publication . Article . 2011

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

Audrey Guinchard;
Open Access English
  • Published: 01 Jan 2011 Journal: Journal of Strategic Security, volume 4, issue 2, pages 75-96 (issn: 1944-0464, eissn: 1944-0472, Copyright policy)
  • Publisher: Henley-Putnam University
Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-existing weaknesses in the underlying technology. Because these vulnerabilities that exist in the network are not themselves illegal, they tend to be overlooked in the debate on cyber security. A UK report on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cybercrime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day to day expenditures for the Government, businesses, and individuals.This article conte...
Persistent Identifiers
ACM Computing Classification System: ComputingMilieux_COMPUTERSANDSOCIETYComputingMilieux_LEGALASPECTSOFCOMPUTINGComputingMilieux_MISCELLANEOUS
free text keywords: Counterterrorism, Cybersecurity, Global trends and risks, Information operations, Science and technology & security, Political Science and International Relations, Sociology and Political Science, Law, Safety Research, lcsh:Military Science, lcsh:U, Exploit, Government, Business, Distributed knowledge, Computer security, computer.software_genre, computer, Cyberwarfare, Cyberspace, Vulnerability, Terrorism, Cybercrime
Any information missing or wrong?Report an Issue