Computers at Risk: Safe Computing in the Information AgeComputers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy. |
From inside the book
Results 1-5 of 45
... Recommendation 3: Recommendation 4: CONTENTS xii Fund and Pursue Needed Research Establish an Information. CONTENTS xi 1 Recommendation 1: Recommendation 2: Contents. EXECUTIVE SUMMARY 1 OVERVIEW AND RECOMMENDATIONS 7 Computer System ...
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
EXECUTIVE SUMMARY 1 | |
OVERVIEW AND RECOMMENDATIONS 7 | |
Promulgate Comprehensive Generally 27 | |
Gather Information and Provide Education 36 | |
Fund and Pursue Needed Research 39 | |
CONCEPTS OF INFORMATION SECURITY 49 | |
1 Privacy 66 | |
TECHNOLOGY TO ACHIEVE SECURE COM 74 | |
Export Controls as a Market Inhibitor 152 | |
Consumer Awareness 159 | |
Product 165 | |
1 Export Control Process 173 | |
THE NEED TO ESTABLISH AN INFORMA 179 | |
1 | |
A New Notforprofit Organization 186 | |
RESEARCH TOPICS AND FUNDING | |
Communications 93 | |
Methodology 99 | |
CRITERIA TO EVALUATE COMPUTER AND 124 | |
WHY THE SECURITY MARKET HAS NOT 143 | |
BIBLIOGRAPHY | |
APPENDIXES | |
List of Members of the Former Commission | |