Add to Book Shelf
Flag as Inappropriate
Email this Book

Crs Report for Congress Received through the Crs Web Creating a National Framework for Cybersecurity : An Analysis of Issues and Options February 22, 2005

By Fischer, Eric A.

Click here to view

Book Id: WPLBN0000144148
Format Type: PDF eBook:
File Size: 0.3 MB
Reproduction Date: 2008

Title: Crs Report for Congress Received through the Crs Web Creating a National Framework for Cybersecurity : An Analysis of Issues and Options February 22, 2005  
Author: Fischer, Eric A.
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

A. Fische, B. E. (n.d.). Crs Report for Congress Received through the Crs Web Creating a National Framework for Cybersecurity : An Analysis of Issues and Options February 22, 2005. Retrieved from http://gutenberg.cc/


Excerpt
Summary: Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organizations, the defense against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cyber security framework -- a coordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cyber security for the nation.

Table of Contents
Contents What Is Cybersecurity? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Where Are the Major Weaknesses in Cybersecurity? . . . . . . . . . . . . . . . . . . . . . . 6 What Components of Cyberspace Are at Risk? . . . . . . . . . . . . . . . . . . . . . . . 8 Cyberspace and Critical Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Software Design Weaknesses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Problems with Organizational Governance . . . . . . . . . . . . . . . . . . . . . . . . 16 Key Aspects of Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Extent of Problems and Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Public Knowledge and Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 What Are the Major Means of Leverage? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Current Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Strengths and Weaknesses of Standards . . . . . . . . . . . . . . . . . . . . . . . 34 Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Strengths and Weaknesses of Certification . . . . . . . . . . . . . . . . . . . . . 37 Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Benchmarks and Checklists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Training and Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Enterprise Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Economic Incentives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 What Roles Should Government and the Private Sector Play? . . . . . . . . . . . . . . 47 Current Efforts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Laws and Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Partnerships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Options for Congress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.