Continued Efforts are Needed to Protect Information Systems from Evolving Threats: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== Continued Efforts Are Needed to Protect Information Systems from Evolving Threats ==Full Citation== Gregort C. Wilshusen and David A. Powner, ''Continued Eff...)
 
No edit summary
 
(One intermediate revision by one other user not shown)
Line 6: Line 6:


Gregort C. Wilshusen and David A. Powner, ''Continued Efforts Are Needed to Protect Information Systems from Evolving Threats'', U.S. Government Accountability Office (GAO) Statement for the Record, To the Subcommittee on Terrorism and  
Gregort C. Wilshusen and David A. Powner, ''Continued Efforts Are Needed to Protect Information Systems from Evolving Threats'', U.S. Government Accountability Office (GAO) Statement for the Record, To the Subcommittee on Terrorism and  
Homeland Security, Committee on the Judiciary, U.S. Senate (Tuesday, November 17, 2009)  
Homeland Security, Committee on the Judiciary, U.S. Senate (Tuesday, November 17, 2009) .
 
[http://www.defense.gov/home/features/2010/0410_cybersec/docs/d10230t.pdf  ''Web'']
[www.defense.gov/home/features/2010/0410_cybersec/docs/d10230t.pdf  ''Web'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Wilshusen:2009&f=wikibiblio.bib ''BibTex'']
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&action=viewsource&startkey=Wilshusen:2009&f=wikibiblio.bib ''BibTex'']
Line 14: Line 13:
==Categorization==
==Categorization==


Issues: [[Government Reports]], [[Security Targets]], [[Government Networks]], [[Regulation/Liability]], [[Government Organization]]
Overview: [[Government Reports]]
 
Issues: [[Government Networks]]; [[Government Organization]]; [[Regulation/Liability]]; [[Security Targets]]


==Key Words==  
==Key Words==  


[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Department_of_Homeland_Security Department of Homeland Security]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Department_of_Homeland_Security Department of Homeland Security],
 
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#National_Cybersecurity_Strategy_.28U.S..29 National Cybersecurity Strategy],
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#National_Cybersecurity_Strategy_.28U.S..29 National Cybersecurity Strategy]
 
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Computer_Network_Attack Computer Network Attack]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Computer_Network_Attack Computer Network Attack]



Latest revision as of 11:10, 17 June 2010

Full Title of Reference

Continued Efforts Are Needed to Protect Information Systems from Evolving Threats

Full Citation

Gregort C. Wilshusen and David A. Powner, Continued Efforts Are Needed to Protect Information Systems from Evolving Threats, U.S. Government Accountability Office (GAO) Statement for the Record, To the Subcommittee on Terrorism and Homeland Security, Committee on the Judiciary, U.S. Senate (Tuesday, November 17, 2009) . Web

BibTex

Categorization

Overview: Government Reports

Issues: Government Networks; Government Organization; Regulation/Liability; Security Targets

Key Words

Department of Homeland Security, National Cybersecurity Strategy, Computer Network Attack

Synopsis

This chapter asks the following questions: Are participants in the information and communication markets responding adequately to malware, or are improvements possible? Pointing to a variety of reports that show increases in malicious attack trends, one might conclude that markets are not responding adequately. The analysis revealed a more nuanced picture.

Additional Notes and Highlights