Skip to main content

Currently Skimming:

CYBERTERRORISM A Perspective on Cybersecurity Research in the United States
Pages 75-84

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 77...
... Jones University of Virginia This paper is a perspective on -- an opinion about -- the state of cybersecurity research in the United States. It is not a thorough enumeration of the ongoing research, but rather a critique of the overall state of that research.
From page 78...
... Information technology has become crucial to every aspect of modern life, and a serious attack could cripple any system, from an emergency military deployment to health care delivery to the generation of electrical power. Publicly reported attacks have been relatively unsophisticated and, although annoying, have not had dire consequences.
From page 79...
... For historical reasons, no U.S. federal funding agency has assumed responsibility for supporting basic research in this area-not the Defense Advanced Research Projects Agency, not the National Science Foundation, not the U.S.
From page 80...
... This model states that the object to protect is "inside" the system, the attacker is outside the system, and the system must therefore keep the attacker from breeching the system's perimeter. It is interesting that this model is so deeply entrenched in our thinking about cybersecurity that our terminology reflects it: We have firewalls to keep outside attackers from penetrating our defenses; we build intrusion detection software to determine whether an outsider has foiled our perimeter defense; we build a DMZ (demilitarized zone)
From page 81...
... This relatively unsophisticated form of attack can be used against phone systems, for example, 911, financial systems, and, of course, Internet hosts. Because more than 90 percent of military communications, and almost 100 percent of law enforcement and other first responder communications are sent via the public switched telephone network, attackers could seriously disrupt a military activity or response to a terrorist incident by simply tying up the phone lines at appropriate bases or municipal crisis control centers.
From page 82...
... The Need for Coordinated Activities by Legal and Other Societal Mechanisms Any plan of action must also involve a dialogue on legal issues, the fourth critical need for cybersecurity. In the United States, the coupling between the legal system and cybersecurity (and cybercrime)
From page 83...
... House of Representatives Committee on Science have held hearings on the state of research on cybersecurity and have introduced three acts that would provide initial funding for basic research through the National Science Foundation and the National Institute of Standards and Technology.2 Although these initiatives are heartening, their full impact will not be felt for a decade or more. Historically, policy makers have not continued to support research with such long horizons.
From page 84...
... 3394 Cyber security research and development act, and H.R. 3400 Networking and information technology research advancement act.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.