<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">

     <title>RAND Research Topic: Information Security</title>
     <link rel="self" href="https://www.rand.org/topics/information-security.xml"/>
     <updated>2017-07-18T18:16:23Z</updated>
     <link rel="alternate" type="text/html" hreflang="en" href="https://www.rand.org/topics/information-security.html" />
     <rights>Copyright (c) 2017, The RAND Corporation</rights>
     <author>
       <name>RAND Corporation</name>
     </author>
     <id>https://www.rand.org/topics/information-security.html</id>
 
 <entry>
   <title type="html">Zero Days, Thousands of Nights</title>
   <author>
   	<name>Lillian Ablon; Timothy Bogart</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1751.html</id>
   <published>Mar 9, 2017</published>
   <updated>Mar 9, 2017</updated>
   <summary type="html">This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1751.html" />
   
 </entry>
 
 <entry>
   <title type="html">Does the Court System Know as Much About Electronically Stored Information as Your Teenager? It Should.</title>
   <author>
   	<name>Duren Banks; Brian A. Jackson</name>
   	</author>  
   <id>https://www.rand.org/blog/2017/02/does-the-court-system-know-as-much-about-electronically.html</id>
   <published>Feb 21, 2017</published>
   <updated>Feb 21, 2017</updated>
   <summary type="html">Electronically stored information from smart appliances, fitness trackers, and other devices is making its way into the U.S. court system. Judges and lawyers need to better understand this evidence so they can challenge it or rule on its admissibility in court.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/blog/2017/02/does-the-court-system-know-as-much-about-electronically.html" />
   
 </entry>
 
 <entry>
   <title type="html">Peter Norton: Entrepreneur, Art Collector, and RAND Advisory Board Member</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/giving/donor-profiles/norton.html</id>
   <published>Jul 3, 2017</published>
   <updated>Jul 3, 2017</updated>
   <summary type="html">When the Saudi kingdom hired RAND in the 1980s to advise its information technology industry on the best bets for future investment, RAND researchers consulted expert Peter Norton to back up their findings. Norton has supported RAND ever since. </summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/giving/donor-profiles/norton.html" />
   
 </entry>
 
 <entry>
   <title type="html">Cyber Power Potential of the Army&apos;s Reserve Component</title>
   <author>
   	<name>Isaac R. Porche III; Caolionn O&apos;Connell; John S. Davis II; Bradley Wilson; Chad C. Serena; Tracy C. McCausland; Erin-Elizabeth Johnson; Brian D. Wisniewski; Michael Vasseur</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1490.html</id>
   <published>Jun 15, 2017</published>
   <updated>Jun 15, 2017</updated>
   <summary type="html">Describes the availability of personnel with cyber skills in the private sector and the number of Army reserve component soldiers available to support the Army&apos;s cyber mission needs.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1490.html" />
   
 </entry>
 
 <entry>
   <title type="html">Social Media Analysis Could Support Information Operations</title>
   <author>
   	<name>William Marcellino; Meagan Smith; Christopher Paul; Lauren Skrabala</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1742.html</id>
   <published>Jun 14, 2017</published>
   <updated>Jun 14, 2017</updated>
   <summary type="html">Social media analysis could provide a window into the perspectives and communications of adversaries and other key audiences. If &lt;abbr title=&quot;U.S. Department of Defense&quot;&gt;DoD&lt;/abbr&gt; seeks to expand its capability in this area, it must navigate U.S. law, cultural norms, and other issues.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1742.html" />
   
 </entry>
 
 <entry>
   <title type="html">Could Stateless Attribution Promote International Cyber Accountability?</title>
   <author>
   	<name>John S. Davis II; Benjamin Adam Boudreaux; Jonathan William Welburn; Jair Aguirre; Cordaye Ogletree; Geoffrey McGovern; Michael Chase</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR2081.html</id>
   <published>Jun 2, 2017</published>
   <updated>Jun 2, 2017</updated>
   <summary type="html">The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR2081.html" />
   
 </entry>
 
 <entry>
   <title type="html">The Need for Cognitive Security</title>
   <author>
   	<name>Rand Waltzman</name>
   	</author>  
   <id>https://www.rand.org/pubs/testimonies/CT473.html</id>
   <published>Apr 27, 2017</published>
   <updated>Apr 27, 2017</updated>
   <summary type="html">The United States needs a strategy to counter information operations conducted by Russia and other adversaries. The rapid evolution of technology complicates this challenge.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/testimonies/CT473.html" />
   
 </entry>
 
 <entry>
   <title type="html">Tactical Cyber</title>
   <author>
   	<name>Isaac R. Porche III; Christopher Paul; Chad C. Serena; Colin P. Clarke; Erin-Elizabeth Johnson; Drew Herrick</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1600.html</id>
   <published>Mar 28, 2017</published>
   <updated>Mar 28, 2017</updated>
   <summary type="html">This report proposes a strategy for tactical Army cyber operations, enumerating overarching goals, objectives, and associated activities. Instructive case studies are provided that support implementation of the strategy.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1600.html" />
   
 </entry>
 
 <entry>
   <title type="html">Homeland Security Issues in the 115th Congress</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/congress/alerts/2017/homeland-security-issues.html</id>
   <published>Mar 9, 2017</published>
   <updated>Mar 9, 2017</updated>
   <summary type="html">RAND experts provide insight on the biggest homeland security issues facing the 115th Congress, including cybersecurity, terrorism, emergency response, DHS management issues, and border security. </summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/congress/alerts/2017/homeland-security-issues.html" />
   
 </entry>
 
 <entry>
   <title type="html">Effective Cyberdeterrence Takes More Than Offensive Capability</title>
   <author>
   	<name>Martin C. Libicki</name>
   	</author>  
   <id>https://www.rand.org/pubs/testimonies/CT465.html</id>
   <published>Mar 1, 2017</published>
   <updated>Mar 1, 2017</updated>
   <summary type="html">A successful cyberdeterrence posture has many prerequisites. These include attributing attacks to the correct party, thresholds for what merits retaliation, credibility, and offensive capability. For the United States, capability is the least in doubt.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/testimonies/CT465.html" />
   
 </entry>
 
 <entry>
   <title type="html">RAND Expert to Discuss Cyber Deterrents the U.S. Should Consider</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/news/advisories/2017/02/28/index1.html</id>
   <published>Feb 28, 2017</published>
   <updated>Feb 28, 2017</updated>
   <summary type="html">Martin C. Libicki will testify before the House Armed Services Committee on Cyber Warfare in the 21st Century: Threats, Challenges, and Opportunities. Libicki is an adjunct senior management scientist at the RAND Corporation, a professor at the Pardee RAND Graduate School and a Distinguished Visiting Professor at the U.S. Naval Academy.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/news/advisories/2017/02/28/index1.html" />
   
 </entry>
 
 <entry>
   <title type="html">A focus on cybersecurity</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/pubs/corporate_pubs/CP871.html</id>
   <published>Dec 19, 2016</published>
   <updated>Dec 19, 2016</updated>
   <summary type="html">Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe&apos;s expertise and work in the area.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/corporate_pubs/CP871.html" />
   
 </entry>
 
 <entry>
   <title type="html">Issues with Access to Acquisition Data and Information in the Department of Defense</title>
   <author>
   	<name>Megan McKernan; Jessie Riposo; Jeffrey A. Drezner; Geoffrey McGovern; Douglas Shontz; Clifford A. Grammich</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1476.html</id>
   <published>Dec 19, 2016</published>
   <updated>Dec 19, 2016</updated>
   <summary type="html">The authors evaluated current Controlled Unclassified Information labeling procedures, practices, and security policies for U.S. Department of Defense acquisition data and recommend improvements.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1476.html" />
   
 </entry>
 
 <entry>
   <title type="html">A Framework for Exploring Cybersecurity Policy Options</title>
   <author>
   	<name>Igor Mikolic-Torreira; Ryan Henry; Don Snyder; Sina Beaghley; Stacie L. Pettyjohn; Sarah Harting; Emma Westerman; David A. Shlapak; Megan Bishop; Jenny Oberholtzer; Lauren Skrabala; Cortney Weinbaum</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1700.html</id>
   <published>Nov 23, 2016</published>
   <updated>Nov 23, 2016</updated>
   <summary type="html">RAND conducted two discovery games to explore possible solutions for improving cybersecurity, assess their implications, and develop an initial framework to support debate and inform decisions regarding cybersecurity policies and practices.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1700.html" />
   
 </entry>
 
 <entry>
   <title type="html">Thought Leadership programme 2016</title>
   <author>
   	<name>Catriona Manville; Claire Alexander; Brian Parry</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1771.html</id>
   <published>Oct 13, 2016</published>
   <updated>Oct 13, 2016</updated>
   <summary type="html">Key findings from the 2016 Thought Leadership Programme, convened by Corsham Institute in conjunction with RAND Europe and St George&apos;s House exploring opportunities and challenges created by digital technologies in society.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1771.html" />
   
 </entry>
 
 <entry>
   <title type="html">Security Sector Reform in Ukraine</title>
   <author>
   	<name>Olga Oliker; Lynn E. Davis; Keith Crane; Andrew Radin; Celeste Gventer; Susanne Sondergaard; James T. Quinlivan; Stephan B. Seabrook; Jacopo Bellasio; Bryan Frederick; Andriy Bega; Jakub Hlavka</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR1475-1.html</id>
   <published>Oct 5, 2016</published>
   <updated>Oct 5, 2016</updated>
   <summary type="html">The 2014 Maidan revolution created an opportunity for change in a system that had resisted it for 25 years. The Ukrainian security establishment has progressed since then, but its efforts have been insufficient to address the threats now facing the nation. </summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR1475-1.html" />
   
 </entry>
 
 <entry>
   <title type="html">Cost of Cyber Incidents to American Companies Is Less Than Expected</title>
   <author>
   	<name>Sasha Romanosky</name>
   	</author>  
   <id>https://www.rand.org/pubs/external_publications/EP66656.html</id>
   <published>Sep 20, 2016</published>
   <updated>Sep 20, 2016</updated>
   <summary type="html">Why don&apos;t American companies invest more in computer security? One possible explanation: Relative to the other risks they face, cyber risks often aren&apos;t as significant as expected. Most breaches cost companies less than 0.4 percent of their annual revenues.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/external_publications/EP66656.html" />
   
 </entry>
 
 <entry>
   <title type="html">RAND Cybersecurity Workshop</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/congress/activities/2016/08/17-18.html</id>
   <published>Aug 17, 2016</published>
   <updated>Aug 17, 2016</updated>
   <summary type="html">In this cybersecurity workshop, legislative staffers can learn how to calculate cyber risk; where to find appropriate information about threats, vulnerabilities, and impact; and better consider options for legislation and federal government response in cyberspace. [Washington, DC]</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/congress/activities/2016/08/17-18.html" />
   
 </entry>
 
 <entry>
   <title type="html">The &amp;ldquo;Internet of Things&amp;rdquo;: Lessons from a Hacker</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/events/2016/05/25.html</id>
   <published>May 25, 2016</published>
   <updated>May 25, 2016</updated>
   <summary type="html">RAND researcher and DEF CON Black Badge winner Lillian Ablon will describe how our increasingly digital world has presented new risks. She&apos;ll explain what makes us vulnerable and what motivates different types of cyberattackers.  [Santa Monica, CA]</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/events/2016/05/25.html" />
   
 </entry>
 
 <entry>
   <title type="html">The Hackers&apos; Bazaar: Markets for Cybercrime Tools and Stolen Data</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/events/2016/05/24.html</id>
   <published>May 24, 2016</published>
   <updated>May 24, 2016</updated>
   <summary type="html">RAND researcher and DEF CON Black Badge winner Lillian Ablon will discuss the characteristics of burgeoning black markets, why we can expect more cybercriminal activity, and why the ability to attack will likely outpace the ability to defend. 
</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/events/2016/05/24.html" />
   
 </entry>
 
 </feed>
