Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Companies are making cybersecurity a greater priority
by Staff Writers
Washington DC (SPX) Jun 17, 2015


File image.

Companies are spending increasing amounts on cybersecurity tools, but aren't convinced their data is truly secure and many chief information security officers believe that attackers are gaining on their defenses, according to a new RAND Corporation study.

Charting the future of cybersecurity is difficult because so much is shrouded in secrecy, no one is entirely certain of all the methods malicious hackers use to infiltrate systems and businesses do not want to disclose their safety measures, according to the report.

While worldwide spending on cybersecurity is close to $70 billion a year and growing at 10 percent to 15 percent annually, many chief information security officers believe that hackers may gain the upper hand two to five years from now, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

"Despite the pessimism in the field, we found that companies are paying a lot more attention to cybersecurity than they were even five years ago," said Martin Libicki, co-lead author of the study and senior management scientist at RAND, a nonprofit research organization.

"Companies that didn't even have a chief information security officer five years ago have one now, and CEOs are more likely to listen to them. Core software is improving and new cybersecurity products continue to appear, which is likely to make a hacker's job more difficult and more expensive."

The RAND study draws on interviews with 18 chief information security officers and details the burgeoning world of cybersecurity products. It also reviews the relationship between software quality and the processes used to discover software vulnerabilities. Insights from these elements were used to develop a model that can shed light on the relationship between organizational choices and the cost of confronting cyberattacks.

"Companies know what they spend on cybersecurity, but quantifying what they save by preventing malicious attacks is much harder to tally," said Lillian Ablon, co-lead author of the report and a researcher at RAND. "In addition, malicious hackers can be extremely sophisticated, so costly measures to improve security beget countermeasures from hackers.

"Cybersecurity is a continual cycle of trying to eliminate weaknesses and out-think an attacker. Currently, the best that defenders can do is to make it expensive for the attackers in terms of money, time, resources and research."

Libicki and Ablon say several of the study's findings surprised them. They found that it was the effect of a cyberattack on reputation - rather than direct costs - that worried most chief information security officers. It matters less what actual data is affected than the fact that any data is put at risk.

However, the process of estimating those losses is not particularly comprehensive, and the ability to understand and articulate an organization's risk from network penetrations in a standard and consistent manner does not exist - and may not exist for the foreseeable future.

RAND created a framework that portrays the struggle of organizations to minimize the cost arising from insecurity in cyberspace over a 10-year period. Those costs include the losses from cyberattack, the direct costs of training users, and the direct cost of buying and using cyber safety tools.

Additional costs also must be factored in, including the indirect costs associated with restrictions on employees using their personal devices on company networks and the indirect costs of air-gapping - ensuring a computer network is physically isolated from unsecure networks. This is particularly true for sensitive sub-networks.

The RAND study includes recommendations for both organizations and policymakers. Organizations need to determine what needs to be protected and how badly, including what machines are on a company's network, what applications are running and what privileges have been established. Employees' desire to bring their own devices and connect them to the company network also can increase vulnerabilities.

Libicki said most of the chief information security officers who were interviewed were not interested in government efforts to improve cybersecurity. However, the RAND researchers believe government could play a useful role. For example, a government guide outlining how systems fail - similar to guides for aviation and medical fields - could help build a body of knowledge to help educate companies with the goal of developing higher levels of cybersecurity.

The study, "The Defender's Dilemma: Charting a Course Toward Cybersecurity," can be found here


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
RAND Corporation
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Journalist denies claim that Snowden files breached
Washington (AFP) June 15, 2015
A journalist who published the first reports from Edward Snowden's leaked documents offered a detailed rebuttal Monday to allegations that Russian and Chinese spies accessed the former intelligence contractor's files. Glenn Greenwald, writing on online news website The Intercept, said the reports by the Sunday Times and BBC were based on the false premise that Snowden kept possession of the ... read more


CYBER WARS
US Authorizes 'Forward-Based' Missile Defense System for Allies

USAF Early Warning Satellites Get No-Cost Update from Lockheed Martin

Boecore to support Army missile defense

Germany opts for MEADS missile defence system

CYBER WARS
Raytheon, Kongsberg extend missile partnership agreement

Javelin demos range, versatility

Egypt orders AASM missiles from Sagem

Aviation security endangered by spread of missiles: study

CYBER WARS
Italy orders Predator UAS simulators

Maneuvering mini drone quickly destroyed in laser test

Four US Surveillance Drones to Be Deployed to Japan Within Six Months

Australian military drones to fly in civilian air space for first time

CYBER WARS
Lockheed, Raytheon, Bombardier team for JSTARS contract bid

New USAF satellites to use updated spacecraft

Harris providing Australia with support for radio system

US Navy accepts third LMC-Built MUOS comsat

CYBER WARS
Northrop Grumman touts its next-generation targeting pod

Thales producing equipment for Canadian vehicles

ONR-sponsored technology to lighten marines' loads

VSE wins places on Army TACOM contracts

CYBER WARS
Spain to decide on lifting A400M flight suspension next week

US Defense Secretary Carter signs defence projects with India

Army contracting official charged in parts investigation

French arms exports in 2014 'best in 15 years'

CYBER WARS
Some building in disputed waters to finish soon: China

An eventful year for Great Britiain

NATO says implementing 'biggest' defence boost since Cold War

Scotland pushes for fiscal autonomy

CYBER WARS
Scientists observe photographic exposure live at the nanoscale

Measuring the mass of molecules on the nano-scale

Novel X-ray lens sharpens view into the nano world

Engineering phase changes in nanoparticle arrays




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.