Waubonsee Community College

Toward a safer and more secure cyberspace, Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors

Label
Toward a safer and more secure cyberspace, Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors
Language
eng
Bibliography note
Includes bibliographical references
Index
no index present
Literary Form
non fiction
Main title
Toward a safer and more secure cyberspace
Nature of contents
dictionariesbibliography
Oclc number
567901186
Responsibility statement
Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors
Summary
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety
Table Of Contents
Cover -- Preface -- Acknowledgment of Reviewers -- Contents -- Boxes -- Executive Summary -- Part I58; Setting the Stage -- 1 Introduction -- 146;1 The Report in Brief -- 146;2 Background of the Study -- 2 What Is at Stake63; -- 246;1 Interconnected Information Technology Everywhere44; All the Time -- 246;2 The Nature of Cybersecurity Vulnerabilities -- 246;3 Systems and Networks at Risk -- 246;4 Potential Consequences of Exploits -- 246;5 The Magnitude of the Threat Against Todays Technologies -- 246;6 An Ominous Future -- 3 Improving the Nations Cybersecurity Posture -- 346;1 The Cybersecurity Bill of Rights -- 346;2 Realizing the Vision -- 346;3 The Necessity of Research -- 346;4 Principles to Shape the Research Agenda -- Part II58; An Illustrative Research Agenda -- 4 Category 18212;Blocking and Limiting the Impact of Compromise -- 446;1 Secure Design44; Development44; and Testing -- 446;2 Graceful Degradation and Recovery -- 446;3 Software and Systems Assurance -- 5 Category 28212;Enabling Accountability -- 546;1 Attribution -- 546;2 Misuse and Anomaly Detection Systems -- 546;3 Digital Rights Management -- 6 Category 38212;Promoting Deployment -- 646;1 Usable Security -- 646;2 Exploitation of Previous Work -- 646;3 Cybersecurity Metrics -- 646;4 The Economics of Cybersecurity -- 646;5 Security Policies -- 7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers -- 746;1 Legal Issues Related to Cybersecurity -- 746;2 Honeypots -- 746;3 Forensics -- 8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas -- 846;1 Security for Legacy Systems -- 846;2 The Role of Secrecy in Cyberdefense -- 846;3 Insider Threats -- 846;4 Security in Nontraditional Computing Environments and in the Context of Use -- 846;5 Secure Network Architectures -- 846;6 Attack Characterization -- 846;7 Coping with Denial45;of45;Service Attacks -- 846;8 Dealing with Spam -- 9 Category 68212;Speculative Research -- 946;1 A Cyberattack Research Activity -- 946;2 Biological Approaches to Security -- 946;3 Using Attack Techniques for Defensive Purposes -- 946;4 Cyber45;Retaliation -- Part III58; Conclusion -- 10 Looking to the Future -- 1046;1 Why Has Little Action Occurred63; -- 1046;2 Priorities for Action -- 1046;3 Concluding Comments -- Appendixes -- Appendix A58; Committee and Staff Biographies -- Appendix B58; Cybersecurity Reports and Policy58; The Recent Past -- B46;1 Introduction -- B46;2 Cybersecurity Policy Activity Since 2001 -- B46;3 Identifying Exposures44; Best Practices44; and Procedures -- B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation -- B46;5 Notable Recent Efforts at Identifying a Research Agenda -- B46;6 The Current Federal Research and Development Landscape -- Appendix C58; Contributors to the Study -- Last Page
Classification
Content
Mapped to