Cyberpower and National Security by Wentz Larry K. Starr Stuart H. Kramer Franklin D
Author:Wentz, Larry K.,Starr, Stuart H.,Kramer, Franklin D.
Language: eng
Format: epub
Publisher: University of Nebraska Press
Published: 2012-11-14T16:00:00+00:00
Stronger Cyber Defenses
Cyber defenses capable of protecting U.S. information networks are needed both to reduce potential vulnerabilities to cyber attack and to help deter potential attackers. If adversaries conclude that cyber attacks cannot attain their goals of damaging U.S. information networks, they will be less inclined to incur the costs and risks of launching them. Many observers judge that the United States is too vulnerable to cyber attacks. This weakens U.S. hopes for effective deterrence. Improvements in U.S. cyber defenses are thus needed for both defense and deterrence.
The National Strategy to Secure Cyberspace of 2003 sought to foster a partnership between government and the private sector. It outlined five major priorities for strengthening U.S. cyber defenses, along with specific recommendations in each area, many of which remain current. First, it called for a national cyberspace security and response program, establishing the Department of Homeland Security as the main point of contact for cyberspace security efforts with industry. It recommended improvements to cyberspace analysis, warning, information-sharing, major incident management, and national-level recovery efforts.
As a second priority, it called for a program for reducing the national cyberspace security threat and vulnerability. Major recommendations included improved criminal prosecution of cyber attackers, the adoption of improved security protocols and more secure router technology for the Internet, and improved computer software security.
The third priority identified was a national cyberspace security awareness and training program. It recommended improved Federal, state, and local efforts to promote awareness of cyber security, education programs in elementary and secondary schools, and efforts to improve awareness by small businesses and home computer users regarding antivirus software and firewalls.
A fourth priority was to secure government cyberspace with Federal efforts to strengthen the security of computers, software, and information networks, coupled with parallel efforts by state and local governments.
The strategy called, fifth, for national security and international cyberspace security cooperation. Recommendations included improving counterâcyber intelligence and attribution capabilities as well as closer cooperation with foreign governments and multinational organizations in pursuing cyber security.
Preferential defense of the most crucial information networks is a high priority for enhancing cyber deterrence. Safeguarding the information networks of the U.S. military, along with U.S. Government information networks, is clearly critical. Priority efforts to safeguard networks that operate key areas of the domestic infrastructure make sense, too. An example is the electrical power grid, loss of which could have a cascading effect in damaging other key parts of the U.S. economy.17
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7728)
Robo-Advisor with Python by Aki Ranin(7625)
Offensive Shellcode from Scratch by Rishalin Pillay(6105)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5023)
Ego Is the Enemy by Ryan Holiday(4958)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4183)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3889)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3626)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3285)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3223)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3172)
Agile Security Operations by Hinne Hettema(3124)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3109)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3083)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2983)
