Information Security

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

  • Composite image of binary code on a sunset over water by Eileen Delson La Russo/RAND, adapted from images by Agil_Leonardo, Matejmo, and Byakkaya/Getty Images

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Mar 9, 2017

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

  • Woman using smartphone and laptop with icon graphic cyber security network of connected devices and personal data security, photo by oatawa/Getty Images

    Commentary

    How to Help Small Businesses Deal with Cyber Threats

    Sep 15, 2017

    Small businesses are especially vulnerable to cyber threats. What can be done to provide small businesses the security to continue to prosper, while enhancing America's cybersecurity workforce and making the economy more secure?

Explore Information Security

  • U.S. Army Gen. Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, and Chinese army Gen. Fang Fenghui, China's chief of the general staff, salute during a ceremony in Beijing, April 22, 2013

    Research Brief

    Tallying the U.S.-China Military Scorecard

    A set of “scorecards” assesses the relative capabilities of U.S. and Chinese military forces in diverse types of conflict, at varying distances from the Chinese mainland, and at different points in time.

    Sep 14, 2015

  • Chinese People's Liberation Army Navy recruits march during a parade in Qingdao, Shandong province, December 5, 2013

    Report

    China's Military Modernization Increasingly Challenges U.S. Defense Capabilities in Asia

    Although China continues to lag behind the United States in terms of aggregate military hardware and operational skills, it has improved its capabilities relative to those of the U.S. in many critical areas. Moreover, China does not need to catch up fully in order to challenge U.S. ability to conduct effective military operations near the Chinese mainland.

    Sep 14, 2015

  • A network administrator holds a drive

    Report

    Cyber Practices: What Can the U.S. Air Force Learn from the Commercial Sector?

    Some common commercial practices for cyber workforce management and organizational issues are applicable to the U.S. Air Force as it endeavors to improve the management of its cyber forces.

    Sep 9, 2015

  • Digital internet security concept

    Announcement

    RAND Hosts Cybersecurity Exercise

    The discussion of cybersecurity should not be trapped within narrow technical, national security, or legal stovepipes and should include an examination of economic, civil, and societal factors. With that goal in mind, RAND hosted an analytic exercise on cybersecurity.

    Sep 3, 2015

  • An illustration of a projection of binary code on a man holding a laptop computer

    Commentary

    Is It Time to Appoint a Data Security Czar?

    Cybersecurity needs to become more of a priority for the government and private corporations. Whatever the solution, public and private officials need to do a better job of weighing the risk-benefit calculation of storing data on Internet-accessible computers and justifying data-handling protocols.

    Sep 3, 2015

  • View of the Earth from space

    Essay

    Interdependence Day: Contending with a New Global Order

    A team of RAND experts took a sober look at the threats facing the United States and developed a playbook of strategies to address them.

    Aug 21, 2015

  • Research Brief

    Online privacy vs surveillance: Europeans' preferences on internet surveillance and security measures

    RAND Europe has collected evidence from one of the largest-ever surveys of citizens' views across Europe on security, surveillance and privacy issues in three scenarios: train travel, internet use (described here), and storage of health records.

    Aug 20, 2015

  • Research Brief

    Privacy of health records: Europeans' preferences on electronic health data storage and sharing

    RAND Europe has collected evidence from one of the largest-ever surveys of citizens' views across Europe on security, surveillance and privacy issues in three scenarios: train travel, internet use and (described here) storage of health records.

    Aug 20, 2015

  • News Release

    Internet Technology Could Aid Police, Courts and Prisons; Resolving Privacy Issues Key to Future Use

    New Internet-based technology may aid criminal justice agencies through promising tools such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.

    Aug 17, 2015

  • A police officer examining a fingerprint on a monitor

    Report

    Internet Technology Could Aid Police, Courts, and Prisons

    New Internet-based technology may aid criminal justice agencies through promising tools, such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.

    Aug 17, 2015

  • U.S. soldiers take pictures of President Barack Obama at U.S. military base Yongsan Garrison in Seoul, South Korea, April 26, 2014

    Commentary

    Loose Clicks Sink Ships: When Social Media Meets Military Intelligence

    Social media updates can reveal military intelligence. But stopping a soldier from posting a geotagged tweet or Instagram photo presents challenges.

    Aug 14, 2015

  • Handcuffs on a computer keyboard

    Announcement

    Law Enforcement Cyber Center: A New Internet Resource for Combating Cybercrime

    The Law Enforcement Cyber Center provides vital information and resources to police chiefs, police officers, cybercrime investigators, and prosecutors.

    Aug 11, 2015

  • The U.S. Capitol Building, Washington, DC

    Blog

    The 2015 Summer Reading List for Congress

    With Capitol Hill slowing for August recess, this list of must-read research and commentaries will help ensure that policymakers are ready to dive right back in this fall.

    Aug 5, 2015

  • A car dashboard computer

    Commentary

    Learning to Stop Worrying and Love the Internet of Things

    Late last month, Fiat Chrysler recalled 1.4 million cars to fix a defect that allowed hackers to imperil drivers from afar. In essence, what was considered a huge threat was converted into a solved or at least solvable problem.

    Aug 4, 2015

  • Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace: Addendum

    Document submitted on July 31, 2015 as an addendum to testimony presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies on June 24, 2015.

    Aug 3, 2015

  • Congressional Briefing Podcast

    Multimedia

    Strategic Rethink: Choices for America in a Turbulent World

    In this July 2015 Congressional Briefing, Ambassador James Dobbins discusses the report he coauthored with Howard Shatz and David Ochmanek, Choices for America in a Turbulent World. This is the first paper in the "Strategic Rethink" project, in which RAND researchers examine the most consequential choices that are likely to face this president and the next.

    Jul 24, 2015

  • World map, connected people icons, and binary code

    Commentary

    War on the Web

    While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.

    Jul 23, 2015

  • Glowing globe

    Project

    The RAND Strategic Rethink Project

    The RAND Strategic Rethink project explores important strategic questions facing the United States, producing a guide for policymakers, citizens, educators, and the media on the most critical global choices and challenges facing the country.

    Jul 23, 2015

  • News Release

    With Upcoming 2016 Election, Global Power Shifts Will Face the Next U.S. President

    Chaos in the Middle East, Russian intervention, Chinese assertiveness in the South China Sea, climate change, and a decline in U.S. military readiness have raised questions about how America envisions its role in a turbulent geopolitical environment. Nevertheless, the world is not falling apart and these difficulties are not beyond the United States' ability to manage.

    Jul 23, 2015

  • World puzzle

    Report

    Choices for America in a Turbulent World

    Today, the United States faces no existential threat. Rather, it confronts an unusually wide and diverse array of challenges. What strategic choices does it have in dealing with these challenges—and tomorrow's?

    Jul 23, 2015