Cybersecurity Today and Tomorrow: Pay Now or Pay Later
Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council
National Academies Press, Mar 13, 2002 - Computers - 25 pages
This report reviews past NRC studies that have examined various dimensions of computer and network security and vulnerability and brings the results forward into the context of the current environment of security and vulnerability. The review includes work done since 1991, such as Computers at Risk (1991), Cryptography s Role in Securing the Information Society (1996), For the Record: Protecting Electronic Health Information (1997), Trust in Cyberspace (1999), Continued Review of the Tax Systems Modernization of the Internal Revenue Service (1996), Realizing the Potential of C4I (1999), and Embedded, Everywhere (2001).
What people are saying - Write a review
We haven't found any reviews in the usual places.
Academy of Engineering Academy of Sciences accidental action administrative Carnegie Mellon University classified information components compromise Computer Science computer security computer systems Computers at Risk computing and communications confidentiality configuration coordinated costs critical infrastructure critical infrastructure protection Cryptographic CSTB reports cyberattack Cybersecurity damage device drivers disruption distributed denial-of-service attack effective example fixes Function gain access implement information attack information security information sys information systems security infrastructure protection Institute of Medicine interconnected Internet issues malicious National Academy Press National Research Council network security networked information operating system Orange Book organization passwords practice procedures Realizing the Potential red teams rely response result Science and Telecommunications security features security problems Senior Project Assistant system and network system or network target technical Telecommunications Board CSTB tems testing tion Trust in Cyberspace trustworthiness unauthorized users viruses vulnerabilities Washington