Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book

Title Toward a safer and more secure cyberspace / Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

Publication Info. Washington, DC : National Academies Press, [2007]
©2007

Item Status

Description 1 online resource (xx, 307 pages)
Physical Medium polychrome
Description text file
Bibliography Includes bibliographical references.
Summary Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.
Contents Cover -- Preface -- Acknowledgment of Reviewers -- Contents -- Boxes -- Executive Summary -- Part I58; Setting the Stage -- 1 Introduction -- 146;1 The Report in Brief -- 146;2 Background of the Study -- 2 What Is at Stake63; -- 246;1 Interconnected Information Technology Everywhere44; All the Time -- 246;2 The Nature of Cybersecurity Vulnerabilities -- 246;3 Systems and Networks at Risk -- 246;4 Potential Consequences of Exploits -- 246;5 The Magnitude of the Threat Against Todays Technologies -- 246;6 An Ominous Future -- 3 Improving the Nations Cybersecurity Posture -- 346;1 The Cybersecurity Bill of Rights -- 346;2 Realizing the Vision -- 346;3 The Necessity of Research -- 346;4 Principles to Shape the Research Agenda -- Part II58; An Illustrative Research Agenda -- 4 Category 18212;Blocking and Limiting the Impact of Compromise -- 446;1 Secure Design44; Development44; and Testing -- 446;2 Graceful Degradation and Recovery -- 446;3 Software and Systems Assurance -- 5 Category 28212;Enabling Accountability -- 546;1 Attribution -- 546;2 Misuse and Anomaly Detection Systems -- 546;3 Digital Rights Management -- 6 Category 38212;Promoting Deployment -- 646;1 Usable Security -- 646;2 Exploitation of Previous Work -- 646;3 Cybersecurity Metrics -- 646;4 The Economics of Cybersecurity -- 646;5 Security Policies -- 7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers -- 746;1 Legal Issues Related to Cybersecurity -- 746;2 Honeypots -- 746;3 Forensics -- 8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas -- 846;1 Security for Legacy Systems -- 846;2 The Role of Secrecy in Cyberdefense -- 846;3 Insider Threats -- 846;4 Security in Nontraditional Computing Environments and in the Context of Use -- 846;5 Secure Network Architectures -- 846;6 Attack Characterization -- 846;7 Coping with Denial45;of45;Service Attacks -- 846;8 Dealing with Spam -- 9 Category 68212;Speculative Research -- 946;1 A Cyberattack Research Activity -- 946;2 Biological Approaches to Security -- 946;3 Using Attack Techniques for Defensive Purposes -- 946;4 Cyber45;Retaliation -- Part III58; Conclusion -- 10 Looking to the Future -- 1046;1 Why Has Little Action Occurred63; -- 1046;2 Priorities for Action -- 1046;3 Concluding Comments -- Appendixes -- Appendix A58; Committee and Staff Biographies -- Appendix B58; Cybersecurity Reports and Policy58; The Recent Past -- B46;1 Introduction -- B46;2 Cybersecurity Policy Activity Since 2001 -- B46;3 Identifying Exposures44; Best Practices44; and Procedures -- B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation -- B46;5 Notable Recent Efforts at Identifying a Research Agenda -- B46;6 The Current Federal Research and Development Landscape -- Appendix C58; Contributors to the Study -- Last Page.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer networks -- Security measures.
Computer networks -- Security measures.
Computer security.
Computer security.
Cyberterrorism -- Prevention.
Cyberterrorism -- Prevention.
Cyberterrorism.
Genre/Form Electronic books.
Computer network resources.
Electronic books.
Added Author Goodman, Seymour E.
Lin, Herbert.
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States.
Other Form: Print version: Toward a safer and more secure cyberspace. Washington, DC : National Academies Press, ©2007 (DLC) 2007037982
ISBN 9780309667418 (electronic book)
0309667410 (electronic book)
1281109916
9781281109910
0309103959 (paperback)
9780309103954 (paperback)