Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
2007
QA76.9.A25 T695 2007eb
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Linked e-resources
Details
Title
Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
ISBN
9780309667418 (electronic bk.)
0309667410 (electronic bk.)
1281109916
9781281109910
0309103959 (pbk.)
9780309103954 (pbk.)
9786611109912
6611109919
0309185610
9780309185615
0309667410 (electronic bk.)
1281109916
9781281109910
0309103959 (pbk.)
9780309103954 (pbk.)
9786611109912
6611109919
0309185610
9780309185615
Imprint
Washington, DC : National Academies Press, ©2007.
Language
English
Language Note
English.
Description
1 online resource (xx, 307 pages)
Call Number
QA76.9.A25 T695 2007eb
System Control No.
(OCoLC)567901186
Summary
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.
Bibliography, etc. Note
Includes bibliographical references.
Formatted Contents Note
Cover
Preface
Acknowledgment of Reviewers
Contents
Boxes
Executive Summary
Part I58; Setting the Stage
1 Introduction
146;1 The Report in Brief
146;2 Background of the Study
2 What Is at Stake63;
246;1 Interconnected Information Technology Everywhere44; All the Time
246;2 The Nature of Cybersecurity Vulnerabilities
246;3 Systems and Networks at Risk
246;4 Potential Consequences of Exploits
246;5 The Magnitude of the Threat Against Todays Technologies
246;6 An Ominous Future
3 Improving the Nations Cybersecurity Posture
346;1 The Cybersecurity Bill of Rights
346;2 Realizing the Vision
346;3 The Necessity of Research
346;4 Principles to Shape the Research Agenda
Part II58; An Illustrative Research Agenda
4 Category 18212;Blocking and Limiting the Impact of Compromise
446;1 Secure Design44; Development44; and Testing
446;2 Graceful Degradation and Recovery
446;3 Software and Systems Assurance
5 Category 28212;Enabling Accountability
546;1 Attribution
546;2 Misuse and Anomaly Detection Systems
546;3 Digital Rights Management
6 Category 38212;Promoting Deployment
646;1 Usable Security
646;2 Exploitation of Previous Work
646;3 Cybersecurity Metrics
646;4 The Economics of Cybersecurity
646;5 Security Policies
7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers
746;1 Legal Issues Related to Cybersecurity
746;2 Honeypots
746;3 Forensics
8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas
846;1 Security for Legacy Systems
846;2 The Role of Secrecy in Cyberdefense
846;3 Insider Threats
846;4 Security in Nontraditional Computing Environments and in the Context of Use
846;5 Secure Network Architectures
846;6 Attack Characterization
846;7 Coping with Denial45;of45;Service Attacks
846;8 Dealing with Spam
9 Category 68212;Speculative Research
946;1 A Cyberattack Research Activity
946;2 Biological Approaches to Security
946;3 Using Attack Techniques for Defensive Purposes
946;4 Cyber45;Retaliation
Part III58; Conclusion
10 Looking to the Future
1046;1 Why Has Little Action Occurred63;
1046;2 Priorities for Action
1046;3 Concluding Comments
Appendixes
Appendix A58; Committee and Staff Biographies
Appendix B58; Cybersecurity Reports and Policy58; The Recent Past
B46;1 Introduction
B46;2 Cybersecurity Policy Activity Since 2001
B46;3 Identifying Exposures44; Best Practices44; and Procedures
B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation
B46;5 Notable Recent Efforts at Identifying a Research Agenda
B46;6 The Current Federal Research and Development Landscape
Appendix C58; Contributors to the Study
Last Page.
Preface
Acknowledgment of Reviewers
Contents
Boxes
Executive Summary
Part I58; Setting the Stage
1 Introduction
146;1 The Report in Brief
146;2 Background of the Study
2 What Is at Stake63;
246;1 Interconnected Information Technology Everywhere44; All the Time
246;2 The Nature of Cybersecurity Vulnerabilities
246;3 Systems and Networks at Risk
246;4 Potential Consequences of Exploits
246;5 The Magnitude of the Threat Against Todays Technologies
246;6 An Ominous Future
3 Improving the Nations Cybersecurity Posture
346;1 The Cybersecurity Bill of Rights
346;2 Realizing the Vision
346;3 The Necessity of Research
346;4 Principles to Shape the Research Agenda
Part II58; An Illustrative Research Agenda
4 Category 18212;Blocking and Limiting the Impact of Compromise
446;1 Secure Design44; Development44; and Testing
446;2 Graceful Degradation and Recovery
446;3 Software and Systems Assurance
5 Category 28212;Enabling Accountability
546;1 Attribution
546;2 Misuse and Anomaly Detection Systems
546;3 Digital Rights Management
6 Category 38212;Promoting Deployment
646;1 Usable Security
646;2 Exploitation of Previous Work
646;3 Cybersecurity Metrics
646;4 The Economics of Cybersecurity
646;5 Security Policies
7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers
746;1 Legal Issues Related to Cybersecurity
746;2 Honeypots
746;3 Forensics
8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas
846;1 Security for Legacy Systems
846;2 The Role of Secrecy in Cyberdefense
846;3 Insider Threats
846;4 Security in Nontraditional Computing Environments and in the Context of Use
846;5 Secure Network Architectures
846;6 Attack Characterization
846;7 Coping with Denial45;of45;Service Attacks
846;8 Dealing with Spam
9 Category 68212;Speculative Research
946;1 A Cyberattack Research Activity
946;2 Biological Approaches to Security
946;3 Using Attack Techniques for Defensive Purposes
946;4 Cyber45;Retaliation
Part III58; Conclusion
10 Looking to the Future
1046;1 Why Has Little Action Occurred63;
1046;2 Priorities for Action
1046;3 Concluding Comments
Appendixes
Appendix A58; Committee and Staff Biographies
Appendix B58; Cybersecurity Reports and Policy58; The Recent Past
B46;1 Introduction
B46;2 Cybersecurity Policy Activity Since 2001
B46;3 Identifying Exposures44; Best Practices44; and Procedures
B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation
B46;5 Notable Recent Efforts at Identifying a Research Agenda
B46;6 The Current Federal Research and Development Landscape
Appendix C58; Contributors to the Study
Last Page.
Source of Description
Print version record.
Added Author
Added Corporate Author
Available in Other Form
Print version: Toward a safer and more secure cyberspace. Washington, DC : National Academies Press, ©2007
Linked Resources
Record Appears in