The Role of Computer Security in Protecting U.S. Infrastructures: Hearing Before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, First Session, November 6, 1997, Volume 4 |
Other editions - View all
Common terms and phrases
agencies arrested attacks backup banks bill bogus Citibank Commission Commission's report communications computer networks computer security computer system computer-communication computerized crash credit-card critical infrastructures crypto cryptography cyber threats CyberCash database defense e-mail efforts electronic commerce encryption error failure files flaw fraud funding glitch global hacker implementation industry information infrastructures information security information sharing infrastructure assurance infrastructure protection Inside Risks Internet issues Katz key escrow key management key management infrastructures key recovery law enforcement legislation logic bomb Madam Chairwoman Marsh Microsoft million missile misuse MORELLA national infrastructures national security National Security Agency Neumann nuclear operators outage passwords phone fraud private sector problems proposed recommendations requires role SRI International Stevenson Subcommittee systems and networks TCSEC testimony Thank Trojan horse trust virus vulnerabilities
Popular passages
Page 2 - Subcommittee met, pursuant to notice, at 2 pm, in room 2318, Rayburn House Office Building, Hon. Constance A. Morella, Chairwoman of the Subcommittee, presiding.
Page 11 - Certain national infrastructures are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the United States.
Page 33 - He is a member of the bars of the District of Columbia and the state of Missouri.
Page 17 - They are aimed at improving coordination and establishing roles for infrastructure protection, fostering partnerships among all stakeholders, and coordinating diverse interests.
Page 152 - H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, and B. Schneier. The risks of key recovery, key escrow, and trusted third-party encryption.
Page 7 - Waiting for a serious threat to appear is a dangerous strategy. Now is the time to act to protect our future.
Page 8 - I would be pleased to answer any questions you or your colleagues may have. Thank you. Mr.
Page 14 - National Security Telecommunications Advisory Committee But there are important shortfalls Increased sharing of threat and vulnerability information within each infrastructure, across different sectors, and between sectors and the government is essential for owners and operators to understand their risks and acquire better means of protection Responsibility is shared among owners and operators and the government. Owners and operators have always focused on protecting...
Page 15 - In our view, the line separating threats that apply only to the private sector from those associated with traditional national security concerns must give way to a concept of shared threats. Shared threats...
Page 14 - ... many respects, our most important finding is the need to think differently about infrastructure protection. Today's approach was designed to deal with the Industrial Revolution, then was adjusted to address the stabilization of America after the Civil War, the Depression, World War II, and finally the nuclear stand-off of the Cold War. None of those approaches is particularly applicable to the world as it looks through the lens of information technology in the third millennium.