Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense

  • Conference paper
Protecting Persons While Protecting the People (ISIPS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5661))

Included in the following conference series:

Abstract

The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.

This essay is derived from testimony presented by the author on March 19, 2009 to the Senate Committee on Commerce,   Science, and Transportation. A copy of that testimony is <http://spaf.cerias.purdue.edu/usgov/commerce.pdf>.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cyber Security: A Crisis of Prioritization. Report from the President’s Information Technology Advisory Committee. National Coordination Office, NITRD (2005)

    Google Scholar 

  2. Goodman, S.E., Lin, H.S. (eds.): Toward a Safer and More Secure Cyberspace. National Academy Press, Washington (2007)

    Google Scholar 

  3. Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington (1991)

    Google Scholar 

  4. Schneider, F.B.: Trust in Cyberspace. National Academy Press, Washington (1999)

    Google Scholar 

  5. Cyber Security Today and Tomorrow. National Academy Press, Washington (2002)

    Google Scholar 

  6. Unsecured Economies: Protecting Vital Information. McAfee Corporation (2008)

    Google Scholar 

  7. Spafford, E.H., Antón, A.I.: The Balance Between Security and Privacy. In: Kleinman, D.L., Cloud-Hansen, K.A., Matta, C., Handelsman, J. (eds.) Controversies in Science and Technology ch. 8, vol. II, pp. 152–168. Mary Ann Liebert, Inc., New York (2008)

    Google Scholar 

  8. Karas, T.H., Moore, J.H., Parrott, L.K.: Metaphors for Cyber Security. Sandia Report SAND2008-5381. Sandia Labs, NM (2008)

    Google Scholar 

  9. Security Cyberspace for the 44th Presidency. Center for Strategic & International Studies, Washington, DC (2008)

    Google Scholar 

  10. Spafford, E.H.: One View of a Critical National Need: Support for Information Security Education and Research. In: Briefing Before the Committee on Science Subcommittee on Technology, U.S. House of Representatives, February 11 (1997), http://spaf.cerias.purdue.edu/usgov/index.html

  11. Spafford, E.H.: Cyber Security — How Can We Protect American Computer Networks From Attack? In: Briefing Before the Committee on Science, U.S. House of Representatives, October 10 (2001), http://spaf.cerias.purdue.edu/usgov/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Spafford, E.H. (2009). Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10233-2_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10232-5

  • Online ISBN: 978-3-642-10233-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics