Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 22 September 2021

Authoritative Data Sources

Authoritative Data Sources

Cyber Security Intelligence Perspectives

(p.121) Authoritative Data Sources
Advances in Cyber Security

Kuan-Tsae Huang

Hwai-Jan Wu

Fordham University Press

The United States currently faces a multifaceted, technologically based vulnerability. Its information systems are being exploited on an unprecedented scale by state and non-state actors, resulting in a dangerous combination of known and unknown vulnerabilities, strong adversary capabilities, and weak situational awareness. Many cyber security issues can be attributed to the lack of systematic management of authoritative data sources (ADS). This chapter presents the concepts and applications of ADS, authoritative data elements, and trusted data sources to enable rapid business processes. It discusses trusted intelligent decision making in network-centric business environments. It describes a methodology to standardize the ADS processes by which we manage, use, and secure ADS and implement various applications to provide cyber security.

Keywords:   cyber security, authoritative data sources, authoritative data elements, trusted data sources

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .