Cybersecurity

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

  • Blue and red cables transmitting data signals, image by Alexey Novikov/Adobe Stock

    Report

    Response Options to Cyberattacks on U.S. Government Networks

    Apr 29, 2022

    The United States has proved vulnerable to cyber incidents, and a lack of response has emboldened Russia and China to expand their cyber espionage activities. Have U.S. responses changed over time or affected adversary behavior? What lessons do these cases offer for future policymaking?

  • Red world map with areas circled, illustration by traffic_analyzer/Getty Images

    Report

    Competition and Restraint in Cyberspace

    Mar 7, 2022

    Recent years have seen a mounting concern in the United States over foreign efforts to harm election security or legitimacy through cyber means, an increase in cyber espionage, and attacks of growing sophistication. How could international norms help constrain such destabilizing behavior in cyberspace?

Explore Cybersecurity

  • Report

    Report

    Research on Mitigating the Insider Threat to Information Systems - #2: Proceedings of a Workshop Held August, 2000

    This is the second in a series of conference reports on the topic of R&D initiatives to mitigate and thwart the insider threat to critical U.S. defense and infrastructure information systems.

    Dec 31, 1999

  • Report

    Report

    E-mail Communication Between Government and Citizens: Security, Policy Issues and Next Steps

    Modern network technologies can significantly enhance communication between government agencies and the citizens they serve. But because much of the information transmitted is sensitive in nature, secure transmission of sensitive material is essential.

    Jan 1, 1998

  • Report

    Report

    National security in the information age

    National security in the information age

    Jan 1, 1998

  • Report

    Report

    Cyberpayments and Money Laundering: Problems and Promise

    At the request of the Financial Crimes Enforcement Network (FinCEN), RAND conducted and analyzed a strategic decisionmaking exercise to examine money laundering concerns raised by the deployment of cyberpayment systems.

    Jan 1, 1998

  • Report

    Report

    The Cyber-Posture of the National Information Infrastructure

    Discusses the vulnerability of the nation's information infrastructure to external attacks and other kinds of disruptions.

    Jan 1, 1998

  • Report

    Report

    Security in Cyberspace: Challenges for Society: Proceedings of an International Conference

    Topics covered include the magnitude of the cyberspace security threat and the threat's consequences; impediments to improved security in cyberspace and what must be done to remove them; ...

    Jan 1, 1996

  • Report

    Report

    An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: ''The Day After...in Cyberspace II''

    A RAND-developed ''The Day After...'' exercise methodology has been used to explore strategic planning options, both for nuclear proliferation and counter-proliferation, and for questions involving "security in cyberspace" and "information warfare" (IW).

    Jan 1, 1996

  • Report

    Report

    Security in Cyberspace: An Emerging Challenge for Society

    This paper attempts to structure the discussion the potential threats from bad actors in cyberspace.

    Jan 1, 1994

  • The Apple I, released by the Apple Computer Company (now Apple Inc.) in 1976, on display at the Smithsonian

    Report

    Privacy and Security Issues in Information Systems

    In all computers that maintain and process valuable information, or provide services to multiple users, it is necessary to provide security safeguards against unauthorized access, use, or modification of any data. Concerns for privacy and security must become integral in the design of computer systems and their applications.

    Dec 31, 1975

  • Network security illustration

    Report

    Security, Secrecy, and Tamper-Free Considerations

    The ninth in a series of 11 memoranda detailing the Distributed Adaptive Message Block Network, this volume considers the security aspects of a system of the type proposed, in which secrecy is of paramount importance. It describes the safeguards to be built into the network, and evaluates the premise that the existence of "spies" within the system must be anticipated.

    Jan 1, 1964

  • People

    People

    Zara Fatima Abdurahaman

    Ph.D. Student, Pardee RAND Graduate School, and Assistant Policy Researcher, RAND
    Education B.Eng. in electrical and electronic engineering, The University of Nottingham

  • People

    People

    Cecilia Ang

    Research Assistant
    Education M.Sc. in sociology, London School of Economics; B.Sc. in business administration and sociology, Copenhagen Business School

  • People

    People

    Thomas F. Atkin

    Adjunct Management Scientist
    Education M.S. in management science, University of Miami; B.S. in mathematical science, U.S. Coast Guard Academy

  • People

    People

    Jacopo Bellasio

    Research Leader
    Education M.Litt. in Middle East and Central Asian security studies, University of St Andrews; B.A. in linguistic and cultural mediation, University of Milan

  • People

    People

    Irina A. Chindea

    Political Scientist
    Education Ph.D. in international relations, Tufts University; M.A. in international relations, Tufts University; B.S. in business administration, ASE Bucharest, Romania

  • People

    People

    Christopher Ferris

    Research Assistant
    Education B.A. in government, Georgetown University; B.A. in computer science, Georgetown University

  • People

    People

    Isabel Flanagan

    Analyst
    Education M.Sc. in European studies, London School of Economics; B.A. (Hons) in politics and philosophy, Queen's University

  • People

    People

    Sarah Harting

    Senior International/Defense Researcher; Professor, Pardee RAND Graduate School
    Education M.A. in international security, Georgetown University; B.A. in international affairs and German, Lafayette College

  • People

    People

    Curt Havard

    Director, IT Operations
    Education BA in business/information technology, California Lutheran University

  • People

    People

    Chad Heitzenrater

    Senior Information Scientist
    Education DPhil in computer science, University of Oxford; MSc in software and systems security, University of Oxford; B.S. in software engineering, Rochester Institute of Technology