%0 Book %A National Academies of Sciences, Engineering, and Medicine %T Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration %@ 978-0-309-39150-4 %D 2021 %U https://nap.nationalacademies.org/catalog/26105/looking-ahead-at-the-cybersecurity-workforce-at-the-federal-aviation-administration %> https://nap.nationalacademies.org/catalog/26105/looking-ahead-at-the-cybersecurity-workforce-at-the-federal-aviation-administration %I The National Academies Press %C Washington, DC %G English %K Industry and Labor %K Computers and Information Technology %P 112 %X The Federal Aviation Administration (FAA) has overseen significant upgrades to the technology used to manage aviation operations to increase the safety and efficiency of the National Airspace System (NAS). Though necessary to regular operations, these modern computing and communications systems provide a greater attack surface for criminals, terrorists, or nation-states to exploit and thereby increase the potential for cybersecurity threats to the NAS and its constituents. The future safety and security of air travel will rely in part on the ability of the FAA to build a workforce capable of addressing the evolving cybersecurity threat landscape. Securing the computers, networks, and data that underpin modern aviation depends in part on the FAA having enough cybersecurity professionals (capacity) with the right knowledge, skills, and abilities (capability)). It also depends on the FAA's workforce having sufficient diversity of backgrounds and experience. Such diversity is critical in analyzing cybersecurity problems and widely understood to be a "functional imperative" for effective cybersecurity programs. At the request of Congress, the publication examines the FAA's cybersecurity workforce challenges, reviews the current strategy for meeting those challenges, and recommends ways to strengthen the FAA's cybersecurity workforce. %0 Book %A National Research Council %E Celeste, Richard %E Thornburgh, Dick %E Lin, Herbert %T Asking the Right Questions About Electronic Voting %@ 978-0-309-10024-3 %D 2006 %U https://nap.nationalacademies.org/catalog/11449/asking-the-right-questions-about-electronic-voting %> https://nap.nationalacademies.org/catalog/11449/asking-the-right-questions-about-electronic-voting %I The National Academies Press %C Washington, DC %G English %K Industry and Labor %K Behavioral and Social Sciences %P 162 %X Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections. At the same time, many information technologists and activists have raised important concerns regarding the security of such systems. Policy makers are caught in the midst of a controversy with both political and technological overtones. The public debate about electronic voting is characterized by a great deal of emotion and rhetoric. Asking the Right Questions About Electronic Voting describes the important questions and issues that election officials, policy makers, and informed citizens should ask about the use of computers and information technology in the electoral process—focusing the debate on technical and policy issues that need resolving. The report finds that while electronic voting systems have improved, federal and state governments have not made the commitment necessary for e-voting to be widely used in future elections. More funding, research, and public education are required if e-voting is to become viable. %0 Book %A National Research Council %E Owens, William A. %E Dam, Kenneth W. %E Lin, Herbert S. %T Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities %@ 978-0-309-13850-5 %D 2009 %U https://nap.nationalacademies.org/catalog/12651/technology-policy-law-and-ethics-regarding-us-acquisition-and-use-of-cyberattack-capabilities %> https://nap.nationalacademies.org/catalog/12651/technology-policy-law-and-ethics-regarding-us-acquisition-and-use-of-cyberattack-capabilities %I The National Academies Press %C Washington, DC %G English %K Conflict and Security Issues %K Computers and Information Technology %P 390 %X The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks--actions intended to damage adversary computer systems or networks--can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic. %0 Book %A National Research Council %E Clark, David %E Berson, Thomas %E Lin, Herbert S. %T At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues %@ 978-0-309-30318-7 %D 2014 %U https://nap.nationalacademies.org/catalog/18749/at-the-nexus-of-cybersecurity-and-public-policy-some-basic %> https://nap.nationalacademies.org/catalog/18749/at-the-nexus-of-cybersecurity-and-public-policy-some-basic %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 150 %X We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace. %0 Book %A National Research Council %T Making the Nation Safer: The Role of Science and Technology in Countering Terrorism %@ 978-0-309-08481-9 %D 2002 %U https://nap.nationalacademies.org/catalog/10415/making-the-nation-safer-the-role-of-science-and-technology %> https://nap.nationalacademies.org/catalog/10415/making-the-nation-safer-the-role-of-science-and-technology %I The National Academies Press %C Washington, DC %G English %K Conflict and Security Issues %P 440 %X Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures — transportation, information and telecommunications systems, health systems, the electric power grid, emergency response units, food and water supplies, and others — make them susceptible to terrorist attacks. Making the Nation Safer discusses technical approaches to mitigating these vulnerabilities. A broad range of topics are covered in this book, including: Nuclear and radiological threats, such as improvised nuclear devices and "dirty bombs;" Bioterrorism, medical research, agricultural systems and public health; Toxic chemicals and explosive materials; Information technology, such as communications systems, data management, cyber attacks, and identification and authentication systems; Energy systems, such as the electrical power grid and oil and natural gas systems; Transportation systems; Cities and fixed infrastructures, such as buildings, emergency operations centers, and tunnels; The response of people to terrorism, such as how quality of life and morale of the population can be a target of terrorists and how people respond to terrorist attacks; and Linked infrastructures, i.e. the vulnerabilities that result from the interdependencies of key systems. In each of these areas, there are recommendations on how to immediately apply existing knowledge and technology to make the nation safer and on starting research and development programs that could produce innovations that will strengthen key systems and protect us against future threats. The book also discusses issues affecting the government's ability to carry out the necessary science and engineering programs and the important role of industry, universities, and states, counties, and cities in homeland security efforts. A long term commitment to homeland security is necessary to make the nation safer, and this book lays out a roadmap of how science and engineering can assist in countering terrorism. %0 Book %A National Research Council %E Kent, Stephen T. %E Millett, Lynette I. %T Who Goes There?: Authentication Through the Lens of Privacy %@ 978-0-309-08896-1 %D 2003 %U https://nap.nationalacademies.org/catalog/10656/who-goes-there-authentication-through-the-lens-of-privacy %> https://nap.nationalacademies.org/catalog/10656/who-goes-there-authentication-through-the-lens-of-privacy %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %P 232 %X Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The book explains how privacy is affected by system design decisions. It also describes government’s unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy. %0 Book %A National Research Council %A National Academy of Engineering %E Goodman, Seymour E. %E Lin, Herbert S. %T Toward a Safer and More Secure Cyberspace %@ 978-0-309-10395-4 %D 2007 %U https://nap.nationalacademies.org/catalog/11925/toward-a-safer-and-more-secure-cyberspace %> https://nap.nationalacademies.org/catalog/11925/toward-a-safer-and-more-secure-cyberspace %I The National Academies Press %C Washington, DC %G English %K Computers and Information Technology %K Conflict and Security Issues %P 328 %X Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation’s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets. Toward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. This book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.