN-4040: Enterprise Information Security, April 2017, 9 pages.
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Thursday, April 27, 2017
IISS Cyber Report: 13 to 19 April, 2017
"IISS Cyber Report: 13 to 19 April", 2017. This online report is a weekly digest of the world's cyber security news.
A Tech Accord to protect people in cyberspace
"A Tech Accord to protect people in cyberspace", Microsoft Policy Papers, April 2017.
"People need to trust technology, the makers of technology, and cyberspace itself" [...] "The government and the technology industry must partner on cybersecurity".
Microsoft suggests to share responsibilities in the governance of cybersecurity between private and state actors.
A Digital Geneva Convention to protect cyberspace
"A Digital Geneva Convention to protect cyberspace", Microsoft Policy Papers, April 2017.
"Governments continue to invest in greater offensive capabilities in cyberspace, and nation-state attacks
on civilians are on the rise" [...] "A Digital Geneva Convention would create a legally binding framework to govern states’ behavior in
cyberspace".
An attribution organization to strengthen trust online
"An attribution organization to strengthen trust online", Microsoft Policy Papers, April 2017.
"The world needs a new form of cyber defense. An organization that could receive and analyze the
evidence related to a suspected state-backed cyberattack, and that could then credibly and publicly
identify perpetrators, would make a major difference to the trust in the digital world." [...] "The expertise of private sector technology firms should be the basis of this non-political, technicallyfocused
attribution organization."
But should the privatization of such attribution function guarantee transparency, efficiency, and politically-neutral analysis and interpretation of facts and data?
Wednesday, April 26, 2017
Cybersecurity in the Defense Acquisition System
"Cybersecurity in the Defense Acquisition System", DAU, USA, April 2017, 27 pages. Download.
UK - Cyber security breaches survey 2017
"Cyber security breaches survey 2017", Main Report, April 2017, 66 pages, UK.
"This report details the findings from a quantitative and qualitative survey with UK businesses on cyber
security. The Department for Culture, Media and Sport (DCMS) commissioned the survey as part of the
National Cyber Security Programme, following a previous comparable study by the Department
published in 2016.
1
It was carried out by Ipsos MORI, in partnership with the Institute for Criminal Justice
Studies at the University of Portsmouth, and comprised:
▪ a telephone survey of 1,523 UK businesses from 24 October 2016 to 11 January 20172
▪ 30 in-depth interviews undertaken in January and February 2017 to follow up businesses that
participated in the survey...."
Subscribe to:
Posts (Atom)