Toward a Safer and More Secure Cyberspace (Google eBook)
Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council
National Academies Press, Oct 24, 2007 - Computers - 297 pages
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets.
Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.
What people are saying - Write a review
We haven't found any reviews in the usual places.
actions activities adversary agencies analysis applications approach architecture areas attack behavior botnets Carnegie Mellon University Category CERT/CC committee components compromised Computer Science Computer Security Computer Virus context coordination critical infrastructure cryptography cyber cyberattack cybersecurity posture cybersecurity problem cybersecurity research cyberspace DARPA defense deployed deployment detection Digital Forensic e-mail economic efforts engineering environment example exploit federal focus focused functionality funding hardware high-end honeypot identify implementation important individual Information Assurance Information Security information technology interfaces Internet issues mechanisms ment metrics National Academy operating system organizations party PITAC potential practices protocols relevant requirements research agenda Research and Development response result risk rity SCADA secure cyberspace security policies security research spam spam e-mail specific Symantec target technical testing threat tion Trust trustworthy users vendors vulnerabilities Workshop