Корично изображение Електронна книга

Toward a safer and more secure cyberspace /

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information...

Пълно описание

Автор-организации: National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
Други автори: Goodman, Seymour E., Lin, Herbert.
Формат: Електронна книга
Език: English
Публикувано: Washington, DC : National Academies Press, ℗♭2007.
Предмети:
Онлайн достъп: http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213814
Подобни документи: Print version:: Toward a safer and more secure cyberspace.
Съдържание:
  • Cover
  • Preface
  • Acknowledgment of Reviewers
  • Contents
  • Boxes
  • Executive Summary
  • Part I58; Setting the Stage
  • 1 Introduction
  • 146;1 The Report in Brief
  • 146;2 Background of the Study
  • 2 What Is at Stake63;
  • 246;1 Interconnected Information Technology Everywhere44; All the Time
  • 246;2 The Nature of Cybersecurity Vulnerabilities
  • 246;3 Systems and Networks at Risk
  • 246;4 Potential Consequences of Exploits
  • 246;5 The Magnitude of the Threat Against Todays Technologies
  • 246;6 An Ominous Future
  • 3 Improving the Nations Cybersecurity Posture
  • 346;1 The Cybersecurity Bill of Rights
  • 346;2 Realizing the Vision
  • 346;3 The Necessity of Research
  • 346;4 Principles to Shape the Research Agenda
  • Part II58; An Illustrative Research Agenda
  • 4 Category 18212;Blocking and Limiting the Impact of Compromise
  • 446;1 Secure Design44; Development44; and Testing
  • 446;2 Graceful Degradation and Recovery
  • 446;3 Software and Systems Assurance
  • 5 Category 28212;Enabling Accountability
  • 546;1 Attribution
  • 546;2 Misuse and Anomaly Detection Systems
  • 546;3 Digital Rights Management
  • 6 Category 38212;Promoting Deployment
  • 646;1 Usable Security
  • 646;2 Exploitation of Previous Work
  • 646;3 Cybersecurity Metrics
  • 646;4 The Economics of Cybersecurity
  • 646;5 Security Policies
  • 7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers
  • 746;1 Legal Issues Related to Cybersecurity
  • 746;2 Honeypots
  • 746;3 Forensics
  • 8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas
  • 846;1 Security for Legacy Systems
  • 846;2 The Role of Secrecy in Cyberdefense
  • 846;3 Insider Threats
  • 846;4 Security in Nontraditional Computing Environments and in the Context of Use
  • 846;5 Secure Network Architectures
  • 846;6 Attack Characterization
  • 846;7 Coping with Denial45;of45;Service Attacks
  • 846;8 Dealing with Spam
  • 9 Category 68212;Speculative Research
  • 946;1 A Cyberattack Research Activity
  • 946;2 Biological Approaches to Security
  • 946;3 Using Attack Techniques for Defensive Purposes
  • 946;4 Cyber45;Retaliation
  • Part III58; Conclusion
  • 10 Looking to the Future
  • 1046;1 Why Has Little Action Occurred63;
  • 1046;2 Priorities for Action
  • 1046;3 Concluding Comments
  • Appendixes
  • Appendix A58; Committee and Staff Biographies
  • Appendix B58; Cybersecurity Reports and Policy58; The Recent Past
  • B46;1 Introduction
  • B46;2 Cybersecurity Policy Activity Since 2001
  • B46;3 Identifying Exposures44; Best Practices44; and Procedures
  • B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation
  • B46;5 Notable Recent Efforts at Identifying a Research Agenda
  • B46;6 The Current Federal Research and Development Landscape
  • Appendix C58; Contributors to the Study
  • Last Page.