Critical infrastructures remain vulnerable to cyber attack despite a raft of post-9/l] legislation focused on cyber security in critical infrastructures. An emerging discipline known as the economics of information security may provide a partial solution in the form of a hypothetical market that trades exploit derivatives, a modified futures contract tied to cyber security events. This paper argues that such a market could serve to predict and prevent cyber attacks through the operation of the efficient capital market hypothesis, but only after changes to the present regulatory environment. Specifically, I argue that a statutory safe harbor would allow the creation of a pilot market focused on vulnerabilities in Internet protocol versi...
The United States does not possess a sufficient cyber security framework. Over eighty-five percent o...
Changes in the information technology have generated new challenges in the security of nations. In t...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...
Critical infrastructures remain vulnerable to cyber attack despite a raft of post-9/l] legislation f...
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, teleco...
National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telec...
View the Executive SummaryIncreased reliance on the Internet and other networked systems raise the r...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
Liability for a cyber attack is not limited to the attackers. An attack may be foreseeable in some c...
Cybersecurity is one of the most pressing and legally difficult issues facing this country today. It...
The global proliferation of networked computer systems within the public and private sectors present...
This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurit...
Cyberespionage has received even greater attention in the wake of reports of persistent and brazen c...
This paper evaluates the prospects for protecting critical social functions from “cyber” attacks car...
Cyber risks are some of the most dangerous risks of the twenty-first century. Many types of business...
The United States does not possess a sufficient cyber security framework. Over eighty-five percent o...
Changes in the information technology have generated new challenges in the security of nations. In t...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...
Critical infrastructures remain vulnerable to cyber attack despite a raft of post-9/l] legislation f...
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, teleco...
National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telec...
View the Executive SummaryIncreased reliance on the Internet and other networked systems raise the r...
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could preven...
Liability for a cyber attack is not limited to the attackers. An attack may be foreseeable in some c...
Cybersecurity is one of the most pressing and legally difficult issues facing this country today. It...
The global proliferation of networked computer systems within the public and private sectors present...
This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurit...
Cyberespionage has received even greater attention in the wake of reports of persistent and brazen c...
This paper evaluates the prospects for protecting critical social functions from “cyber” attacks car...
Cyber risks are some of the most dangerous risks of the twenty-first century. Many types of business...
The United States does not possess a sufficient cyber security framework. Over eighty-five percent o...
Changes in the information technology have generated new challenges in the security of nations. In t...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...