Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Cover -- Preface -- Acknowledgment of Reviewers -- Contents -- Boxes -- Executive Summary -- Part I58; Setting the Stage -- 1 Introduction -- 146;1 The Report in Brief -- 146;2 Background of the Study -- 2 What Is at Stake63; -- 246;1 Interconnected Information Technology Everywhere44; All the Time -- 246;2 The Nature of Cybersecurity Vulnerabilities -- 246;3 Systems and Networks at Risk -- 246;4 Potential Consequences of Exploits -- 246;5 The Magnitude of the Threat Against Todays Technologies -- 246;6 An Ominous Future -- 3 Improving the Nations Cybersecurity Posture -- 346;1 The Cybersecurity Bill of Rights -- 346;2 Realizing the Vision -- 346;3 The Necessity of Research -- 346;4 Principles to Shape the Research Agenda -- Part II58; An Illustrative Research Agenda -- 4 Category 18212;Blocking and Limiting the Impact of Compromise -- 446;1 Secure Design44; Development44; and Testing -- 446;2 Graceful Degradation and Recovery -- 446;3 Software and Systems Assurance -- 5 Category 28212;Enabling Accountability -- 546;1 Attribution -- 546;2 Misuse and Anomaly Detection Systems -- 546;3 Digital Rights Management -- 6 Category 38212;Promoting Deployment -- 646;1 Usable Security -- 646;2 Exploitation of Previous Work -- 646;3 Cybersecurity Metrics -- 646;4 The Economics of Cybersecurity -- 646;5 Security Policies -- 7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers -- 746;1 Legal Issues Related to Cybersecurity -- 746;2 Honeypots -- 746;3 Forensics -- 8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas -- 846;1 Security for Legacy Systems -- 846;2 The Role of Secrecy in Cyberdefense -- 846;3 Insider Threats -- 846;4 Security in Nontraditional Computing Environments and in the Context of Use -- 846;5 Secure Network Architectures -- 846;6 Attack Characterization -- 846;7 Coping with Denial45;of45;Service Attacks -- 846;8 Dealing with Spam -- 9 Category 68212;Speculative Research -- 946;1 A Cyberattack Research Activity -- 946;2 Biological Approaches to Security -- 946;3 Using Attack Techniques for Defensive Purposes -- 946;4 Cyber45;Retaliation -- Part III58; Conclusion -- 10 Looking to the Future -- 1046;1 Why Has Little Action Occurred63; -- 1046;2 Priorities for Action -- 1046;3 Concluding Comments -- Appendixes -- Appendix A58; Committee and Staff Biographies -- Appendix B58; Cybersecurity Reports and Policy58; The Recent Past -- B46;1 Introduction -- B46;2 Cybersecurity Policy Activity Since 2001 -- B46;3 Identifying Exposures44; Best Practices44; and Procedures -- B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation -- B46;5 Notable Recent Efforts at Identifying a Research Agenda -- B46;6 The Current Federal Research and Development Landscape -- Appendix C58; Contributors to the Study -- Last Page.
0
SUMMARY OR ABSTRACT
Text of Note
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.
OTHER EDITION IN ANOTHER MEDIUM
Title
Toward a safer and more secure cyberspace.
TOPICAL NAME USED AS SUBJECT
Computer networks-- Security measures.
Computer security.
Cyberterrorism-- Prevention.
Computer networks-- Security measures.
Computer security.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
Cyberterrorism-- Prevention.
(SUBJECT CATEGORY (Provisional
COM-- 043050
COM-- 053000
COM-- 060040
K
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8
Edition
22
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA76
.
9
.
A25
Book number
T695
2007eb
PERSONAL NAME - ALTERNATIVE RESPONSIBILITY
Goodman, Seymour E.
Lin, Herbert.
CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY
National Research Council (U.S.)., Committee on Improving Cybersecurity Research in the United States.