The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations.
Features
Explains why data breach defense is currently often ineffective
Shows how to respond to the increasing frequency of data breaches
Combines the issues of technology, business and risk management, and legal liability
Discusses the different issues faced by large versus small and medium-sized businesses (SMBs)
Provides a practical framework in which public policy issues about data breaches can be effectively addressed
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Maße
Höhe: 216 mm
Breite: 140 mm
Dicke: 7 mm
Gewicht
ISBN-13
978-0-367-78791-2 (9780367787912)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Robert H. Sloan, PhD, is a Professor and Head of the Department of Computer Science at the University of Illinois, Chicago.
Richard Warner, PhD, is a Professor Norman and Edna Freehling Scholar at Chicago-Kent College of Law in Illinois.
Autor*in
University of Illinois at Chicago, USA
Chicago-Kent College of Law, Illinois, USA
1 Introduction
2 Software Vulnerabilities
3 (Mis)management: Failing to Defend against Technical Attacks
4 A Mandatory Reporting Proposal
5 Outsourcing Security
6 The Internet of Things
7 Human Vulnerabilities
8 Seeing the Forest: An Overview of Policy Proposals