Cyber Security--how Can We Protect American Computer Networks from Attack?: Hearing Before the Committee on Science, House of Representatives, One Hundred Seventh Congress, First Session, October 10, 2001, Volume 4

Front Cover
U.S. Government Printing Office, 2002 - Computer networks - 79 pages
 

Other editions - View all

Common terms and phrases

Popular passages

Page 25 - Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park's eenterprise Center.
Page 49 - Partnerships are built between people and organizations who recognize the value in joint collaboration toward a common end. They are fragile entities which need to be established and maintained by all participants and built upon a foundation of trust. The Secret Service, by virtue of the protective mission for which we are so well known, has always emphasized discretion and trust in executing our protective duties. We learned long ago that our agency needed the full support and confidence...
Page 50 - In this context, our efforts to combat cyber assaults which target information and communication systems which support the financial sector, are part of the larger and more comprehensive critical infrastructure protection scheme. The whole notion of infrastructure protection embodies an assurance and confidence in the delivery of critical functions and services that in today's world are increasingly interdependent and interconnected.
Page 5 - Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, /. Assessing the Threat, December 1 5, 1999; and.
Page 50 - ... delivery of critical functions and services that in today's world are increasingly interdependent and interconnected. To put this all into perspective, the public's confidence is lost if such delivery systems and services are unreliable or unpredictable, regardless of because the cause of the problem. The Secret Service recognizes that its role in investigating computer-based attacks against the financial sector can be significant in the larger plan for the protection of our Nation's critical...
Page 48 - Because of the recognized expertise of those in ECSAP, other law enforcement agencies regularly request training from the Secret Service or advice concerning their own computer forensics programs. These requests have come from agencies all across the country, as well as foreign countries such as Italy and Thailand. The Secret Service recognizes the need to promote international cooperation and remains proactive in the dissemination of information to law enforcement agencies, both domestically and...
Page 49 - Law enforcement in general is not sufficiently equipped to train the masses nor can it compete with academic institutions of higher learning in the area of research and development. However, our partnerships with industry and academia have demonstrated that this can be an integral part of the solution. Partnerships are a very popular term in both government and the private industry these days and everyone agrees that there is great benefit in such an approach.
Page 47 - Service has found a highly-effective formula for combating high tech crime — a formula that has been successfully developed by our New York Electronic Crimes Task Force. While the Secret Service leads this innovative effort, we do not control or dominate the participants and the investigative agenda of the task force.
Page 48 - ... telecommunications providers, for instance, bring a wealth of technical expertise. Within this New York model, established in 1995, there are 50 different federal, state and local law enforcement agencies represented as well as prosecutors, academic leaders and over 100 different private sector corporations. The wealth of expertise and resources that reside in this task force coupled with unprecedented information sharing yields a highly mobile and responsive machine. In task force investigations,...
Page 46 - Service leads this innovative effort, we do not control or dominate the participants and the investigative agenda of the task force. Rather, the task force provides a productive framework and collaborative crimefighting environment in which the resources of its participants can be combined to effectively and efficiently make a significant impact on electronic crimes. Other law enforcement agencies bring additional criminal enforcement jurisdiction and resources to the task force while representatives...

Bibliographic information