© 2022 Massachusetts Institute of Technology.
This material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Disclaimer: Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.
(Explorations in Cyber International Relations, 2014-01-06)Anonymity, a major feature of the cyberspace, is a common channel to a multitude of threats. Despite efforts to defend against anonymous threats, their rapid evolution challenges the sustainability of any designed strategy ...
(Explorations in Cyber International Relations, 2012-11-06)In the U.S., approximately 95% of all international Internet and phone traffic travels via undersea cables. Nearly all government traffic, including sensitive diplomatic and military orders, travels these cables to reach ...
(Explorations in Cyber International Relations, 2012-11-06)Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on ...