Subcategories

At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

Posted By: exLib
At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues

"At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues" ed. by David Clark, Thomas Berson, and Herbert S. Lin
Committee on Developing a Cybersecurity Primer; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council
NAS Press | 2014 | ISBN: 0309303184 9780309303187 | 151 pages | PDF | 5 MB

At this book offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.

According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified.


Businesses use information technology (IT) for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions.
Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services.
Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems.
What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities?


Contents
SUMMARY
1 WHY CARE ABOUT CYBERSECURITY?
1.1 On the Meaning and Importance of Cyberspace and Cybersecurity
1.2 Cybersecurity and Public Policy Concerns
1.3 Organization of This Report
2 SOME BASICS OF COMPUTING AND COMMUNICATIONS TECHNOLOGY AND THEIR SIGNIFICANCE FOR CYBERSECURITY
2.1 Computing Technology
2.2 Communications Technology and the Internet
2.3 Information Technology Systems
3 ON THE NATURE OF CYBERSECURITY
3.1 On the Terminology for Discussions of Cybersecurity and Public Policy
3.2 What It Means to Be an Adversary in Cyberspace
3.2.1 Cyber Exploitation
3.2.2 Cyberattack
3.2.3 An Important Commonality for Exploitation and Attack
3.3 Inherent Vulnerabilities of Information Technology
3.4 The Anatomy of Adversarial Activities in Cyberspace
3.4.1 Cyber Penetration
3.4.2 Cyber Payloads (Malware)
3.4.3 Operational Considerations
3.5 Characterizing Threats to Cybersecurity
3.6 Threat Assessment
4 ENHANCING CYBERSECURITY
4.1 Approaches to Improving Security
4.1.1 Reducing Reliance on Information Technology
4.1.2 Knowing That Security Has Been Penetrated
4.1.3 Defending a System or Network
4.1.4 Ensuring Accountability
4.1.5 Building a Capacity for Containment, Recovery, and Resilience
4.1.6 Employing Active Defense
4.2 Nontechnological Dimensions of Cybersecurity
4.2.1 Economics
4.2.2 Psychology
4.2.3 Law
4.2.4 Organizational Purview
4.2.5 Deterrence
4.3 Assessing Cybersecurity
4.4 On the Need for Research
5 TENSIONS BETWEEN CYBERSECURITY AND OTHER PUBLIC POLICY CONCERNS
5.1 Economics
5.1.1 Economic Approaches to Enhancing Cybersecurity
5.1.2 Economic Impact of Compromises in Cybersecurity
5.2 Innovation
5.3 Civil Liberties
5.3.1 Privacy
5.3.2 Free Expression
5.3.3 Due Process
5.4 International Relations and National Security
5.4.1 Internet Governance
5.4.2 Reconciling Tensions Between Cybersecurity and Surveillance
5.4.3 Norms of Behavior in Cyberspace
5.4.4 Managing the Global Supply Chain for Information Technology
5.4.5 Role of Offensive Operations in Cyberspace
6 FINDINGS AND CONCLUSION
6.1 Findings
6.2 Conclusion
APPENDIXES
A Committee Members and Staff
B Bibliography
with TOC BookMarkLinks

DepositF • | • RGator • | • NitroF

UlNet • | • HiFi • | • SiBi • | • TuBi