The Role of Computer Security in Protecting U.S. Infrastructures: Hearing Before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, First Session, November 6, 1997, Volume 4

Front Cover
 

Other editions - View all

Common terms and phrases

Popular passages

Page 2 - Subcommittee met, pursuant to notice, at 2 pm, in room 2318, Rayburn House Office Building, Hon. Constance A. Morella, Chairwoman of the Subcommittee, presiding.
Page 11 - Certain national infrastructures are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States.
Page 33 - He is a member of the bars of the District of Columbia and the state of Missouri.
Page 17 - They are aimed at improving coordination and establishing roles for infrastructure protection, fostering partnerships among all stakeholders, and coordinating diverse interests.
Page 152 - H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, and B. Schneier. The risks of key recovery, key escrow, and trusted third-party encryption.
Page 7 - Waiting for a serious threat to appear is a dangerous strategy. Now is the time to act to protect our future.
Page 8 - I would be pleased to answer any questions you or your colleagues may have. Thank you. Mr.
Page 14 - National Security Telecommunications Advisory Committee But there are important shortfalls Increased sharing of threat and vulnerability information within each infrastructure, across different sectors, and between sectors and the government is essential for owners and operators to understand their risks and acquire better means of protection Responsibility is shared among owners and operators and the government. Owners and operators have always focused on protecting...
Page 15 - In our view, the line separating threats that apply only to the private sector from those associated with traditional national security concerns must give way to a concept of shared threats. Shared threats...
Page 14 - ... many respects, our most important finding is the need to think differently about infrastructure protection. Today's approach was designed to deal with the Industrial Revolution, then was adjusted to address the stabilization of America after the Civil War, the Depression, World War II, and finally the nuclear stand-off of the Cold War. None of those approaches is particularly applicable to the world as it looks through the lens of information technology in the third millennium.

Bibliographic information