The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (2016 vol. 14)
ISSN: 1540-7993
pp: 44-51
Chad Dacus , Air University Cyber College
Panayotis A. Yannakogeorgos , Air University Cyber College
Hackers have compromised the designs of numerous major US weapon systems. Safeguarding mission-critical systems requires effective network security and secure firmware and software. To achieve this, the US Defense Department should carefully screen contractors based on their past cybersecurity prowess and provide incentives for them to produce and maintain secure systems.
Computer security, Computer hacking, Economics, Communication networks, US Department of Defense, Weapons, Terrorism

C. Dacus and P. A. Yannakogeorgos, "Designing Cybersecurity into Defense Systems: An Information Economics Approach," in IEEE Security & Privacy, vol. 14, no. 3, pp. 44-51, 2016.
209 ms
(Ver 3.3 (11022016))