Corpus ID: 18355372

Improving Federal Cybersecurity Governance Through Data-Driven Decision Making and Execution

@inproceedings{Gray2015ImprovingFC,
  title={Improving Federal Cybersecurity Governance Through Data-Driven Decision Making and Execution},
  author={Douglas Gray and Julia H. Allen and Constantine Aaron Cois and Anne Connell and Erika Ebel and William H. Gulley and Michael Riley and Robert Stoddard and Marie Vaughan and Brian D. Wisniewski},
  year={2015}
}
Applying design system in cybersecurity dashboard development
This thesis evaluates the applicability of a particular Design System in the development of a dashboard that addresses the needs of cybersecurity teams. This work is motivated by the reducedExpand
An analysis of malicious threat agents for the smart connected home
TLDR
This paper analyses six classes of malicious threat agents for smart connected homes and proposes a new threat model that can be used for threat profiling and observes motivations and agents that are not covered in standard agent taxonomies. Expand
PRASH: A Framework for Privacy Risk Analysis of Smart Homes
TLDR
This work proposes a framework, called PRASH, for modeling and analyzing the privacy risks of smart homes, composed of three modules: a system model, a threat model, and a set of privacy metrics, which together are used for calculating the privacy risk exposure of a smart home system. Expand
Security durability assessment through fuzzy analytic hierarchy process
TLDR
This paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2 using the hybrid fuzzy analytic hierarchy process decision analysis approach. Expand

References

SHOWING 1-10 OF 91 REFERENCES
Essence of Decision: Explaining the Cuban Missile Crisis
Allison, G. T., & Zelikow, P. (1999). Essence of decision: Explaining the Cuban missile crisis (Vol. 2). New York: Longman.
Maturity Models 101: A Primer for Applying Maturity Models to Smart Grid Security, Resilience, and Interoperability
Abstract : In recent years, rapid evolutions have occurred in technology and its application in the electric power industry, leading to the introduction of many new systems, business processes,Expand
Energy Security Dimensions and Trends in Industrialized Countries
This article correlates actual energy policy and practice with expert views of the multidimensional concept of energy security. Based on the energy security performance of 22 countries in theExpand
Internet Law in a Nutshell
This clear, handily organized primer is ideally suited for law students or lawyers who need a brief exposition of the core cases and statutes shaping Internet law, technologies, and policies. TheExpand
Accountability
  • 김기경
  • Political Science
  • Encyclopedia of Food and Agricultural Ethics
  • 2019
We are all accountable. We are accountable to a Supreme Being (if we are believers), to our families, and to our employers (or clients, as the case may be). We are accountable to our government (andExpand
The Failure of Risk Management: Why It's Broken and How to Fix It
Preface. Acknowledgments. PART ONE AN INTRODUCTION TO THE CRISIS. CHAPTER 1 Healthy Skepticism for Risk Management. Common Mode Failure. What Counts as Risk Management. Anecdote: The Risk ofExpand
Coming Full Circle with Boyd's OODA Loop Ideas: An Analysis of Innovation Diffusion and Evolution
Abstract : The Observe-Orient-Decide-Act (OODA) Loop ideas of Air Force Colonel John Boyd have impacted the Department of Defense (DoD), influenced military thought, paved the way for operationalExpand
Essence of Decision: Explaining the Cuban Missile Crisis
blockbuster. In the first 16 years (for which figures are available), more than 70,000 copies of Essence of Decision were sold; by its 25th anniversary, more than 1,600 journal articles referenced inExpand
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec. WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formedExpand
Milestones in the History of Data Visualization: A Case Study in Statistical Historiography
TLDR
An overview and brief tour of the milestones content is provided, with a few illustrations of significant contributions to the history of data visualization. Expand
...
1
2
3
4
5
...