World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Crs Report for Congress Received through the Crs Web Creating a National Framework for Cybersecurity : An Analysis of Issues and Options February 22, 2005

By Fischer, Eric A.

Click here to view

Book Id: WPLBN0000144148
Format Type: PDF eBook
File Size: 0.3 MB
Reproduction Date: 2008

Title: Crs Report for Congress Received through the Crs Web Creating a National Framework for Cybersecurity : An Analysis of Issues and Options February 22, 2005  
Author: Fischer, Eric A.
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Fischer, E. A. (n.d.). Crs Report for Congress Received through the Crs Web Creating a National Framework for Cybersecurity : An Analysis of Issues and Options February 22, 2005. Retrieved from http://hawaiilibrary.net/


Excerpt
Summary: Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organizations, the defense against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cyber security framework -- a coordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cyber security for the nation.

Table of Contents
Contents What Is Cybersecurity? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Where Are the Major Weaknesses in Cybersecurity? . . . . . . . . . . . . . . . . . . . . . . 6 What Components of Cyberspace Are at Risk? . . . . . . . . . . . . . . . . . . . . . . . 8 Cyberspace and Critical Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Software Design Weaknesses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Problems with Organizational Governance . . . . . . . . . . . . . . . . . . . . . . . . 16 Key Aspects of Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Extent of Problems and Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Public Knowledge and Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 What Are the Major Means of Leverage? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Current Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Strengths and Weaknesses of Standards . . . . . . . . . . . . . . . . . . . . . . . 34 Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Strengths and Weaknesses of Certification . . . . . . . . . . . . . . . . . . . . . 37 Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Benchmarks and Checklists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Training and Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Economic Incentives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 What Roles Should Government and the Private Sector Play? . . . . . . . . . . . . . . 47 Current Efforts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Laws and Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Partnerships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Options for Congress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

 

Click To View

Additional Books


  • Ska-Denge (Beaver for Revenge) (by )
  • Ragged Dick (by )
  • Raggedy Ann in Cookie Land (by )
  • New Priorities for the 21St Century Noaa... (by )
  • Sketches, Criticisms, etc (by )
  • Rebecca of Sunnybrook Farm (by )
  • Rebecca of Sunnybrook Farm (by )
  • Memoires de la Societe D'Agriculture, Sc... (by )
  • Proverbs for the Nursery 
  • Queen Zixi of IX : Or the Story of the M... (by )
  • Sir Nigel (by )
  • Rinkitink in Oz (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.