Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
Line 22: Line 22:
==Synopsis==
==Synopsis==


In his testimony, Gregory T. Nojeim outlines the cybersecurity threat and explain why measures appropriate  for  securing  some  critical  infrastructure  systems  would  be inappropriate  for  others. He  emphasizes  that  private  network  operators,  not the  government,  should  monitor  and  secure  private  sector  systems,  while  the government  should  monitor  and  secure  its  networks. He then discusses some incremental  changes  in  the  law  that  may  enhance  information  sharing  without eroding privacy.  Finally, He discusses the role that identity and authentication measures,  if  properly  designed  and  deployed,  can  play  in  enhancing  security while also protecting privacy.  
In his testimony, Gregory T. Nojeim outlines the cybersecurity threat and explain why measures appropriate  for  securing  some  critical  infrastructure  systems  would  be inappropriate  for  others. He  emphasizes  that  private  network  operators,  not the  government,  should  monitor  and  secure  private  sector  systems,  while  the government  should  monitor  and  secure  its  networks. He then discusses some incremental  changes  in  the  law  that  may  enhance  information  sharing  without eroding privacy.  Finally, He discusses the role that identity and authentication measures,  if  properly  designed  and  deployed,  can  play  in  enhancing  security while also protecting privacy.
 


==Additional Notes and Highlights==
==Additional Notes and Highlights==

Latest revision as of 11:28, 10 June 2010

Full Title of Reference

Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace

Full Citation

Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace: Testimony Before the Senate Committee on the Judiciary, Subcommittee on Terrorism and Homeland Security, 111th Congress (2009) (statement of Gregory T. Nojeim, Senior Counsel and Director, Project on Freedom, Security & Technology, Center for Democracy & Technology). Web

BibTeX

Categorization

Key Words

communications privacy law

Synopsis

In his testimony, Gregory T. Nojeim outlines the cybersecurity threat and explain why measures appropriate for securing some critical infrastructure systems would be inappropriate for others. He emphasizes that private network operators, not the government, should monitor and secure private sector systems, while the government should monitor and secure its networks. He then discusses some incremental changes in the law that may enhance information sharing without eroding privacy. Finally, He discusses the role that identity and authentication measures, if properly designed and deployed, can play in enhancing security while also protecting privacy.

Additional Notes and Highlights