Cargando…

Toward a safer and more secure cyberspace /

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States
Otros Autores: Goodman, Seymour E., Lin, Herbert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, DC : National Academies Press, ©2007.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn567901186
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 070913s2007 dcu ob 000 0 eng d
010 |z  2007037982 
040 |a CCO  |b eng  |e pn  |c CCO  |d E7B  |d OCLCQ  |d CUSER  |d DKDLA  |d CU3  |d OCLCQ  |d XFF  |d OCLCQ  |d N$T  |d YDXCP  |d IDEBK  |d NTE  |d FVL  |d OCLCF  |d EJB  |d OCLCQ  |d EBLCP  |d DEBSZ  |d OCLCQ  |d AZK  |d CNNLC  |d LOA  |d MERUC  |d AGLDB  |d CNNOR  |d MOR  |d PIFBR  |d ZCU  |d OCLCQ  |d OCLCA  |d U3W  |d OCLCA  |d BUF  |d RCC  |d BRL  |d STF  |d WRM  |d VTS  |d NRAMU  |d ICG  |d OCLCQ  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d LVT  |d TKN  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d VLY  |d INARC  |d DST  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 173976505  |a 183415412  |a 290499854  |a 327040185  |a 475500171  |a 475656133  |a 647682648  |a 722614237  |a 728032519  |a 745908350  |a 815541082  |a 923278340  |a 961528290  |a 962595792  |a 1037436838  |a 1037448963  |a 1162189541  |a 1290106971  |a 1300534370  |a 1303468893 
020 |a 9780309667418  |q (electronic bk.) 
020 |a 0309667410  |q (electronic bk.) 
020 |a 1281109916 
020 |a 9781281109910 
020 |z 0309103959  |q (pbk.) 
020 |z 9780309103954  |q (pbk.) 
020 |a 9786611109912 
020 |a 6611109919 
020 |a 0309185610 
020 |a 9780309185615 
029 1 |a AU@  |b 000051346197 
029 1 |a DEBBG  |b BV043151082 
029 1 |a DEBBG  |b BV044108756 
029 1 |a DEBSZ  |b 42215976X 
029 1 |a DEBSZ  |b 452575079 
029 1 |a GBVCP  |b 803094493 
029 1 |a NZ1  |b 14238517 
029 1 |a AU@  |b 000054171843 
035 |a (OCoLC)567901186  |z (OCoLC)173976505  |z (OCoLC)183415412  |z (OCoLC)290499854  |z (OCoLC)327040185  |z (OCoLC)475500171  |z (OCoLC)475656133  |z (OCoLC)647682648  |z (OCoLC)722614237  |z (OCoLC)728032519  |z (OCoLC)745908350  |z (OCoLC)815541082  |z (OCoLC)923278340  |z (OCoLC)961528290  |z (OCoLC)962595792  |z (OCoLC)1037436838  |z (OCoLC)1037448963  |z (OCoLC)1162189541  |z (OCoLC)1290106971  |z (OCoLC)1300534370  |z (OCoLC)1303468893 
050 4 |a QA76.9.A25  |b T695 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a K  |2 bicssc 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Toward a safer and more secure cyberspace /  |c Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors. 
260 |a Washington, DC :  |b National Academies Press,  |c ©2007. 
300 |a 1 online resource (xx, 307 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
520 |a Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety. 
505 0 |a Cover -- Preface -- Acknowledgment of Reviewers -- Contents -- Boxes -- Executive Summary -- Part I58; Setting the Stage -- 1 Introduction -- 146;1 The Report in Brief -- 146;2 Background of the Study -- 2 What Is at Stake63; -- 246;1 Interconnected Information Technology Everywhere44; All the Time -- 246;2 The Nature of Cybersecurity Vulnerabilities -- 246;3 Systems and Networks at Risk -- 246;4 Potential Consequences of Exploits -- 246;5 The Magnitude of the Threat Against Todays Technologies -- 246;6 An Ominous Future -- 3 Improving the Nations Cybersecurity Posture -- 346;1 The Cybersecurity Bill of Rights -- 346;2 Realizing the Vision -- 346;3 The Necessity of Research -- 346;4 Principles to Shape the Research Agenda -- Part II58; An Illustrative Research Agenda -- 4 Category 18212;Blocking and Limiting the Impact of Compromise -- 446;1 Secure Design44; Development44; and Testing -- 446;2 Graceful Degradation and Recovery -- 446;3 Software and Systems Assurance -- 5 Category 28212;Enabling Accountability -- 546;1 Attribution -- 546;2 Misuse and Anomaly Detection Systems -- 546;3 Digital Rights Management -- 6 Category 38212;Promoting Deployment -- 646;1 Usable Security -- 646;2 Exploitation of Previous Work -- 646;3 Cybersecurity Metrics -- 646;4 The Economics of Cybersecurity -- 646;5 Security Policies -- 7 Category 48212;Deterring Would45;Be Attackers and Penalizing Attackers -- 746;1 Legal Issues Related to Cybersecurity -- 746;2 Honeypots -- 746;3 Forensics -- 8 Category 58212;Illustrative Crosscutting Problem45;Focused Research Areas -- 846;1 Security for Legacy Systems -- 846;2 The Role of Secrecy in Cyberdefense -- 846;3 Insider Threats -- 846;4 Security in Nontraditional Computing Environments and in the Context of Use -- 846;5 Secure Network Architectures -- 846;6 Attack Characterization -- 846;7 Coping with Denial45;of45;Service Attacks -- 846;8 Dealing with Spam -- 9 Category 68212;Speculative Research -- 946;1 A Cyberattack Research Activity -- 946;2 Biological Approaches to Security -- 946;3 Using Attack Techniques for Defensive Purposes -- 946;4 Cyber45;Retaliation -- Part III58; Conclusion -- 10 Looking to the Future -- 1046;1 Why Has Little Action Occurred63; -- 1046;2 Priorities for Action -- 1046;3 Concluding Comments -- Appendixes -- Appendix A58; Committee and Staff Biographies -- Appendix B58; Cybersecurity Reports and Policy58; The Recent Past -- B46;1 Introduction -- B46;2 Cybersecurity Policy Activity Since 2001 -- B46;3 Identifying Exposures44; Best Practices44; and Procedures -- B46;4 Public45;Private Collaboration44; Coordination44; and Cooperation -- B46;5 Notable Recent Efforts at Identifying a Research Agenda -- B46;6 The Current Federal Research and Development Landscape -- Appendix C58; Contributors to the Study -- Last Page. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Cyberterrorism  |x Prevention. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
655 4 |a Computer network resources. 
700 1 |a Goodman, Seymour E. 
700 1 |a Lin, Herbert. 
710 2 |a National Research Council (U.S.).  |b Committee on Improving Cybersecurity Research in the United States. 
758 |i has work:  |a Toward a safer and more secure cyberspace (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFx9Cq4dwpjxTw9CfQvCQq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Toward a safer and more secure cyberspace.  |d Washington, DC : National Academies Press, ©2007  |w (DLC) 2007037982 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3378311  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36617257 
938 |a Internet Archive  |b INAR  |n towardsafermores0000unse 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36567830 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3378311 
938 |a ebrary  |b EBRY  |n ebr10201108 
938 |a EBSCOhost  |b EBSC  |n 213814 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 110991 
938 |a YBP Library Services  |b YANK  |n 2745142 
994 |a 92  |b IZTAP