Toward a safer and more secure cyberspace /
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information...
Автор-организации: | National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States. |
---|---|
Други автори: | Goodman, Seymour E., Lin, Herbert. |
Формат: | Електронна книга |
Език: | English |
Публикувано: |
Washington, DC :
National Academies Press,
℗♭2007.
|
Предмети: | |
Онлайн достъп: |
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213814 |
Подобни документи: |
Print version::
Toward a safer and more secure cyberspace. |
Съдържание:
- Cover
- Preface
- Acknowledgment of Reviewers
- Contents
- Boxes
- Executive Summary
- Part I58; Setting the Stage
- 1 Introduction
- 146;1 The Report in Brief
- 146;2 Background of the Study
- 2 What Is at Stake63;
- 246;1 Interconnected Information Technology Everywhere44; All the Time
- 246;2 The Nature of Cybersecurity Vulnerabilities
- 246;3 Systems and Networks at Risk
- 246;4 Potential Consequences of Exploits
- 246;5 The Magnitude of the Threat Against Todays Technologies
- 246;6 An Ominous Future
- 3 Improving the Nations Cybersecurity Posture
- 346;1 The Cybersecurity Bill of Rights
- 346;2 Realizing the Vision
- 346;3 The Necessity of Research
- 346;4 Principles to Shape the Research Agenda
- Part II58; An Illustrative Research Agenda
- 4 Category 18212;Blocking and Limiting the Impact of Compromise
- 446;1 Secure Design44; Development44; and Testing
- 446;2 Graceful Degradation and Recovery
- 446;3 Software and Systems Assurance
- 5 Category 28212;Enabling Accountability
- 546;1 Attribution
- 546;2 Misuse and Anomaly Detection Systems
- 546;3 Digital Rights Management
- 6 Category 38212;Promoting Deployment
- 646;1 Usable Security
- 646;2 Exploitation of Previous Work
- 646;3 Cybersecurity Metrics
- 646;4 The Economics of Cybersecurity
- 646;5 Security Policies
- 7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers
- 746;1 Legal Issues Related to Cybersecurity
- 746;2 Honeypots
- 746;3 Forensics
- 8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas
- 846;1 Security for Legacy Systems
- 846;2 The Role of Secrecy in Cyberdefense
- 846;3 Insider Threats
- 846;4 Security in Nontraditional Computing Environments and in the Context of Use
- 846;5 Secure Network Architectures
- 846;6 Attack Characterization
- 846;7 Coping with Denial45;of45;Service Attacks
- 846;8 Dealing with Spam
- 9 Category 68212;Speculative Research
- 946;1 A Cyberattack Research Activity
- 946;2 Biological Approaches to Security
- 946;3 Using Attack Techniques for Defensive Purposes
- 946;4 Cyber45;Retaliation
- Part III58; Conclusion
- 10 Looking to the Future
- 1046;1 Why Has Little Action Occurred63;
- 1046;2 Priorities for Action
- 1046;3 Concluding Comments
- Appendixes
- Appendix A58; Committee and Staff Biographies
- Appendix B58; Cybersecurity Reports and Policy58; The Recent Past
- B46;1 Introduction
- B46;2 Cybersecurity Policy Activity Since 2001
- B46;3 Identifying Exposures44; Best Practices44; and Procedures
- B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation
- B46;5 Notable Recent Efforts at Identifying a Research Agenda
- B46;6 The Current Federal Research and Development Landscape
- Appendix C58; Contributors to the Study
- Last Page.