Subscribe free to our newsletters via your
. Solar Energy News .




CYBER WARS
Companies are making cybersecurity a greater priority
by Staff Writers
Washington DC (SPX) Jun 17, 2015


File image.

Companies are spending increasing amounts on cybersecurity tools, but aren't convinced their data is truly secure and many chief information security officers believe that attackers are gaining on their defenses, according to a new RAND Corporation study.

Charting the future of cybersecurity is difficult because so much is shrouded in secrecy, no one is entirely certain of all the methods malicious hackers use to infiltrate systems and businesses do not want to disclose their safety measures, according to the report.

While worldwide spending on cybersecurity is close to $70 billion a year and growing at 10 percent to 15 percent annually, many chief information security officers believe that hackers may gain the upper hand two to five years from now, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

"Despite the pessimism in the field, we found that companies are paying a lot more attention to cybersecurity than they were even five years ago," said Martin Libicki, co-lead author of the study and senior management scientist at RAND, a nonprofit research organization.

"Companies that didn't even have a chief information security officer five years ago have one now, and CEOs are more likely to listen to them. Core software is improving and new cybersecurity products continue to appear, which is likely to make a hacker's job more difficult and more expensive."

The RAND study draws on interviews with 18 chief information security officers and details the burgeoning world of cybersecurity products. It also reviews the relationship between software quality and the processes used to discover software vulnerabilities. Insights from these elements were used to develop a model that can shed light on the relationship between organizational choices and the cost of confronting cyberattacks.

"Companies know what they spend on cybersecurity, but quantifying what they save by preventing malicious attacks is much harder to tally," said Lillian Ablon, co-lead author of the report and a researcher at RAND. "In addition, malicious hackers can be extremely sophisticated, so costly measures to improve security beget countermeasures from hackers.

"Cybersecurity is a continual cycle of trying to eliminate weaknesses and out-think an attacker. Currently, the best that defenders can do is to make it expensive for the attackers in terms of money, time, resources and research."

Libicki and Ablon say several of the study's findings surprised them. They found that it was the effect of a cyberattack on reputation - rather than direct costs - that worried most chief information security officers. It matters less what actual data is affected than the fact that any data is put at risk.

However, the process of estimating those losses is not particularly comprehensive, and the ability to understand and articulate an organization's risk from network penetrations in a standard and consistent manner does not exist - and may not exist for the foreseeable future.

RAND created a framework that portrays the struggle of organizations to minimize the cost arising from insecurity in cyberspace over a 10-year period. Those costs include the losses from cyberattack, the direct costs of training users, and the direct cost of buying and using cyber safety tools.

Additional costs also must be factored in, including the indirect costs associated with restrictions on employees using their personal devices on company networks and the indirect costs of air-gapping - ensuring a computer network is physically isolated from unsecure networks. This is particularly true for sensitive sub-networks.

The RAND study includes recommendations for both organizations and policymakers. Organizations need to determine what needs to be protected and how badly, including what machines are on a company's network, what applications are running and what privileges have been established. Employees' desire to bring their own devices and connect them to the company network also can increase vulnerabilities.

Libicki said most of the chief information security officers who were interviewed were not interested in government efforts to improve cybersecurity. However, the RAND researchers believe government could play a useful role. For example, a government guide outlining how systems fail - similar to guides for aviation and medical fields - could help build a body of knowledge to help educate companies with the goal of developing higher levels of cybersecurity.

The study, "The Defender's Dilemma: Charting a Course Toward Cybersecurity," can be found here


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
RAND Corporation
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Journalist denies claim that Snowden files breached
Washington (AFP) June 15, 2015
A journalist who published the first reports from Edward Snowden's leaked documents offered a detailed rebuttal Monday to allegations that Russian and Chinese spies accessed the former intelligence contractor's files. Glenn Greenwald, writing on online news website The Intercept, said the reports by the Sunday Times and BBC were based on the false premise that Snowden kept possession of the ... read more


CYBER WARS
Leaving on a biofueled jet plane

Land management practices to become important as biofuels use grows

Scientists create eco-friendly jet fuel from sugarcane

Dutch 'paddy power' pulls electricity from rice fields

CYBER WARS
RoboSimian Drives, Walks and Drills in Robotics Finals

Robot eyes will benefit from insect vision

Helping robots handle uncertainty

Using Minecraft to unboggle the robot mind

CYBER WARS
Victoria open for clean energy business after wind farm changes

Keeping energy clean and the countryside quiet

NREL, Clemson University collaborate on wind energy testing facilities

South Africa advancing wind energy plans

CYBER WARS
California ruling against Uber hits at business model

India's booming taxi-app firms endure bumpy ride

China tech giant Baidu to develop driverless car: media

Tesla boss downplays government subsidy as 'pittance'

CYBER WARS
Graphene gets bright with ultra thin lightbulb

Stanford engineers develop a computer that operates on water droplets

A clear look at an efficient energy converter

Trees are source for high-capacity, soft and elastic batteries

CYBER WARS
Vietnam to evacuate 1,288 households for construction of nuke power plants

Kiev Claims Nuclear Facilities in Crimea Belong to Ukraine

Japan Prepares to Restart Sendai NPP

S. Korea to close its oldest reactor

CYBER WARS
Engineers develop plan to convert US to 100 percent renewable energy

Finland to start selling electricity to Russia

Ethiopia to cut carbon emissions by two-thirds by 2030

UNIDO: China needs greener agenda

CYBER WARS
Changing climate prompts boreal forest shift

Predicting tree mortality

When trees aren't 'green'

Japanese tree plantations causing nitrogen pollution




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.