ACC Cyber Security Reference Publications
As a consulting organization, ACC has accumulated a library of cybersecurity reference publications. These publications support our cybersecurity principles and provide valuable information for proactively preventing cyber attacks. The initial publications listed on this page include a selection of reports, plans, and strategies. To download the reports, click on the pertinent image. ACC will continually add to this selection, so be sure to check back for updates.
Cybersecurity: A Short Business Guide
The news often reports on incidents involving large corporations facing massive data breaches where the personal information of millions of consumers was potentially leaked. However, we don’t often hear reports about the hacking of small businesses, mainly because these types of attacks aren’t public knowledge. Many entrepreneurs don’t realize that small businesses are just as at risk for cyber attacks as larger companies, but they are. According to a report by Verizon, 61 percent of data breach victims were small businesses.
FBI Internet Crime Report 2018
This Federal Bureau of Investigation (FBI) Crime Report for 2018 will give readers an awareness of the expansive cyber security challenges the we have and will be facing. The statistics gathered by the FBI’s Internet Crime Complaint Center (IC3) for 2018 show Internet-enabled theft, fraud, and exploitation remain pervasive and were responsible for a staggering $2.7 billion in financial losses in 2018.
DoD Summary Cyber Strategy 2018
According to this DoD report, American prosperity, liberty, and security depend upon open and reliable access to information. The Internet empowers us and enriches our lives by providing ever-greater access to new knowledge,
businesses, and services. Computers and network technologies underpin U.S. military warfighting
superiority by enabling the Joint Force to gain the information advantage, strike at long distance, and
exercise global command and control. The arrival of the digital age has also created challenges for the Department of Defense (DoD) and the Nation. The open, transnational, and decentralized nature of the Internet that we seek to protect creates significant vulnerabilities. Competitors deterred from engaging the United States and our allies in an armed conflict are using cyberspace operations to steal our technology, disrupt our government and commerce, challenge our democratic processes, and threaten our critical infrastructure.
The 2018 Department of Defense Cyber Strategy represents the Department’s vision for addressing this
threat and implementing the priorities of the National Security Strategy and National Defense Strategy for
This summary will give our ACC readers insights into the Department of Defense strategy.
Rand Corporation; Stateless Attribution
According to the Rand Corporation report, the attribution of a malicious cyber incident consists of identifying the responsible party behind the activity. A cyber attribution finding is a necessary prerequisite for holding actors accountable for malicious activity. Recently, several cyber incidents with geopolitical implications and the attribution findings associated with those incidents have received high-profile press coverage. Many segments of the general public disputed and questioned the credibility of the declared attributions. In this report, we review the state of cyber attribution and we consider alternative mechanisms for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an independent, global organization whose mission consists of investigating and publicly attributing major cyber attacks.