The Government and Cybersecurity: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== The Government and Cybersecurity ==Full Citation== Steven M. Bellovin, ''The Government and Cybersecurity'' (2009), IEEE Security & Privacy, Vol. 7, No. 2. ...)
 
No edit summary
 
(7 intermediate revisions by the same user not shown)
Line 5: Line 5:
==Full Citation==
==Full Citation==


Steven M. Bellovin, ''The Government and Cybersecurity'' (2009), IEEE Security & Privacy, Vol. 7, No. 2.  
Steven M. Bellovin, ''The Government and Cybersecurity'', 7 IEEE Security & Privacy 96 (2009). [http://www.cs.columbia.edu/~smb/papers/cleartext-2009-03.pdf ''Web''] 


[http://www.cs.columbia.edu/~smb/papers/cleartext-2009-03.pdf ''Web''] 
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Bellovin:2009&f=wikibiblio.bib ''BibTeX'']
 
[http://www.cs.columbia.edu/~smb/papers/ieee-sp_bib.html#bellovin:government''BibTeX'']


==Categorization==
==Categorization==


Issues: [[Actors and Incentives]], [[Private-Public Cooperation]]
Issues: [[Actors and Incentives]]; [[Private-Public Cooperation]]


==Key Words==  
==Key Words==  


[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Casus_Belli Casus Belli]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Casus_Belli ''Casus Belli''], [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Sponsored_Attacks Sponsored Attacks]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Sponsored_Attacks Sponsored Attacks]


==Synopsis==
==Synopsis==

Latest revision as of 09:19, 17 June 2010

Full Title of Reference

The Government and Cybersecurity

Full Citation

Steven M. Bellovin, The Government and Cybersecurity, 7 IEEE Security & Privacy 96 (2009). Web

BibTeX

Categorization

Issues: Actors and Incentives; Private-Public Cooperation

Key Words

Casus Belli, Sponsored Attacks

Synopsis

We all realize that computer security is a serious problem. But who should solve it? More precisely, who should be responsible for coping with computer insecurity—governments or the private sector? To some extent, the answer depends on how we view the problem.

Additional Notes and Highlights

* Outline key points of interest