Cybersecurity

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

  • Cyber Security Threats

    Multimedia

    Strategies for Minimizing Cybersecurity Risks

    Feb 24, 2021

    RAND senior international/defense researcher Quentin Hodgson presents strategies for minimizing cybersecurity risks that can be implemented at individual, organizational, national, and international levels.

  • An illustration of a pacemaker in a person's chest, image by peterschreiber.media/Adobe Stock

    Essay

    Are We Ready for the Internet of Bodies?

    Jan 8, 2021

    Any device can be hacked, including one inside the human body. We need to think through the privacy and security implications of devices that live with us. But we should also consider the life-changing, life-saving potential of technologies that know us inside and out.

Explore Cybersecurity

  • Cyber warfare specialists engage in weekend training at Warfield Air National Guard Base in Middle River, Maryland, June 3, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Report

    The Defense Industrial Base Needs a Cyber Protection Program

    The unclassified networks of defense industrial base firms have become a target for adversaries seeking to steal sensitive data, trade secrets, and intellectual property. How can the U.S. Department of Defense better secure these networks?

    Mar 30, 2020

  • Report

    Report

    Measuring Cybersecurity and Cyber Resiliency

    This report presents a framework for the development of metrics -- and a method for scoring them -- that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment.

    Mar 26, 2020

  • Blog

    Coronavirus Outbreak, Drones, the U.S. Power Grid: RAND Weekly Recap

    This weekly recap focuses on the intensifying coronavirus outbreak, cyber threats from drones, the vulnerabilities of the U.S. power grid, and more.

    Mar 6, 2020

  • Engineer Anu Narayanan at the RAND office in Pittsburgh, Pennsylvania, January 21, 2020, photo by Jim Mendenhall/Pro Photography Network

    Q&A

    Thinking Outside the Grid: Q&A with Anu Narayanan

    Anu Narayanan, an engineer at RAND, is a specialist in what-ifs. Her research focuses on critical infrastructure and national security. In this interview, she discusses her latest work that explores what would happen if a cyberattacker tried to take down the power grid.

    Mar 5, 2020

  • Drone quadcopter over a background of binary code, photos by Kadmy/Adobe Stock and enot-poloskun/Getty Images; design by Rick Penn-Kraus/RAND Corporation

    Report

    How to Analyze the Cyber Threat from Drones

    Unmanned aerial systems—drones—have become more common, more readily available, and more sophisticated. And they have new capabilities, such as increased data collection and autonomous behavior. Their cybersecurity implications demand a coherent strategy.

    Mar 5, 2020

  • Report

    Report

    Relationships between the economy and national security: Analysis and considerations for economic security policy in the Netherlands

    This study examines the relationship between the economy and national security in the Netherlands, with a focus on the characteristics and performance of the Dutch economy and the consequences of this for its national security.

    Jan 14, 2020

  • Journal Article

    Journal Article

    Embracing and Controlling Risk Dependency in Cyber-Insurance Policy Underwriting

    This article highlights how cyber risk dependencies can be taken into consideration when underwriting cyber-insurance policies.

    Jan 14, 2020

  • Electric power lines behind a network illustration, photo by kosssmosss/Adobe Stock

    Report

    Options for Deterring Attacks Against the Power Grid

    The U.S. military relies on electric power to accomplish critical missions. And most of the electricity consumed by installations in the continental United States comes from the commercial grid. How can the Defense Department protect the power grid from physical and cyber attacks?

    Jan 6, 2020

  • Montage of best RAND videos of 2019, image by Alyson Youngblood/RAND Corporation

    Multimedia

    Best RAND Videos of 2019

    At RAND, we examine complex issues in dozens of policy areas. And when our researchers aren't busy coming up with solutions to some of the world's biggest problems, sometimes they step in front of the camera to highlight their findings. Here are our top videos of 2019.

    Dec 20, 2019

  • U.S. Marines with 1st Tank Battalion, 1st Marine Division participate in a field exercise (FEX) at Marine Corps Air Ground Combat Center Twentynine Palms, California, Oct. 22, 2019, photo by Sgt. Miguel A. Rosales/U.S. Marine Corps

    Commentary

    First, Manage Security Threats to Machine Learning

    Deception is as old as warfare itself. Until now, the targets of deception operations have been humans. But the introduction of machine learning and artificial intelligence opens up a whole new world of opportunities to deceive by targeting machines.

    Nov 4, 2019

  • Blog

    White Supremacist Terrorism, Wildfires, the Dark Web: RAND Weekly Recap

    This weekly recap focuses on violent white supremacy, power outages to prevent wildfires, how to catch criminals on the dark web, and more.

    Nov 1, 2019

  • Cybercrime concept of handcuffs icon on a digital background, photo by blackboard/Adobe Stock

    Report

    What Could Help Law Enforcement Deal with Crime on the Dark Web?

    Crime in traditional online forums often leaves a trail of data that can be followed. But on the dark web, the process of collecting those data and turning them into evidence can be difficult. A panel of law enforcement practitioners and researchers identified ways to address this challenge.

    Oct 29, 2019

  • Illustration of a large gavel crashing down on self-driving cars, illustration by Chris Philpot

    Essay

    Who's Responsible When Your Car Gets Hacked?

    Cars are becoming "fast, heavy artificial intelligences on wheels," a RAND report cautions, and that means they're becoming vulnerable. Potentially billions of dollars ride on the question of who has the legal responsibility to keep hackers from grabbing the wheel or cutting the brakes.

    Oct 23, 2019

  • Digital concept of a brain, photo by Vertigo3d/Getty Images

    Commentary

    Our Future Lies in Making AI Robust and Verifiable

    We are hurtling towards a future in which AI is omnipresent. This AI-enabled future is blinding in its possibilities for prosperity, security, and well-being. Yet, it is also crippling in its fragility. What might it take for it all to come to a screeching halt?

    Oct 22, 2019

  • Report

    Report

    Literature on Personnel Vetting Processes and Procedures: Annotated Selected Bibliography

    To help inform the U.S. government in its efforts to improve the vetting processes for public trust and national security positions and protect its assets and information, the authors assembled a selected bibliography of relevant literature.

    Oct 14, 2019

  • Blog

    Virtual Societal Warfare, Iran, Opioids: RAND Weekly Recap

    This weekly recap focuses on the risk of virtual societal welfare, Iran's domestic debates, federal policy options for supervised consumption sites, and more.

    Oct 11, 2019

  • Concept of artificial intelligence winning at chess, photo by JohnDWilliams/Getty Images

    Report

    The Emerging Risk of Virtual Societal Warfare

    Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyberattacks on infrastructure sites. How can democracies protect themselves?

    Oct 9, 2019

  • The entrance to Lakhta-2 business center, which reportedly houses news organizations and internet research companies known for trolling on social media, in St. Petersburg, Russia, February 20, 2018, photo by Anton Vaganov/Reuters

    Commentary

    What Translation Troubles Can Tell Us About Russian Information Warfare

    Russian information warfare has attracted significant international attention since 2014. But little research has focused on its apparent shortcomings. Most notable are the confusing translation mistakes that undermine Moscow's attempts at covert influence efforts.

    Oct 4, 2019

  • Blog

    E-Cigarettes, 'Stand Your Ground,' Cyber Coercion: RAND Weekly Recap

    This weekly recap focuses on the planned federal ban on flavored e-cigarettes, “stand your ground” laws, understanding cyber coercion, and more.

    Sep 20, 2019

  • World map in red pixels on a dark background, photo by Lidiia Moor/Getty Images

    Report

    Are States Using Cyber Operations to Coerce Others?

    Cyber operations have become another tool of statecraft. But have any cyber operations sponsored by Russia, China, Iran, or North Korea met the definition of cyber coercion? If so, how? And what should the United States do to respond?

    Sep 17, 2019