Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace: Difference between revisions
(New page: ==Full Title of Reference== Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace ==Full Citation= ''Cybersecurity: Preventing Terrorist Attacks and Protecti...) |
No edit summary |
||
Line 4: | Line 4: | ||
==Full Citation= | ==Full Citation== | ||
''Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace'': Testimony Before the Senate Committee on the Judiciary, | ''Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace'': Testimony Before the Senate Committee on the Judiciary, | ||
Line 20: | Line 20: | ||
==Key Words== | ==Key Words== | ||
communications privacy law | [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Communications_Privacy_Law communications privacy law] | ||
==Synopsis== | ==Synopsis== |
Revision as of 11:25, 10 June 2010
Full Title of Reference
Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace
Full Citation
Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace: Testimony Before the Senate Committee on the Judiciary, Subcommittee on Terrorism and Homeland Security, 111th Congress (2009) (statement of Gregory T. Nojeim, Senior Counsel and Director, Project on Freedom, Security & Technology, Center for Democracy & Technology). Web
Categorization
- Threat and Actors: [Private Critical Infrastructure]
- Issues: Privacy, Information Sharing/Disclosure
- Approaches: Regulation/Liability
Key Words
Synopsis
In his testimony, Gregory T. Nojeim outlines the cybersecurity threat and explain why measures appropriate for securing some critical infrastructure systems would be inappropriate for others. He emphasizes that private network operators, not the government, should monitor and secure private sector systems, while the government should monitor and secure its networks. He then discusses some incremental changes in the law that may enhance information sharing without eroding privacy. Finally, He discusses the role that identity and authentication measures, if properly designed and deployed, can play in enhancing security while also protecting privacy.