Hardening The Internet: Difference between revisions
No edit summary |
No edit summary |
||
Line 18: | Line 18: | ||
==Synopsis== | ==Synopsis== | ||
The Council’s report focuses its recommendations in the following three areas: | |||
1) Near-term Approaches: Encouraging the adoption of Best Current Practices (BCPs)2 as the most effective approach to harden existing defenses against attack. The Council centers these recommendations on education and awareness initiatives and research into the adoption of BCPs; | |||
2) Long-term Approaches: With sufficient time for research and development, additional work on core Internet protocols can be used to harden the Internet and associated networks and devices against malicious attacks. The Council centers these recommendations on more robust research and development; | |||
3) Empowerment: In the near and long term, Internet Service Providers (ISPs)3 and law enforcement agencies need on-going capabilities to investigate suspicious activity, prosecute cyber criminals, and harden their core operations. The Council centers these recommendations for empowering ISPs and law enforcement agencies on research and policy issues. | |||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== |
Revision as of 10:00, 18 June 2010
Full Title of Reference
Hardening The Internet : Final Report and Recommendations by the Council
Full Citation
Nat'l Infrastructure Advisory Council Hardening The Internet (2004). Web
Categorization
Overview: Government Reports
Key Words
Synopsis
The Council’s report focuses its recommendations in the following three areas:
1) Near-term Approaches: Encouraging the adoption of Best Current Practices (BCPs)2 as the most effective approach to harden existing defenses against attack. The Council centers these recommendations on education and awareness initiatives and research into the adoption of BCPs;
2) Long-term Approaches: With sufficient time for research and development, additional work on core Internet protocols can be used to harden the Internet and associated networks and devices against malicious attacks. The Council centers these recommendations on more robust research and development;
3) Empowerment: In the near and long term, Internet Service Providers (ISPs)3 and law enforcement agencies need on-going capabilities to investigate suspicious activity, prosecute cyber criminals, and harden their core operations. The Council centers these recommendations for empowering ISPs and law enforcement agencies on research and policy issues.