Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Companies are making cybersecurity a greater priority
by Staff Writers
Washington DC (SPX) Jun 17, 2015


File image.

Companies are spending increasing amounts on cybersecurity tools, but aren't convinced their data is truly secure and many chief information security officers believe that attackers are gaining on their defenses, according to a new RAND Corporation study.

Charting the future of cybersecurity is difficult because so much is shrouded in secrecy, no one is entirely certain of all the methods malicious hackers use to infiltrate systems and businesses do not want to disclose their safety measures, according to the report.

While worldwide spending on cybersecurity is close to $70 billion a year and growing at 10 percent to 15 percent annually, many chief information security officers believe that hackers may gain the upper hand two to five years from now, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

"Despite the pessimism in the field, we found that companies are paying a lot more attention to cybersecurity than they were even five years ago," said Martin Libicki, co-lead author of the study and senior management scientist at RAND, a nonprofit research organization.

"Companies that didn't even have a chief information security officer five years ago have one now, and CEOs are more likely to listen to them. Core software is improving and new cybersecurity products continue to appear, which is likely to make a hacker's job more difficult and more expensive."

The RAND study draws on interviews with 18 chief information security officers and details the burgeoning world of cybersecurity products. It also reviews the relationship between software quality and the processes used to discover software vulnerabilities. Insights from these elements were used to develop a model that can shed light on the relationship between organizational choices and the cost of confronting cyberattacks.

"Companies know what they spend on cybersecurity, but quantifying what they save by preventing malicious attacks is much harder to tally," said Lillian Ablon, co-lead author of the report and a researcher at RAND. "In addition, malicious hackers can be extremely sophisticated, so costly measures to improve security beget countermeasures from hackers.

"Cybersecurity is a continual cycle of trying to eliminate weaknesses and out-think an attacker. Currently, the best that defenders can do is to make it expensive for the attackers in terms of money, time, resources and research."

Libicki and Ablon say several of the study's findings surprised them. They found that it was the effect of a cyberattack on reputation - rather than direct costs - that worried most chief information security officers. It matters less what actual data is affected than the fact that any data is put at risk.

However, the process of estimating those losses is not particularly comprehensive, and the ability to understand and articulate an organization's risk from network penetrations in a standard and consistent manner does not exist - and may not exist for the foreseeable future.

RAND created a framework that portrays the struggle of organizations to minimize the cost arising from insecurity in cyberspace over a 10-year period. Those costs include the losses from cyberattack, the direct costs of training users, and the direct cost of buying and using cyber safety tools.

Additional costs also must be factored in, including the indirect costs associated with restrictions on employees using their personal devices on company networks and the indirect costs of air-gapping - ensuring a computer network is physically isolated from unsecure networks. This is particularly true for sensitive sub-networks.

The RAND study includes recommendations for both organizations and policymakers. Organizations need to determine what needs to be protected and how badly, including what machines are on a company's network, what applications are running and what privileges have been established. Employees' desire to bring their own devices and connect them to the company network also can increase vulnerabilities.

Libicki said most of the chief information security officers who were interviewed were not interested in government efforts to improve cybersecurity. However, the RAND researchers believe government could play a useful role. For example, a government guide outlining how systems fail - similar to guides for aviation and medical fields - could help build a body of knowledge to help educate companies with the goal of developing higher levels of cybersecurity.

The study, "The Defender's Dilemma: Charting a Course Toward Cybersecurity," can be found here


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
RAND Corporation
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Journalist denies claim that Snowden files breached
Washington (AFP) June 15, 2015
A journalist who published the first reports from Edward Snowden's leaked documents offered a detailed rebuttal Monday to allegations that Russian and Chinese spies accessed the former intelligence contractor's files. Glenn Greenwald, writing on online news website The Intercept, said the reports by the Sunday Times and BBC were based on the false premise that Snowden kept possession of the ... read more


CYBER WARS
Crashing comets may explain mysterious lunar swirls

Google Lunar X-Prize meets Yoda

China, Russia plan joint landing on the Moon

NASA's LRO Moves Closer to the Lunar Surface

CYBER WARS
Red Planet Rising

Japanese space agency plans to get samples from Martian moon

Martian glass: Window into possible past life?

Supersonic NASA parachute torn to pieces in latest test

CYBER WARS
XCOR Selects Matrix Composites to Develop Lynx Chines

Spacecraft glitch shifts orbiting ISS: Russia

NASA's LDSD Project Completes Second Experimental Test Flight

ESA astronaut Samantha Cristoforetti returning home

CYBER WARS
Electric thruster propels China's interstellar ambitions

China Plans First Ever Landing On The Lunar Far Side

China ranked 4th among world space powers

3D printer making Chinese space suit parts

CYBER WARS
'Hard landing' as three astronauts return to Earth from ISS

ISS Adjusts Orbit to Evade Space Junk

Space station back on track after mystery Soyuz glitch

Russia aims for launch of next manned flight to ISS in July

CYBER WARS
SpaceX achieves pad abort milestone approval for Commercial Crew

NASA issues RFP for New Class of Launch Services

Garvey Spacecraft selects Pacific Spaceport Complex

MSG-4 and S1 C4 make initial contact with Ariane 5 launcher hardware

CYBER WARS
Hubble detects stratosphere-like layer around exoplanet

Work-experience schoolboy discovers a new planet

Hubble in 'Oh Planet, What Art Thou?' 25th Anniversary Video

Astronomers discover a young solar system around a nearby star

CYBER WARS
Radar system approved for allies

First US deep space weather satellite reaches final orbit

China launches space junk monitoring center

Robot to 3D-print steel canal bridge in Amsterdam




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.