Abstract
It appears that lately cybersecurity is in trouble, or at least going through a difficult time. If you are reading this book, you are one of the people trying to make cybersecurity work despite daunting challenges and information technology (IT) environments seemingly ill-suited to facing those challenges. The authors share your concerns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
FireEye, “Advanced Malware Exposed,” www2.fireeye.com/wp_advmalware_exposed.html , 2011.
- 2.
Bruce Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999.
- 3.
Bruce Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999.
- 4.
Eric M. Hugchins, Michael J. Cloppert, and Rohan M. Amin, Ph.D., “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf , 2011.
- 5.
Mandiant, “APT1: Exposing One of China’s Cyber Espionage Units,” http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf , 2013.
- 6.
Matthew J. Schwartz, “Target Ignored Data Breach Alarms,” www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712 , 2014.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Defining the Cybersecurity Challenge. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_1
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6083-7_1
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6082-0
Online ISBN: 978-1-4302-6083-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)