Federal Plan for Cyber Security and Information Assurance Research and Development: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 6: Line 6:
National Science, Technology Council: Federal Plan for Cyber Security and Information Assurance Research and Development. U.S. Government. Online Paper.  [http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf  ''Web'']
National Science, Technology Council: Federal Plan for Cyber Security and Information Assurance Research and Development. U.S. Government. Online Paper.  [http://www.cyber.st.dhs.gov/docs/Federal%20R&D%20Plan%202006.pdf  ''Web'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=NSTC:2006&f=wikibiblio.bib BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=NSTC:2006 ''BibTeX'']
[http://books.google.com/books?id=t2MKPwAACAAJ&dq=Federal+Plan+for+Cyber+Security+and+Information+Assurance+Research+and+Development&ei=eThTTL2TIoW4yATg2-CmDg&cd=1  ''Google Books'']


==Categorization==
==Categorization==

Revision as of 16:40, 30 July 2010

Full Title of Reference

Federal Plan for Cyber Security and Information Assurance Research and Development

Full Citation

National Science, Technology Council: Federal Plan for Cyber Security and Information Assurance Research and Development. U.S. Government. Online Paper. Web

BibTeX Google Books

Categorization

Key Words

Research & Development

Synopsis

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation's critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets."Toward a Safer and More Secure Cyberspace" examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.

Additional Notes and Highlights