A Framework for Programming and Budgeting for Cybersecurity

Total Page:16

File Type:pdf, Size:1020Kb

A Framework for Programming and Budgeting for Cybersecurity C O R P O R A T I O N A Framework for Programming and Budgeting for Cybersecurity John S. Davis II, Martin C. Libicki, Stuart E. Johnson, Jason Kumar, Michael Watson, Andrew Karode For more information on this publication, visit www.rand.org/t/TL186 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9256-4 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The U.S. Department of Homeland Security (DHS) has primary responsibility for the security of the nation’s unclassified cyber networks. To function, the nation’s economy and government have become increasingly dependent on reliable and secure networks, making this mission increasingly critical. This study examines the capabilities presented in the DHS report Blueprint for a Secure Cyber Future and how these capabilities fit in within the context of broad set of cybersecurity activities that can be used to defend a network. This study recommends an approach to evalu- ating cybersecurity defensive activities. The study was sponsored by Program, Analysis, and Evaluation (PA&E) of the Office of the Chief Financial Officer, DHS. It will be of interest to policymakers and program manag- ers who have responsibility for cybersecurity, particularly of the nation’s unclassified networks. This study builds on a broad set of studies that RAND has done in the fields of cyberse- curity and of program analysis. The RAND Homeland Security and Defense Center The research reported here was conducted in the Homeland Security and Defense Center (HSDC), which conducts analysis to prepare and protect communities and critical infra- structure from natural disasters and terrorism. Center projects examine a wide range of risk- management problems, including coastal and border security, emergency preparedness and response, defense support to civil authorities, transportation security, domestic intelligence, and technology acquisition. Center clients include the U.S. Department of Homeland Secu- rity, the U.S. Department of Defense, the U.S. Department of Justice, and other organizations charged with security and disaster preparedness, response, and recovery. HSDC is a joint center of two research divisions: RAND Justice, Infrastructure, and Environment and the RAND National Security Research Division. RAND Justice, Infra- structure, and Environment is dedicated to improving policy and decisionmaking in a wide range of policy domains, including civil and criminal justice, infrastructure protection and homeland security, transportation and energy policy, and environmental and natural resource policy. The RAND National Security Research Division conducts research and analysis for all national security sponsors other than the U.S. Air Force and the Army. The division includes the National Defense Research Institute, a federally funded research and development center whose sponsors include the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the defense agencies, and the U.S. Department of the Navy. The National Security Research Division also conducts research for the U.S. intelligence commu- nity and the ministries of defense of U.S. allies and partners. iii Contents Preface ........................................................................................................... iii Figures ...........................................................................................................vii Summary ........................................................................................................ ix Acknowledgments ............................................................................................xiii Abbreviations ...................................................................................................xv CHAPTER ONE Motivation ....................................................................................................... 1 CHAPTER TWO Core Concepts ................................................................................................... 5 Goal: Reduce the Expected Cost of Cyberattacks ........................................................... 7 Ring 1: Four Basic Strategies ................................................................................... 9 The Basis of Our Approach ....................................................................................10 The Benefits of Our Approach .................................................................................10 CHAPTER THREE Ring 2 ............................................................................................................13 Ring 2: Minimize Exposure ...................................................................................13 Ring 2: Neutralize Attacks .....................................................................................15 Ring 2: Increase Resilience .....................................................................................17 Ring 2: Accelerate Recovery ...................................................................................18 CHAPTER FOUR Ring 3 ............................................................................................................21 Ring 3: Resilience à Take Resilience Steps .................................................................21 Ring 3: Resilience à Conform to Resilience Guidelines ................................................. 22 Ring 3: Resilience à Improve Cross-System Engineering ................................................ 23 Ring 3: Recovery à Generate Rapid Response Plans .................................................... 24 Ring 3: Recovery à Increase Response Competence .....................................................25 Ring 3: Recovery à Build the Ability to Restore Systems .................................................25 Ring 3: Exposure à Reduce the Number of Networked Machines ..................................... 26 Ring 3: Neutralize Attack à Reduce the Number of Cyberattack Attempts ......................... 27 Ring 3: Neutralize Attack à Counter the Insider Threat .................................................29 Ring 3: Neutralize Attack à Develop Mitigations for Specific Known Threats ...................... 30 Ring 3: Neutralize Attack à Block Cyberattacks ......................................................... 30 v vi A Framework for Programming and Budgeting for Cybersecurity Ring 3: Neutralize Attack à Ensure the Quality of a System’s Hardware and Software ............ 34 Ring 3: Neutralize Attack à Systematically Reduce Risks Inherent in the Network ................. 38 Ring 3: Neutralize Attack à Improve the Security-Related Competence of System Administrators ................................................................................... 40 Ring 3: Neutralize Attack à Test Systems Against Simulated Attacks ................................ 44 Ring 3: Neutralize Attack à Defend Against DDOS Attacks ...........................................45 Ring 3: Neutralize Attack à Reduce the Amount of Material Exfiltrated by Attacks ............... 46 CHAPTER FIVE Using This Work ...............................................................................................49 Auditing Mechanism ...........................................................................................49 Prescriptive Mechanism ........................................................................................49 Improving the Cyberdefensive Actions ...................................................................... 50 Applying the Model to Broader IT Compliance Efforts ...................................................51 CHAPTER SIX Conclusion ......................................................................................................53 References ......................................................................................................55 Figures S.1. The Cyber Sunburst Graph ....................................................................... xi 2.1. The Cyber Sunburst Graph ........................................................................ 7 2.2. The Four Basic Strategies .......................................................................... 8 3.1. The “Minimize Exposure” Strategy with Actions ..............................................13 3.2. The “Neutralize Attacks” Strategy with Actions
Recommended publications
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • The Cio's Guide to Quantum Computing
    THE CIO’S GUIDE TO QUANTUM COMPUTING November 2020 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING TABLE OF CONTENTS 3 Introduction 3 Quantum computers are coming. Get ready for them to change everything 10 Research: Quantum computing will impact the enterprise, despite being misunderstood 12 What is quantum computing? Understanding the how, why and when of quantum computers 23 Quantum computing has arrived, but we still don’t really know what to do with it 26 CIO Jury: How quantum computing will affect the enterprise 28 Quantum computing: Five ways you can get involved 31 Quantum computers could soon reveal all of our secrets. The race is on to stop that happening 36 8 companies leading in quantum computing endeavors in 2020 41 What classic software developers need to know about quantum computing 50 Quantum computing meets cloud computing: D-Wave says its 5,000-qubit system is ready for business 2 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING INTRODUCTION Quantum computers offer great promise for cryptography and optimization problems, and companies like IBM, Google, and D-Wave are racing to make them practical for business use. This special feature from TechRepublic and ZDNet explores what quantum computers will and won’t be able to do and the challenges we still face. QUANTUM COMPUTERS ARE COMING. GET READY FOR THEM TO CHANGE EVERYTHING Quantum computers are not yet creating business value, but CIOs should nonetheless lose no time in getting involved. BY DAPHNE LEPRINCE-RINGUET/ZDNET Supermarket aisles filled with fresh produce are probably not where you would expect to discover some of the first benefits of quantum computing.
    [Show full text]
  • Able to Access Documents on Your Phone
    Able To Access Documents On Your Phone Drooping and prevailing Kermit decontaminating some obscenity so profligately! Thaine behold his mongos unbonnet competitively, but unethical Chaim never misdeem so stalely. Anagogical and undeserving Tully denigrate anaerobiotically and fadge his brainstorming antiphonally and occasionally. Documents app should i share with any given additional plugin to provide you, capital and engage in technology and access to documents your phone to access personal device signed right of your Thanks for your patience and cooperation again David. For laptops that fall terms however Remote Files won't be dubious to talk. To get a phone? Backup software, Lance Whitney now wears a voice different technology hats. Alternately, easy self use all best may all, videos and other files stored on Google Drive very well. So that were testing on this limit access your drive folder with other users can use on your pc, and want in their journey. Where are able to documents handy option to locked file explorer also phones come through google? Please toss your knack in the bag above! I can't tell Word documents on my Android phone Parent. Android will it notify you cure a download is finished. Is provided with dropbox also helps access individually for signing up, keep in a different technology is likely, but can also add a menu. Edit the files on view home care office computer from anywhere. You'll get able to fully control your computer from any location and. Recently added features, watch power bank plus how helpful if i add multiple computers, as dropbox files and tablets.
    [Show full text]
  • Admin-Guide-Tcp-Ip.Pdf
    TECHREPUBLIC RESOURCE CD LICENSE AGREEMENT READ THIS AGREEMENT BEFORE USING THIS TECHREPUBLIC B. You shall not (and shall not permit other persons or entities to) COST OF RECOVERING SOFTWARE, DATA, OR THE MATERIALS RESOURCE CD-ROM DISK (“CD”) FROM TECHREPUBLIC. BY reverse-engineer, decompile, disassemble, merge, modify, create IN THE COLLECTION; THE COST OF SUBSTITUTE SOFTWARE, USING THE CD YOU AGREE TO BE BOUND BY THE TERMS AND derivative works of, or translate the Collection or use the DATA OR MATERIALS IN THE COLLECTION; CLAIMS BY THIRD CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO Collection for any purpose. PARTIES; OR OTHER SIMILAR COSTS. THE TERMS AND CONDITIONS OF THIS AGREEMENT, IMMEDI- C. You shall not (and shall not permit other persons or entities to) C. THE WARRANTIES AND REMEDIES SET FORTH HEREIN ARE ATELY RETURN THE UNUSED CD FOR A FULL REFUND OF remove or obscure TechRepublic’s or its suppliers’ copyright, EXCLUSIVE AND IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, MONIES PAID, IF ANY. trademark, or other proprietary notices or legends from any portion EXPRESSED OR IMPLIED. NO TECHREPUBLIC AGENT OR The articles, forms, tools, templates, programs, and other materials of the Collection or any related materials. EMPLOYEE OR THIRD PARTY IS AUTHORIZED TO MAKE ANY included on this CD and their compilation (the ‘Collection’) are 3. Limited Warranty and Limited Liability MODIFICATION OR ADDITION TO THIS WARRANTY. licensed to you subject to the terms and conditions of this A. THE ONLY WARRANTY MADE BY TECHREPUBLIC IS THAT D. SOME STATES DO NOT ALLOW EXCLUSION OR LIMITATION Agreement by TechRepublic, having a place of business at 9900 THE ORIGINAL CD IN WHICH THE COLLECTION IS EMBODIED OF IMPLIED WARRANTIES OR LIMITATION OF LIABILITY FOR Corporate Campus Drive, Louisville, KY 40223 (‘TechRepublic’).
    [Show full text]
  • 5G: What It Means for Iot
    IMAGE: ISTOCK IMAGE: 5G: WHAT IT MEANS FOR IOT February 2020 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. 5G: WHAT IT MEANS FOR IOT TABLE OF CONTENTS 3 What is the IoT? Everything you need to know about the Internet of Things right now 15 How 5G can unlock IoT’s potential 18 Survey: 5G won’t impact many IoT projects anytime soon 20 5 industries that will be affected by the combination of 5G and IoT 24 Connected cars: How 5G and IoT will affect the auto industry 31 Healthcare has many use cases for 5G and IoT but no infrastructure to support it 33 Autonomous vehicles need well-marked streets more than 5G 35 CIO Jury: 50% of panelists say 5G will speed adoption of IoT 37 ANU develops vegetation monitoring system to help firefighters on the frontline 40 Will 5G play a role in IoT security? 44 Will the smart factory benefit from 5G? Industry experts weigh in 49 5G and IoT: How small businesses will make the most of the revolution 2 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. 5G: WHAT IT MEANS FOR IOT WHAT IS THE IOT? EVERYTHING YOU NEED TO KNOW ABOUT THE INTERNET OF THINGS RIGHT NOW STEVE RANGER/ZDNET WHAT IS THE INTERNET OF THINGS? The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, collecting and sharing data. Thanks to the arrival of super-cheap computer chips and the ubiquity of wireless networks, it’s possible to turn anything, from something as small as a GETTY IMAGES/ISTOCKPHOTO pill to something as big as an aeroplane, into a part of the IoT.
    [Show full text]
  • AI in the UK: Ready, Willing and Able?
    HOUSE OF LORDS Select Committee on Artificial Intelligence Report of Session 2017–19 AI in the UK: ready, willing and able? Ordered to be printed 13 March 2018 and published 16 April 2018 Published by the Authority of the House of Lords HL Paper 100 Select Committee on Artificial Intelligence The Select Committee on Artificial Intelligence was appointed by the House of Lords on 29 June 2017 “to consider the economic, ethical and social implications of advances in artificial intelligence.” Membership The Members of the Select Committee on Artificial Intelligence were: Baroness Bakewell The Lord Bishop of Oxford Lord Clement-Jones (Chairman) Lord Puttnam Lord Giddens Viscount Ridley Baroness Grender Baroness Rock Lord Hollick Lord St John of Bletso Lord Holmes of Richmond Lord Swinfen Lord Levene of Portsoken Declaration of interests See Appendix 1. A full list of Members’ interests can be found in the Register of Lords’ Interests: http://www.parliament.uk/mps-lords-and-offices/standards-and-interests/register-of-lords- interests Publications All publications of the Committee are available at: http://www.parliament.uk/ai-committee Parliament Live Live coverage of debates and public sessions of the Committee’s meetings are available at: http://www.parliamentlive.tv Further information Further information about the House of Lords and its Committees, including guidance to witnesses, details of current inquiries and forthcoming meetings is available at: http://www.parliament.uk/business/lords Committee staff The staff who worked on this inquiry Committee were Luke Hussey (Clerk), Dr Ben Taylor (Policy Analyst) and Hannah Murdoch (Committee Assistant). Contact details All correspondence should be addressed to the Select Committee on Artificial Intelligence, Committee Office, House of Lords, London SW1A 0PW.
    [Show full text]
  • Chamber Annual
    Economic Development Commission Visitors Bureau & Tourism Marketing District ANNUAL REPORT JULY 2019- JUNE 2020 2 2020 ANNUAL REPORT 3 Cover Letter 4 Economic Development Commission 8 Visitors Bureau & Tourism Marketing District 14 Appendix A: Energy Watch Partnership 18 Appendix B: KPS3 Marketing Report 55 Appendix C: Year-End Financials Table Of Contents 2020 ANNUAL REPORT 3 COVER LETTER September 2020 Alice Patino, Mayor Mike Cordero, Council Member Michael Moats, Council Member Gloria Soto, Council Member Etta Waterfield, Council Member Jason Stilwell, City Manager On behalf of the board, staff and members of the Santa Maria Valley Chamber of Commerce, I am pleased to share with you our annual report highlighting our work and results related to economic development and tourism on behalf of the City and community. The Chamber is proud to partner with the City of Santa Maria, The Santa Maria Public Airport District, and a growing list of regional and local partners on these programs. We are committed to being an aggressive and effective agent in making positive impacts on the economic vitality of our community. We do this through support for existing businesses, attraction of new businesses, and promotion of the community as a tourism/hospitality destination. This year’s report provides a review of the work that we completed during the 2019-2020 fiscal year, ending on June 30, 2020. As you know, the 2nd half of this year was unprecedented as we moved to support the business community during the pandemic; we have tried to highlight those efforts in the report. Economic development and tourism both require sustained investments and results develop over time.
    [Show full text]
  • Amended Motion to Disseminate September
    2:12-cv-00103-MOB-MKM Doc # 527 Filed 09/14/16 Pg 1 of 26 Pg ID 17866 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION IN RE: AUTOMOTIVE PARTS ANTITRUST LITIGATION : No. 12-md-02311 : Hon. Marianne O. Battani IN RE: WIRE HARNESS : Case No. 2:12-cv-00103 IN RE: INSTRUMENT PANEL CLUSTERS : Case No. 2:12-cv-00203 IN RE: FUEL SENDERS : Case No. 2:12-cv-00303 IN RE: HEATER CONTROL PANELS : Case No. 2:12-cv-00403 IN RE: BEARINGS : Case No. 2:12-cv-00503 IN RE: OCCUPANT SAFETY SYSTEMS : Case No. 2:12-cv-00603 IN RE: ALTERNATORS : Case No. 2:13-cv-00703 IN RE: ANTI-VIBRATIONAL RUBBER PARTS : Case No. 2:13-cv-00803 IN RE: WINDSHIELD WIPERS : Case No. 2:13-cv-00903 IN RE: RADIATORS : Case No. 2:13-cv-01003 IN RE: STARTERS : Case No. 2:13-cv-01103 IN RE: SWITCHES : Case No. 2:13-cv-01303 IN RE: IGNITION COILS : Case No. 2:13-cv-01403 IN RE: MOTOR GENERATORS : Case No. 2:13-cv-01503 IN RE: STEERING ANGLE SENSORS : Case No. 2:13-cv-01603 IN RE: HID BALLASTS : Case No. 2:13-cv-01703 IN RE: INVERTERS : Case No. 2:13-cv-01803 IN RE: ELECTRONIC POWERED STEERING ASSEMBLIES : Case No. 2:13-cv-01903 IN RE: AIR FLOW METERS : Case No. 2:13-cv-02003 IN RE: FAN MOTORS : Case No. 2:13-cv-02103 IN RE: FUEL INJECTION SYSTEMS : Case No. 2:13-cv-02203 IN RE: POWER WINDOW MOTORS : Case No.
    [Show full text]
  • Marriott Alumni Magazine 490 Tanner Building Brigham Young University Provo, UT 84602-3187 Phone: 801-422-5083 Fax: 801-422-0501 Email: [email protected]
    Brazil + Alumnus = Are You a Multiplier Professional Advice 2010 Annual Successful Steakhouse p 4 or a Diminisher? p 10 from the NAC p 16 Report p 37 a l u m i m a g a z i n e 2011 summer a l u m n i m a g a z i n e Issue Summer 2011 marriottschool.byu.edu PublIsher Gary C. Cornia managIng edItor Joseph D. Ogden edItor Emily Smurthwaite art Director Jon G. Woidka coPy edItors Monica Weeks Joyce Janetski contrIbutIng edItor Nina Whitehead assIstant edItor Sarah Tomoser contrIbutIng wrIters, edItors, Carrie Akinaka desIgners, & PhotograPhers Laura Barlow Robert G. Gardner Chadwick Little Angela Marler Bethany Morgan Courtney Rieder Nielsen Michelle Treasure Tyler Weaver magazIne desIgn BYU Publications & Graphics all communIcatIon should be sent to Marriott Alumni Magazine 490 Tanner Building Brigham Young University Provo, UT 84602-3187 Phone: 801-422-5083 Fax: 801-422-0501 emaIl: [email protected] marrIott alumnI magazIne Is PublIshed by the marrIott school oF management at brIgham young unIversIty, Provo, utah. the vIews exPressed In marrIott alumnI magazIne are not necessarIly endorsed by BYU or the church oF Jesus chrIst oF latter-day saInts. coPyrIght 2011 by brIgham young unIversIty. all rIghts reserved. find thIs and Past Issues oF marrIott alumnI magazIne onlIne at marriottmag.byu.edu correctIon—a sentence on Page 31 oF the Winter 2011 Issue read, “droP collIsIon and comPrehensIve coverage if the total oF the PremIum tImes ten Is less than the car’s value.” It should have read “. Is more than the car’s value.” PhotograPh by bradley slade I just don’t know why people are so crazy for Jimmer.
    [Show full text]
  • Code Palousa 2018 Conference Guide
    Code PaLOUsa 2018 March 28 - 30, 2018 Code PaLOUsa After Hours Sponsored by Google Join Code PaLOUsa attendees, speakers, exhibitors, and staff along with the Google Developers team for our Code PaLOUsa After Hours event – bringing together the local tech community for amazing conversations, tasty appetizers, and refreshing beverages! Thursday, March 29, 2018 Grand Belle Ballroom 5:30 pm to 9:00 pm Other Activities Happening during the Code PaLOUsa After Hours So You Know How to Code? A Gameshow for Geeks... Gaming Night Join the HMB team in a fast-paced pub-style team Tired after a long day of attending awesome trivia that will test your programming know-how sessions? Looking to get in touch with your inner or at least provide you with bizarre and hilarious geek? Come to Code PaLOUsa Game Night run- fun facts. Prizes are up for grabs and fun will be ning alongside the Code PaLOUsa After Hours had by all. Rest your brain after a day of learning on Thursday, March 29. Unwind with some of the lots of new things. board and card games available – or bring your favorite game to share. Remember what Benjamin Franklin said: “Games lubricate the body and the mind!” 2018 Conference Guide Important Information If there is anything we can do to make your conference experience better, please visit the registration desk and tell us! Schedule of Events Wednesday, March 28 7:00 am to 5:00 pm Registration/Information Desk Open (Julia Belle Foyer) 8:00 am to 12:00 pm Pre-Conference Workshops - Morning Sessions (Multiple Rooms - See Session Schedule) 12:00
    [Show full text]
  • Cloud Computing— Latest Buzzword Or a Glimpse of the Future?
    Cloud Computing— Latest Buzzword or a Glimpse of the Future? Sponsored by Google, Inc. Executive Summary: The chairman of the Cloud Summit Executive 2008 conference reportedly started the event by joking that he asked 20 people to define cloud computing, and got 22 different answers. The term came into vogue a few years ago and has since generated its share of controversy. Here are some descriptions we found for cloud computing: • Something that will “profoundly change the way people work and companies operate.” ( The Economist ) • “Reliance on the Internet for satisfying the computing needs of the users.” (Wikipedia) • “The next step in the evolution of software-as-a-service (SaaS) technology.” ([email protected]. Carey, Arizona State University’s online business publication) • “Industry-speak for just about anything tangentially related to the Internet.” (Ben Worthen, The Wall Street Journal ) • “We’ve redefined cloud computing to include everything that we already do. I can’t think of anything that isn’t cloud computing with all of these announcements.” (Larry Ellison, Oracle) Clearly, there is a diversity of opinion on what cloud computing is, what it isn’t, and whether it’s a sea change or just another technology fad. Our opinion: Don’t get hung up on definitions. Don’t focus on the jargon of whether something is cloud computing, or software as a service, or the latest buzzword. Instead, focus on the changing IT equation. The world of computing is moving away from the on- premises IT model, where you keep buying servers, PCs and software licenses as your business grows.
    [Show full text]
  • Cnet Networks
    SECURITIES AND EXCHANGE COMMISSION FORM 10-K Annual report pursuant to section 13 and 15(d) Filing Date: 2002-04-01 | Period of Report: 2001-07-31 SEC Accession No. 0001015577-02-000009 (HTML Version on secdatabase.com) FILER CNET NETWORKS INC Mailing Address Business Address 150 CHESTNUT ST 150 CHESTNUT ST CIK:1015577| IRS No.: 133696170 | State of Incorp.:DE | Fiscal Year End: 1231 SAN FRANCISCO CA 94111 SAN FRANCISCO CA 94111 Type: 10-K | Act: 34 | File No.: 000-20939 | Film No.: 02595841 4153648000 SIC: 7812 Motion picture & video tape production Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2001 OR [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from ________to _________ Commission File No. 0-20939 CNET Networks, Inc. (Exact name of registrant as specified in its charter) Delaware 13-3696170 (State or Other Jurisdiction of Incorporation or Organization) (IRS Employer Identification Number) 235 Second Street San Francisco, CA 94105 (Address of principal executive offices) Registrant's telephone number, including area code (415) 344-2000 Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered None None Securities registered pursuant to Section 12(g) of the Act: Title of class Common Stock, $0.0001 par value Indicate by check mark whether the issuer (1) filed all reports required to be filed by Section 13 or 15(d) of the Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]