Securing Cyberspace for the 44th Presidency: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Securing Cyberspace for the 44th Presidency== ==Full Citation== Center for Strategic, International Studies (2008): Securing Cyberspace for the 44th Presidency. U.S. Government. Online...)
 
No edit summary
Line 3: Line 3:
==Full Citation==
==Full Citation==


Center for Strategic, International Studies (2008): Securing Cyberspace for the 44th Presidency. U.S. Government. Online Paper.  [http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf  ''Web'']
Ctr. for Strategic and Int'l Studies ''Securing Cyberspace for the 44th Presidency'' (2008).  [http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf  ''Web'']


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CSIS:2008&f=wikibiblio.bib BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=CSIS:2008&f=wikibiblio.bib BibTeX]

Revision as of 14:18, 4 June 2010

Securing Cyberspace for the 44th Presidency

Full Citation

Ctr. for Strategic and Int'l Studies Securing Cyberspace for the 44th Presidency (2008). Web

BibTeX


Categorization

Overview: Government Reports

Key Words

Synopsis

The Center for Strategic and International Studies began this project in August 2007, after the United States suffered a wave of damaging attacks in cyberspace. Guided by our congressional cochairs, we assembled a group of individuals with experience in both government and cybersecurity. The aim of the group was to identify recommendations that are critical to the nation's future cyber objectives. The Commission's three major findings are: (1) cybersecurity is now a major national security problem for the United States, (2) decisions and actions must respect privacy and civil liberties, (3) only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will make us more secure.

Additional Notes and Highlights