The Government and Cybersecurity: Difference between revisions
Jump to navigation
Jump to search
(New page: ==Full Title of Reference== The Government and Cybersecurity ==Full Citation== Steven M. Bellovin, ''The Government and Cybersecurity'' (2009), IEEE Security & Privacy, Vol. 7, No. 2. ...) |
No edit summary |
||
Line 5: | Line 5: | ||
==Full Citation== | ==Full Citation== | ||
Steven M. Bellovin, ''The Government and Cybersecurity'' (2009), IEEE Security & Privacy, Vol. 7, No. 2. | Steven M. Bellovin, ''The Government and Cybersecurity'' (2009), IEEE Security & Privacy, Vol. 7, No. 2. [http://www.cs.columbia.edu/~smb/papers/cleartext-2009-03.pdf ''Web''] | ||
[http://www.cs.columbia.edu/~smb/papers/cleartext-2009-03.pdf ''Web''] | |||
[http://www.cs.columbia.edu/~smb/papers/ieee-sp_bib.html#bellovin:government''BibTeX''] | [http://www.cs.columbia.edu/~smb/papers/ieee-sp_bib.html#bellovin:government''BibTeX''] | ||
Line 13: | Line 11: | ||
==Categorization== | ==Categorization== | ||
Issues: [[Actors and Incentives]] | Issues: [[Actors and Incentives]] | ||
Issues: [[Private-Public Cooperation]] | |||
==Key Words== | ==Key Words== | ||
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Casus_Belli Casus Belli] | [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Casus_Belli Casus Belli], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Sponsored_Attacks Sponsored Attacks] | ||
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Sponsored_Attacks Sponsored Attacks] | |||
==Synopsis== | ==Synopsis== |
Revision as of 14:41, 14 June 2010
Full Title of Reference
The Government and Cybersecurity
Full Citation
Steven M. Bellovin, The Government and Cybersecurity (2009), IEEE Security & Privacy, Vol. 7, No. 2. Web
Categorization
Issues: Actors and Incentives Issues: Private-Public Cooperation
Key Words
Casus Belli, Sponsored Attacks
Synopsis
We all realize that computer security is a serious problem. But who should solve it? More precisely, who should be responsible for coping with computer insecurity—governments or the private sector? To some extent, the answer depends on how we view the problem.
Additional Notes and Highlights
* Outline key points of interest