Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Defense and Security Studies

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz Nov 2022

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz

Faculty Publications

Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …


The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman Apr 2022

The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

The AUKUS Nuclear Submarine Agreement seeks to enhance multinational deterrence against Chinese geopolitical assertiveness by giving Australia nuclear powered submarines.

▶ This agreement will pose considerable cost and technical challenges for the Australia, the United Kingdom, and the United States.

▶ Estimates of when Australia will be able to deploy nuclear submarines range from 2030-2040.

▶ The U.S. and its allies will have to make challenging decisions about where to build AUKUS in Australia.

▶ There is debate as to whether efforts to deter China in the Asia-Pacific should include non-Anglosphere countries in that region.

▶ Consideration should be given …