Skip to main content

Defining the Cybersecurity Challenge

  • Chapter
Enterprise Cybersecurity

Abstract

It appears that lately cybersecurity is in trouble, or at least going through a difficult time. If you are reading this book, you are one of the people trying to make cybersecurity work despite daunting challenges and information technology (IT) environments seemingly ill-suited to facing those challenges. The authors share your concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    FireEye, “Advanced Malware Exposed,” www2.fireeye.com/wp_advmalware_exposed.html , 2011.

  2. 2.

    Bruce Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999.

  3. 3.

    Bruce Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999.

  4. 4.

    Eric M. Hugchins, Michael J. Cloppert, and Rohan M. Amin, Ph.D., “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf , 2011.

  5. 5.

    Mandiant, “APT1: Exposing One of China’s Cyber Espionage Units,” http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf , 2013.

  6. 6.

    Matthew J. Schwartz, “Target Ignored Data Breach Alarms,” www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712 , 2014.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam

About this chapter

Cite this chapter

Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Defining the Cybersecurity Challenge. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_1

Download citation

Publish with us

Policies and ethics