Cybersecurity Today and Tomorrow:: Pay Now or Pay Later
Computer Science and Telecommunications Board, National Research Council, Division on Engineering and Physical Sciences
National Academies Press, Mar 12, 2002 - Computers - 50 pages
This report reviews past NRC studies that have examined various dimensions of computer and network security and vulnerability and brings the results forward into the context of the current environment of security and vulnerability. The review includes work done since 1991, such as Computers at Risk (1991), Cryptography s Role in Securing the Information Society (1996), For the Record: Protecting Electronic Health Information (1997), Trust in Cyberspace (1999), Continued Review of the Tax Systems Modernization of the Internal Revenue Service (1996), Realizing the Potential of C4I (1999), and Embedded, Everywhere (2001).
What people are saying - Write a review
We haven't found any reviews in the usual places.
CYBERSECURITY TODAY AND TOMORROW
THE NATURE OF CYBERTHREATS
CAUSES OF SYSTEM AND NETWORK PROBLEMS
THE HARM FROM BREACHES OF CYBERSECURITY
WHAT DO WE KNOW ABOUT CYBERSECURITY?
WHAT CAN BE DONE?
EXCERPTS FROM EARLIER CSTB REPORTS
SAFE COMPUTING IN THE INFORMATION AGE 1991
FUNDAMENTAL CHALLENGES 1999
TRUST IN CYBERSPACE 1999
WHAT IS CSTB?
Other editions - View all
Academy of Engineering Academy of Sciences accidental action administrative Carnegie Mellon University Challenges classified information components compromise Computer Science computer security computer systems Computers at Risk computing and communications confidentiality configuration coordinated costs critical infrastructure critical infrastructure protection Cryptographic CSTB reports cyberattack damage device drivers disruption distributed denial-of-service attack effective example fixes Function gain access implement information attack information security information systems security infrastructure protection Institute of Medicine interact interconnected Internet issues malicious National Academy Press National Research Council network security networked information operating system Orange Book organization passwords Potential of C4I practice procedures Realizing the Potential red teams response result Science and Telecommunications Secure Systems security features security problems system and network system or network target technical Telecommunications Board CSTB telephone tems testing threat tion Trust in Cyberspace trustworthiness unauthorized users vendors viruses vulnerabilities Washington