Barriers to cyber information sharing
Harwood, Deanne I.
MetadataShow full item record
As our reliance on the Internet grows, our interconnected networks become more vulnerable to cyberattacks. Cyberattacks and other cyber threats can cause disastrous results, especially if a coordinated targeted attack hits multiple networks at the same time. For this reason, cyber information-sharing among public and private organizations becomes necessary and important to defend our networks. Many cyber threats are difficult to detect and identify by a single organization. Information sharing can help detect these potential risks, prevent cyberattacks, and facilitate incident response to better defend networks. Although the public and private sectors have begun to share cybersecurity information, there are still many barriers that stop agencies from sharing more. This research identifies and reviews what the barriers are to sharing cyber information and possible ways that the barriers can be overcome.
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Kulikowski, Amanda L. (Monterey, California: Naval Postgraduate School, 2018-03);This study focuses on factors that impact police officers’ intra- and inter-district information-sharing patterns. Forty participants completed a survey that identified their communication patterns. Additionally, individual ...
Birkenfeld, Martin L., Jr. (Monterey, CA; Naval Postgraduate School, 2021-03);Every law enforcement agency uses records management systems (RMS) that contain a wealth of information essential for investigations or intelligence. This information includes crime reports, arrest reports, name records, ...
Knowledge engineering considerations for improving information sharing in the joint improvised explosive device defeat test board LaViolette, Richard J. (Monterey, California. Naval Postgraduate School, 2011-06);Improvised Explosive Devices (IEDs) will continue to evolve as the enemy's weapon of choice. Dynamic and responsive enemies alter IEDs in reaction to our Counter-IED efforts, which results in the need for continuous ...