Advertisement

Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense

  • Eugene H. Spafford
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5661)

Abstract

The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.

Keywords

cyber security security education security policy vulnerabilities patching 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Cyber Security: A Crisis of Prioritization. Report from the President’s Information Technology Advisory Committee. National Coordination Office, NITRD (2005) Google Scholar
  2. 2.
    Goodman, S.E., Lin, H.S. (eds.): Toward a Safer and More Secure Cyberspace. National Academy Press, Washington (2007)Google Scholar
  3. 3.
    Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington (1991) Google Scholar
  4. 4.
    Schneider, F.B.: Trust in Cyberspace. National Academy Press, Washington (1999)Google Scholar
  5. 5.
    Cyber Security Today and Tomorrow. National Academy Press, Washington (2002)Google Scholar
  6. 6.
    Unsecured Economies: Protecting Vital Information. McAfee Corporation (2008)Google Scholar
  7. 7.
    Spafford, E.H., Antón, A.I.: The Balance Between Security and Privacy. In: Kleinman, D.L., Cloud-Hansen, K.A., Matta, C., Handelsman, J. (eds.) Controversies in Science and Technology ch. 8, vol. II, pp. 152–168. Mary Ann Liebert, Inc., New York (2008)Google Scholar
  8. 8.
    Karas, T.H., Moore, J.H., Parrott, L.K.: Metaphors for Cyber Security. Sandia Report SAND2008-5381. Sandia Labs, NM (2008)Google Scholar
  9. 9.
    Security Cyberspace for the 44th Presidency. Center for Strategic & International Studies, Washington, DC (2008) Google Scholar
  10. 10.
    Spafford, E.H.: One View of a Critical National Need: Support for Information Security Education and Research. In: Briefing Before the Committee on Science Subcommittee on Technology, U.S. House of Representatives, February 11 (1997), http://spaf.cerias.purdue.edu/usgov/index.html
  11. 11.
    Spafford, E.H.: Cyber Security — How Can We Protect American Computer Networks From Attack? In: Briefing Before the Committee on Science, U.S. House of Representatives, October 10 (2001), http://spaf.cerias.purdue.edu/usgov/index.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Eugene H. Spafford
    • 1
  1. 1.CERIASPurdue UniversityWest Lafayette

Personalised recommendations