Cybersecurity

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

Explore Cybersecurity

  • A man attends the “2020, The Year of 5G for Europe” conference at the the Huawei Cyber Security Transparency Centre in Brussels, Belgium, January 16, 2020, photo by Yves Herman/Reuters

    Commentary

    The Coronavirus Spotlights a National Security Supply Crisis

    During emergencies, it can be crucial for governments to maintain an uninterrupted supply of essential goods and services. As the world faces an unprecedented demand for supplies and services to tackle the pandemic, it may be important for governments to take stock of the national security risks that could accompany their choice of vendor.

    Jul 27, 2020

  • A police vehicle stops a sedan on a routine traffic stop photo by ASP Inc/Adobe Stock

    Report

    Autonomous Road Vehicles and Law Enforcement

    Autonomous vehicles promise many benefits, but questions remain about how law enforcement officers will interact with them. What will be the biggest challenges—and how can law enforcement prepare to address them?

    Jul 16, 2020

  • Examples of Facebook pages displayed during a House Intelligence Committee meeting on Russian use of social media to influence U.S. elections in Washington, D.C., November 1, 2017, photo by Aaron P. Bernstein/Reuters

    Commentary

    How You Can Fight Russia's Plans to Troll Americans During Campaign 2020

    The goal of Russian interference is to trigger emotional reactions and drive people to ideological extremes, making it nearly impossible to build a consensus. But Americans are less likely to have their emotions manipulated if they are aware that manipulation is the goal.

    Jul 14, 2020

  • Blog

    The Postal Service, Election Security, Reducing Child Deaths: RAND Weekly Recap

    This weekly recap focuses on the role of the U.S. Postal Service, preparing for the presidential election, reducing child deaths in Nigeria, and more.

    Jun 26, 2020

  • Voters prepare to cast their ballot in the Democratic primary in Philadelphia, Pennsylvania, June 2, 2020, photo by Rachel Wisniewski/Reuters

    Commentary

    Keep Voters Healthy. Keep Elections Secure. Can the U.S. Do Both?

    U.S. adversaries have stepped up cyberattacks and disinformation campaigns. The United States should expect these foes to take advantage of the logistical challenges of voting in a COVID-19 world to redouble their efforts against elections.

    Jun 22, 2020

  • A woman shocked and upset by something on her phone, photo by AntonioGuillem/Getty Images

    Report

    Strategies for Countering Online Abuse

    Digital platforms that let users interact virtually and often anonymously have given rise to harassment and other criminal behaviors. Tech-facilitated abuse—such as nonconsensual pornography, doxing, and swatting—compromises privacy and safety. How can law enforcement respond?

    Jun 18, 2020

  • Report

    Report

    Exploring the use of Zcash cryptocurrency for illicit or criminal purposes

    To help inform public debate and decision making, RAND Europe explored the uses of cryptocurrencies for illicit or criminal purposes, focusing on the Zcash cryptocurrency, in a research project commissioned by the Electric Coin Company.

    May 6, 2020

  • Journal Article

    Journal Article

    Applying Indications and Warning Frameworks to Cyber Incidents

    This research proposes a high-level yet practical strategic cyber indications and warning approach that governments, NATO agencies, and the private sector can apply to defend against cyber threats.

    Apr 28, 2020

  • Green glowing qubits, computer generated abstract background, 3D rendering, photo by sakkmesterke/AdobeStock

    Report

    Securing Communications in the Quantum Computing Age

    Quantum computers are expected to revolutionize computing. But hackers may be able to use them to crack the encryption system that protects all digital communications. How soon could this scenario become a reality? And what can be done to prevent it?

    Apr 9, 2020

  • News Release

    News Release

    Future Quantum Computers May Pose Threat to Today's Most-Secure Communications

    Quantum computers that are exponentially faster than any of our current classical computers and are capable of code-breaking applications could be available in 12 to 15 years, posing major risks to the security of current communications systems.

    Apr 9, 2020

  • Graphic depicting quantum computing, design by Alyson Youngblood/RAND Corporation

    Article

    Quantum Computers Will Break the Internet, but Only If We Let Them

    Quantum computers are expected to be powerful enough to break the current cryptography that protects all digital communications. But this scenario is preventable if policymakers take actions now to minimize the harm that quantum computers may cause.

    Apr 9, 2020

  • Cyber warfare specialists engage in weekend training at Warfield Air National Guard Base in Middle River, Maryland, June 3, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Report

    The Defense Industrial Base Needs a Cyber Protection Program

    The unclassified networks of defense industrial base firms have become a target for adversaries seeking to steal sensitive data, trade secrets, and intellectual property. How can the U.S. Department of Defense better secure these networks?

    Mar 30, 2020

  • Report

    Report

    Measuring Cybersecurity and Cyber Resiliency

    This report presents a framework for the development of metrics -- and a method for scoring them -- that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment.

    Mar 26, 2020

  • Blog

    Coronavirus Outbreak, Drones, the U.S. Power Grid: RAND Weekly Recap

    This weekly recap focuses on the intensifying coronavirus outbreak, cyber threats from drones, the vulnerabilities of the U.S. power grid, and more.

    Mar 6, 2020

  • Drone quadcopter over a background of binary code, photos by Kadmy/Adobe Stock and enot-poloskun/Getty Images; design by Rick Penn-Kraus/RAND Corporation

    Report

    How to Analyze the Cyber Threat from Drones

    Unmanned aerial systems—drones—have become more common, more readily available, and more sophisticated. And they have new capabilities, such as increased data collection and autonomous behavior. Their cybersecurity implications demand a coherent strategy.

    Mar 5, 2020

  • Engineer Anu Narayanan at the RAND office in Pittsburgh, Pennsylvania, January 21, 2020, photo by Jim Mendenhall/Pro Photography Network

    Q&A

    Thinking Outside the Grid: Q&A with Anu Narayanan

    Anu Narayanan, an engineer at RAND, is a specialist in what-ifs. Her research focuses on critical infrastructure and national security. In this interview, she discusses her latest work that explores what would happen if a cyberattacker tried to take down the power grid.

    Mar 5, 2020

  • Journal Article

    Journal Article

    Embracing and Controlling Risk Dependency in Cyber-Insurance Policy Underwriting

    This article highlights how cyber risk dependencies can be taken into consideration when underwriting cyber-insurance policies.

    Jan 14, 2020

  • Report

    Report

    Relationships between the economy and national security: Analysis and considerations for economic security policy in the Netherlands

    This study examines the relationship between the economy and national security in the Netherlands, with a focus on the characteristics and performance of the Dutch economy and the consequences of this for its national security.

    Jan 14, 2020

  • Electric power lines behind a network illustration, photo by kosssmosss/Adobe Stock

    Report

    Options for Deterring Attacks Against the Power Grid

    The U.S. military relies on electric power to accomplish critical missions. And most of the electricity consumed by installations in the continental United States comes from the commercial grid. How can the Defense Department protect the power grid from physical and cyber attacks?

    Jan 6, 2020