Think! Evidence

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

Show simple item record

dc.creator Audrey Guinchard
dc.date 2011-01-01T00:00:00Z
dc.identifier 1944-0464
dc.identifier 1944-0472
dc.identifier https://doaj.org/article/9c60d41f956a46c594a1f5f47922f295
dc.description Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.
dc.language English
dc.publisher Henley-Putnam University
dc.relation http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1107&context=jss
dc.relation https://doaj.org/toc/1944-0464
dc.relation https://doaj.org/toc/1944-0472
dc.source Journal of Strategic Security, Vol 4, Iss 2, Pp 75-96 (2011)
dc.subject Counterterrorism
dc.subject Cybersecurity
dc.subject Global trends and risks
dc.subject Information operations
dc.subject Science and technology & security
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.title Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
dc.type article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account