Nothing Special   »   [go: up one dir, main page]

skip to main content
opinion
Free access

Why is cybersecurity not a human-scale problem anymore?

Published: 20 March 2020 Publication History

Abstract

Examining the structure of the enterprise attack surface in view of the relative ease with which cyberdefenses can be subverted.

References

[1]
Bailey, K. Why compliance does not equal security; http://bit.ly/2H3LymD
[2]
Banga, G. Balbix Blog: What is cyber-resilience? (2017); http://bit.ly/2Sr0XCD
[3]
Banga, G. Cybersecurity 101 for the C-suite and board members; http://bit.ly/39hA0YS
[4]
Das, A. et al. The tangled web of password reuse. NDSS Symposium 2014; http://bit.ly/3bivr2o
[5]
IBM. Cost of a Data Breach Study by Ponemon (2018); https://ibm.co/374AK1Z
[6]
NIST. Framework for Improving Critical Infrastructure Cybersecurity (2018); http://bit.ly/3biv9Zm
[7]
Syed, S. CloudPassage blog: U.S. universities get "F" for cybersecurity education (2016); http://bit.ly/2OBIkLr
[8]
U.S. Government Accountability Office. Report to Congressional Requesters: Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach; http://bit.ly/2Sv2DLH
[9]
Verizon. Data Breach Investigations Report (2017); https://vz.to/2Stn2R4
[10]
Ward, R. and Beyer, B. BeyondCorp: A new approach to enterprise security. ;login: 39, 6 (June 2014): http://bit.ly/2Oxo3GE
[11]
Wikipedia. 2012 LinkedIn hack (2012), http://bit.ly/2SqnLmf

Cited By

View all

Index Terms

  1. Why is cybersecurity not a human-scale problem anymore?

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 63, Issue 4
    April 2020
    115 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/3389339
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 March 2020
    Published in CACM Volume 63, Issue 4

    Check for updates

    Qualifiers

    • Opinion
    • Popular
    • Un-reviewed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)658
    • Downloads (Last 6 weeks)91
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Dealing with uncertainty in cybersecurity decision supportComputers & Security10.1016/j.cose.2024.104153148(104153)Online publication date: Jan-2025
    • (2023)Use of SecureED as a Tool for Software Security Education: An Experience Report2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10343394(1-7)Online publication date: 18-Oct-2023
    • (2023)Learning from safety scienceComputers and Security10.1016/j.cose.2023.103435134:COnline publication date: 1-Nov-2023
    • (2022)Behavioral attributes in password reuse: Analysis of password practices in work and personal spacesProceedings of the 13th Indian Conference on Human-Computer Interaction10.1145/3570211.3570212(1-19)Online publication date: 9-Nov-2022
    • (2022)Integrating vulnerability risk into the software processProceedings of the 2022 ACM Southeast Conference10.1145/3476883.3520217(91-98)Online publication date: 18-Apr-2022
    • (2022)Optimization-Time Analysis for CybersecurityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.305598119:4(2365-2383)Online publication date: 1-Jul-2022
    • (2022)Improving the cybersecurity of medical systems by applying the NIST framework2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)10.1109/ECAI54874.2022.9847498(1-7)Online publication date: 30-Jun-2022
    • (2022)IT assimilation: construct, measurement, and implications in cybersecurityEnterprise Information Systems10.1080/17517575.2022.205218717:7Online publication date: 16-Mar-2022
    • (2020)Deep Reinforcement Adversarial Learning Against Botnet Evasion AttacksIEEE Transactions on Network and Service Management10.1109/TNSM.2020.303184317:4(1975-1987)Online publication date: 1-Dec-2020

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Digital Edition

    View this article in digital edition.

    Digital Edition

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media