|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910795920603321 |
|
|
Titolo |
At the nexus of cybersecurity and public policy : some basic concepts and issues / / David Clark, Thomas Berson, and Herbert S. Lin, editors ; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, National Research Council of the Academies |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, District of Columbia : , : The National Academies Press, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-309-30321-4 |
0-309-30319-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (149 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security - United States |
Computer networks - Security measures - Government policy |
Computer crimes - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
""Front Matter""; ""Preface""; ""Acknowledgment of Reviewers""; ""Contents""; ""Summary""; ""1 Why Care About Cybersecurity?""; ""2 Some Basics of Computing and Communications Technology and Their Significance for Cybersecurity""; ""3 On the Nature of Cybersecurity""; ""4 Enhancing Cybersecurity""; ""5 Tensions Between Cybersecurity and Other Public Policy Concerns""; ""6 Findings and Conclusion""; ""Appendixes""; ""Appendix A: Committee Members and Staff""; ""Appendix B: Bibliography"" |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
"According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue |
|
|
|
|