Amazon cover image
Image from Amazon.com

Evidence-based cybersecurity : foundations, research, and practice / by Pierre-Luc Pomerleau and David Maimon

By: Contributor(s): Material type: TextTextPublication details: Boca Raton, FL : CRC Press, c2022.Description: xix, 230 pages : figures and tables ; 25 cmISBN:
  • 9781032062761
Subject(s): LOC classification:
  • QA76.9.A25 P78 2022
Contents:
1. The Case for an Evidence-Based Approach to Cybersecurity2. Computers, Computers Networks, the Internet, and Cybersecurity3. Human Behavior in Cyberspace4. Criminological, Sociological, Psychological, Ethical and Biological Models Relevant to Cybercrime and Cybercriminals5. Science and Cybersecurity 6. Network Security and Intrusion Detection Systems7. The Internet of Things (IoT), Data and Website Security8. Data Privacy, Training, and Awareness and Cybersecurity Frameworks9. Risk and Threat Intelligence: The Effectiveness of Online Threat Intelligence in Guiding Financial Institutions' Incident Response to Online Banking Account Takeovers 10. The Future of Evidence-Based Cybersecurity.
Abstract: "The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed during the process of encouraging innovation and marketing. Consequently, governmental organizations, public and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving the performances of a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making processes regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals in protecting critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers political, financial, social backgrounds, and personal experiences when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Books Books Philippine Christian University Manila Reserve College QA76.9.A25 P78 2022 (Browse shelf(Opens below)) Not For Loan 52937

Includes bibliographical references and index.

1. The Case for an Evidence-Based Approach to Cybersecurity2. Computers, Computers Networks, the Internet, and Cybersecurity3. Human Behavior in Cyberspace4. Criminological, Sociological, Psychological, Ethical and Biological Models Relevant to Cybercrime and Cybercriminals5. Science and Cybersecurity 6. Network Security and Intrusion Detection Systems7. The Internet of Things (IoT), Data and Website Security8. Data Privacy, Training, and Awareness and Cybersecurity Frameworks9. Risk and Threat Intelligence: The Effectiveness of Online Threat Intelligence in Guiding Financial Institutions' Incident Response to Online Banking Account Takeovers 10. The Future of Evidence-Based Cybersecurity.

"The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed during the process of encouraging innovation and marketing. Consequently, governmental organizations, public and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving the performances of a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in the context of existing security tools and policies, and the authors provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making processes regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals in protecting critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers political, financial, social backgrounds, and personal experiences when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings"-- Provided by publisher.

There are no comments on this title.

to post a comment.
credits

© 2024 PCU Learning Resource Center, All Rights Reserved