CHAPTER 4: TRANSITION FROM AN ENVIRONMENT OF ‘FUD’1 TO A STANDARDS-BASED ENVIRONMENT

Thus far, this text has centered on establishing a picture of a cyber threat environment. Clearly, cybersecurity has emerged as a discipline focused on countering this boundary-less threat for each nation or organization around the globe. At the same time, creating a successful cyberdefence has become increasingly more complex. Cybersecurity based solely on exclusion or isolation is no longer possible in a world where demand for services and access to information services is ever increasing. Organizations must practice cybersecurity by inclusion, allowing customers, citizens, employees, and business partners the levels of access and information system based ...

Get CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.