Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace ==Full Citation= ''Cybersecurity: Preventing Terrorist Attacks and Protecti...)
 
No edit summary
Line 4: Line 4:




==Full Citation=
==Full Citation==


''Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace'': Testimony Before the Senate Committee on the Judiciary,
''Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace'': Testimony Before the Senate Committee on the Judiciary,
Line 20: Line 20:
==Key Words==  
==Key Words==  


communications privacy law
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Communications_Privacy_Law communications privacy law]


==Synopsis==
==Synopsis==

Revision as of 11:25, 10 June 2010

Full Title of Reference

Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace


Full Citation

Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace: Testimony Before the Senate Committee on the Judiciary, Subcommittee on Terrorism and Homeland Security, 111th Congress (2009) (statement of Gregory T. Nojeim, Senior Counsel and Director, Project on Freedom, Security & Technology, Center for Democracy & Technology). Web

BibTeX


Categorization

Key Words

communications privacy law

Synopsis

In his testimony, Gregory T. Nojeim outlines the cybersecurity threat and explain why measures appropriate for securing some critical infrastructure systems would be inappropriate for others. He emphasizes that private network operators, not the government, should monitor and secure private sector systems, while the government should monitor and secure its networks. He then discusses some incremental changes in the law that may enhance information sharing without eroding privacy. Finally, He discusses the role that identity and authentication measures, if properly designed and deployed, can play in enhancing security while also protecting privacy.


Additional Notes and Highlights