In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications system and networks is a problem that looms large. In order to best prevent such attacks, this collection explains the importance of increasing the usability of security technologies, recommends strategies for future research aimed at countering cyberattacks, and considers how information technology systems can be used to not only maximize protection against attacks, but also respond to threats.
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is ...[more]
Critical Code: Software Producibility for Defense (2010)
Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior books--Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations ...[more]
Biometric Recognition:Challenges and Opportunities (2010)
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services ...[more]
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure ...[more]
Toward a Safer and More Secure Cyberspace (2007)
Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit ...[more]
Toward Better Usability, Security, and Privacy of Information Technology:Report of a Workshop (2010)
Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or ...[more]
Information Technology for Counterterrorism:Immediate Actions and Future Possibilities (2003)
Information technology (IT) is essential to virtually all of the nation s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch ...[more]
Making the Nation Safer:The Role of Science and Technology in Countering Terrorism (2002)
Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures transportation, information and telecommunications systems, health systems, the electric power grid, emergency response units, food and water supplies, and others make them susceptible ...[more]
Cybersecurity of Freight Information Systems:A Scoping Study -- Special Report 274 (2003)
TRB Special Report 274 - Cybersecurity of Freight Information Systems: A Scoping Study reviews trends in the use of information technology in the freight transportation industry and assesses potential vulnerabilities to a cyberattack. Special Report 274 Summary ...[more]