Skip to main content

Currently Skimming:

1 Security in Cyberspace
Pages 5-11

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 5...
... Cybersecurity is made ex tremely difficult by the incredible complexity and scale of cyberspace. The challenges to achieving cybersecurity constantly change as technologies advance, new applications of information technologies emerge, and societal norms evolve.
From page 6...
... Security is often a relatively low prior costs of additional ity for the individuals using information systems. Indeed, unless security measures.
From page 7...
... Today, no good answer exists to the question of how rigorously people should protect their Internet accounts, or how much money should be spent on improving com puter security. Even a simple question such as whether to mask passwords as people type them in (that is, replacing the symbols with a bullet, asterisk, or some other character)
From page 8...
... In these situations, the dilemma is that advancing information technologies facilitates cybercrime at the same time as it helps the efforts of law enforcement to prevent and solve such crime. Technological Innovations While technology cannot provide perfect security, new technology could provide greater security than exists today.
From page 9...
... In this way, rational security policies would protect people only as much as they need to be protected. As an example of setting priorities, the computing world could Weakly protected be divided into sectors that are more safe and accountable and sec accounts can tors that are less safe and accountable.
From page 10...
... Deterrence also runs the risk of sweeping up unintentional as well as deliberate attempts to contravene security. People who face a choice between getting their work done and observing unrealistic security guidelines make rational choices, so they need rational security systems.
From page 11...
... Can an optimal cybersecurity model be envisioned along with pathways to move toward such a model? Can a machine learning system identify patterns of bad behavior in past activities and use those patterns to detect ongoing bad behavior -- a goal of many intrusion detection systems today?


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.