Abstract
It appears that lately cybersecurity is in trouble, or at least going through a difficult time. If you are reading this book, you are one of the people trying to make cybersecurity work despite daunting challenges and information technology (IT) environments seemingly ill-suited to facing those challenges. The authors share your concerns.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
FireEye, “Advanced Malware Exposed,” www2.fireeye.com/wp_advmalware_exposed.html , 2011.
- 2.
Bruce Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999.
- 3.
Bruce Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999.
- 4.
Eric M. Hugchins, Michael J. Cloppert, and Rohan M. Amin, Ph.D., “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf , 2011.
- 5.
Mandiant, “APT1: Exposing One of China’s Cyber Espionage Units,” http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf , 2013.
- 6.
Matthew J. Schwartz, “Target Ignored Data Breach Alarms,” www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712 , 2014.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Defining the Cybersecurity Challenge. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_1
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6083-7_1
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6082-0
Online ISBN: 978-1-4302-6083-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books