Featured Research

from universities, journals, and other organizations

Cyberthreats must require governments and businesses to be 'cyberrisk intelligent'

Date:
May 2, 2013
Source:
Rice University
Summary:
In an age where cybersecurity is of foremost interest for governments and businesses, public and private organizations must deploy risk-intelligence governance to secure their digital communications and resources from eavesdropping, theft or attack, according to a new article.

In an age where cybersecurity is of foremost interest for governments and businesses, public and private organizations must deploy risk-intelligence governance to secure their digital communications and resources from eavesdropping, theft or attack, according to a new paper from Rice University's Baker Institute for Public Policy.

Related Articles


The paper, "Risk-Intelligent Governance in the Age of Cyberthreats," was authored by Christopher Bronk, a fellow in information technology policy at the Baker Institute. Against the backdrop of technology experts and policymakers' elusive battle to find a remedy for the myriad cyberthreats and vulnerabilities, the paper proposes the concept of "cyberrisk intelligence," a general framework for understanding the varied phenomena that impact an organization's capacity to secure it cyberinfrastructure.

"In the geopolitical context of cyberincidents and conflict, perhaps the most important questions revolve around 'Why?'" Bronk said. "In cyberdefense activities, the typical mindset has been one in which risks are identified and mitigated based on known vulnerabilities and threats. Where organizations often fall short is in pulling together all the different inputs in understanding their vulnerabilities."

Bronk proposes a holistic identification and mitigation model that considers cybersecurity in the broader scope of an organization. "Considering what bad outcomes might occur in the cyberarena needs inputs not just from the IT space but the broader space of operation," he said. "We suggest three general flows of information in determining an organizational frame for cyberrisk intelligence: one that encompasses the awareness of the IT enterprise and its apparent health; a second that brings internal business activities into view; and a third that encompasses broader geopolitical and economic forces. These three areas can be combined into a common operating picture for cyberrisk awareness."

For organizations to become cyberrisk intelligent, Bronk said, they must move beyond seeing cybersecurity as province of organizational IT. They must also understand and evaluate how they are exposed to competition or harm and join industrywide efforts that identify key security concerns and meet them with a collaborative response.

Bronk draws comparisons to more visible security threats in making the case for the importance of cyberrisk intelligence. "Since the Sept. 11, 2001, attacks, two air travelers have tried to blow up airplanes and been thwarted by fellow passengers and flight crew because there is a clear understanding of what is at stake," he said. "People aboard airliners now understand that successful hijacking may mean death. Threats in cyberspace are not so clear and so great, in terms of life and limb. The case is clear that the world's organizations depend on IT to function. The question for preserving cyberspace is how those organizations pool their attentions and resources to preserve a vibrant and functioning cyberspace that may be used to enhance human endeavor. Without adequately studying new and even unorthodox approaches to security, we may eventually lament the loss of the cyberconnected world we once enjoyed."

Bronk is the Baker Institute fellow in information technology policy. He holds additional appointments in the Baker Institute Center for Energy Studies, Rice University's Department of Computer Science and the University of Toronto's Munk School of Global Affairs. His research is focused in the area of cybergeopolitics with additional work in innovation, knowledge management, international politics, and policy related to intelligence and international security. Bronk has a Ph.D. from the Maxwell School of Syracuse University.


Story Source:

The above story is based on materials provided by Rice University. The original article was written by Jeff Falk. Note: Materials may be edited for content and length.


Cite This Page:

Rice University. "Cyberthreats must require governments and businesses to be 'cyberrisk intelligent'." ScienceDaily. ScienceDaily, 2 May 2013. <www.sciencedaily.com/releases/2013/05/130502142651.htm>.
Rice University. (2013, May 2). Cyberthreats must require governments and businesses to be 'cyberrisk intelligent'. ScienceDaily. Retrieved November 26, 2014 from www.sciencedaily.com/releases/2013/05/130502142651.htm
Rice University. "Cyberthreats must require governments and businesses to be 'cyberrisk intelligent'." ScienceDaily. www.sciencedaily.com/releases/2013/05/130502142651.htm (accessed November 26, 2014).

Share This


More From ScienceDaily



More Science & Society News

Wednesday, November 26, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Who Will Failed Nuclear Talks Hurt Most?

Who Will Failed Nuclear Talks Hurt Most?

Reuters - Business Video Online (Nov. 25, 2014) With no immediate prospect of sanctions relief for Iran, and no solid progress in negotiations with the West over the country's nuclear programme, Ciara Lee asks why talks have still not produced results and what a resolution would mean for both parties. Video provided by Reuters
Powered by NewsLook.com
FCC Forces T-Mobile To Alert Customers Of Data Throttling

FCC Forces T-Mobile To Alert Customers Of Data Throttling

Newsy (Nov. 25, 2014) T-Mobile and the FCC have reached an agreement requiring the company to alert customers when it throttles their data speeds. Video provided by Newsy
Powered by NewsLook.com
From Popcorn To Vending Snacks: FDA Ups Calorie Count Rules

From Popcorn To Vending Snacks: FDA Ups Calorie Count Rules

Newsy (Nov. 25, 2014) The US FDA is announcing new calorie rules on Tuesday that will require everywhere from theaters to vending machines to include calorie counts. Video provided by Newsy
Powered by NewsLook.com
Symantec Uncovers Sophisticated Spying Malware Regin

Symantec Uncovers Sophisticated Spying Malware Regin

Newsy (Nov. 24, 2014) A Symantec white paper reveals details about Regin, a spying malware of unusual complexity which is believed to be state-sponsored. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Science & Society

Business & Industry

Education & Learning

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins