Cargando…

At the nexus of cybersecurity and public policy : some basic concepts and issues /

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Mod...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Clark, David D. (David Dana), 1944- (Editor ), Berson, T. A. (Thomas A.), 1946- (Editor ), Lin, Herbert (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, D.C. : The National Academies Press, [2014]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn884590411
003 OCoLC
005 20240329122006.0
006 m o d
007 cr un|||||||||
008 140806s2014 dcua obt 000 0 eng
010 |a  2014940211 
040 |a NLM  |b eng  |e rda  |e pn  |c NLM  |d E7B  |d CUS  |d N$T  |d OCLCF  |d COO  |d YDXCP  |d EBLCP  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AGLDB  |d PIFBY  |d ZCU  |d MERUC  |d OCLCA  |d NJR  |d OCLCA  |d U3W  |d OCLCA  |d STF  |d AZK  |d UUM  |d V5E  |d OCLCQ  |d VTS  |d EZ9  |d VT2  |d ICG  |d REC  |d OCLCQ  |d WYU  |d LVT  |d TKN  |d DKC  |d OCLCQ  |d NLM  |d OCLCO  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 101644921  |2 DNLM 
019 |a 883575880  |a 961613365 
020 |a 9780309303187 
020 |a 0309303184 
020 |a 9780309303194 
020 |a 0309303192 
020 |a 030930315X 
020 |a 9780309303156 
029 0 |a NLM  |b 101644921 
029 1 |a AU@  |b 000062386804 
029 1 |a CHNEW  |b 000698151 
029 1 |a CHNEW  |b 000892522 
029 1 |a CHVBK  |b 374516790 
029 1 |a DEBBG  |b BV043039632 
029 1 |a DEBBG  |b BV043624528 
029 1 |a DEBSZ  |b 429958005 
029 1 |a DEBSZ  |b 449742393 
035 |a (OCoLC)884590411  |z (OCoLC)883575880  |z (OCoLC)961613365 
042 |a pcc 
043 |a n-us--- 
050 4 |a QA76.9.A25  |b .A884 2014eb 
060 0 0 |a QA 76.9.A25 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.80973  |2 23 
049 |a UAMI 
245 0 0 |a At the nexus of cybersecurity and public policy :  |b some basic concepts and issues /  |c David Clark, Thomas Berson, and Herbert S. Lin, editors ; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, National Research Council of the National Academies. 
264 1 |a Washington, D.C. :  |b The National Academies Press,  |c [2014] 
300 |a 1 online resource (1 PDF file (xv, 133 pages)) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from PDF title page. 
504 |a Includes bibliographical references. 
520 3 |a We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace. 
536 |a Support for this project was provided by the National Science Foundation under Award Number CNS-0940372. Additional support was provided by Microsoft Corporation, Google, Inc., and the President's Committee of the National Academies. 
588 0 |a Version viewed: January 2, 2015. 
505 0 |a ""FrontMatter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""Summary""; ""1 Why Care About Cybersecurity?""; ""2 Some Basics of Computing and Communications Technology and Their Significance for Cybersecurity""; ""3 On the Nature of Cybersecurity""; ""4 Enhancing Cybersecurity""; ""5 Tensions Between Cybersecurity and Other Public Policy Concerns""; ""6 Findings and Conclusion""; ""Appendixes""; ""Appendix A: Committee Members and Staff""; ""Appendix B: Bibliography"" 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security  |z United States. 
650 0 |a Computer networks  |x Security measures  |x Government policy. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer security. 
650 1 2 |a Computer Security 
650 1 2 |a Public Policy 
651 2 |a United States 
650 6 |a Sécurité informatique  |z États-Unis. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Politique gouvernementale. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer networks  |x Security measures  |x Government policy  |2 fast 
650 7 |a Computer security  |2 fast 
651 7 |a United States  |2 fast 
700 1 |a Clark, David D.  |q (David Dana),  |d 1944-  |e editor. 
700 1 |a Berson, T. A.  |q (Thomas A.),  |d 1946-  |e editor. 
700 1 |a Lin, Herbert,  |e editor. 
710 2 |a National Research Council (U.S.).  |b Committee on Developing a Cybersecurity Primer,  |e issuing body. 
710 2 |a National Research Council (U.S.).  |b Computer Science and Telecommunications Board,  |e issuing body. 
776 0 8 |i Print version:  |t At the nexus of cybersecurity and public policy : some basic concepts and issues.  |d Washington, District of Columbia : The National Academies Press, ©2014  |h xv, 133 pages  |z 9780309303156 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3379336  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36564236 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36617921 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3379336 
938 |a ebrary  |b EBRY  |n ebr10889073 
938 |a EBSCOhost  |b EBSC  |n 867723 
938 |a YBP Library Services  |b YANK  |n 11965888 
994 |a 92  |b IZTAP