@BOOK{NAP author = "National Research Council", editor = "David Clark and Thomas Berson and Herbert S. Lin", title = "At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues", isbn = "978-0-309-30318-7", abstract = "We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities?\nAt the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.", url = "https://nap.nationalacademies.org/catalog/18749/at-the-nexus-of-cybersecurity-and-public-policy-some-basic", year = 2014, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop", isbn = "978-0-309-16090-2", abstract = "Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged.\n\nSecurity features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. \n\nThe result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection.", url = "https://nap.nationalacademies.org/catalog/12998/toward-better-usability-security-and-privacy-of-information-technology-report", year = 2010, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy", isbn = "978-0-309-16035-3", abstract = "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. \n\nThe first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. \n\nThe second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. \n\nAlthough the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.", url = "https://nap.nationalacademies.org/catalog/12997/proceedings-of-a-workshop-on-deterring-cyberattacks-informing-strategies-and", year = 2010, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "William A. Owens and Kenneth W. Dam and Herbert S. Lin", title = "Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities", isbn = "978-0-309-13850-5", abstract = "The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. \n\nCyberattacks--actions intended to damage adversary computer systems or networks--can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.\n\nFocusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.", url = "https://nap.nationalacademies.org/catalog/12651/technology-policy-law-and-ethics-regarding-us-acquisition-and-use-of-cyberattack-capabilities", year = 2009, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Stephen T. Kent and Lynette I. Millett", title = "Who Goes There?: Authentication Through the Lens of Privacy", isbn = "978-0-309-08896-1", abstract = "Who Goes There?: Authentication Through the Lens of Privacy explores authentication\ntechnologies (passwords, PKI, biometrics, etc.) and their implications for the privacy\nof the individuals being authenticated. As authentication becomes ever more ubiquitous,\nunderstanding its interplay with privacy is vital. The report examines numerous\nconcepts, including authentication, authorization, identification, privacy, and security.\nIt provides a framework to guide thinking about these issues when deciding whether\nand how to use authentication in a particular context. The book explains how privacy\nis affected by system design decisions. It also describes government\u2019s unique role\nin authentication and what this means for how government can use authentication\nwith minimal invasions of privacy. In addition, Who Goes There? outlines usability and\nsecurity considerations and provides a primer on privacy law and policy.", url = "https://nap.nationalacademies.org/catalog/10656/who-goes-there-authentication-through-the-lens-of-privacy", year = 2003, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", editor = "Anne Johnson and Lynette I. Millett", title = "Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop", isbn = "978-0-309-44505-4", abstract = "In January 2016, the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Data Breach Aftermath and Recovery for Individuals and Institutions. Participants examined existing technical and policy remediations, and they discussed possible new mechanisms for better protecting and helping consumers in the wake of a breach. Speakers were asked to focus on data breach aftermath and recovery and to discuss ways to remediate harms from breaches. This publication summarizes the presentations and discussions from the workshop.", url = "https://nap.nationalacademies.org/catalog/23559/data-breach-aftermath-and-recovery-for-individuals-and-institutions-proceedings", year = 2016, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Countermeasures Assessment & Security Experts, LLC and Western Management and Consulting, LLC", title = "Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies", abstract = "Since 2009, when NCHRP's last Security 101 report was released, there have been significant advances in transportation security approaches, including new strategies, programs, and ways of doing business that have increased the security of transportation systems as well as ensured their resiliency.Hazards and threats to the system have also continued to evolve since 2009. While the incidence of large-scale terrorist attacks has remained small, transportation agencies are at increasingly greater risk from system-disrupting events due to natural causes, unintentional human intervention, and intentional criminal acts, such as active-shooter incidents. Cyber risks also are increasing and can impact not only data, but the control systems\u2014like tunnel-ventilation systems\u2014operated by transportation agencies.>The TRB National Cooperative Highway Research Program's NCHRP Research Report 930: Update of Security 101: A Physical Security and Cybersecurity Primer for Transportation Agencies provides valuable information about current and accepted practices associated with both physical and cyber security and its applicability to surface transportation.The report is accompanied by a PowerPoint for the project and NCHRP Web-Only Document 266: Developing a Physical and Cyber Security Primer for Transportation Agencies.", url = "https://nap.nationalacademies.org/catalog/25554/update-of-security-101-a-physical-security-and-cybersecurity-primer-for-transportation-agencies", year = 2020, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council and National Academy of Engineering", editor = "Seymour E. Goodman and Herbert S. Lin", title = "Toward a Safer and More Secure Cyberspace", isbn = "978-0-309-10395-4", abstract = "Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit vulnerabilities in the nation\u2019s critical information systems, thereby causing considerable suffering and damage. Online e-commerce business, government agency files, and identity records are all potential security targets.\n\nToward a Safer and More Secure Cyberspace examines these Internet security vulnerabilities and offers a strategy for future research aimed at countering cyber attacks. It also explores the nature of online threats and some of the reasons why past research for improving cybersecurity has had less impact than anticipated, and considers the human resource base needed to advance the cybersecurity research agenda. \nThis book will be an invaluable resource for Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, and others interested in digital security and safety.\n", url = "https://nap.nationalacademies.org/catalog/11925/toward-a-safer-and-more-secure-cyberspace", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Richard Celeste and Dick Thornburgh and Herbert Lin", title = "Asking the Right Questions About Electronic Voting", isbn = "978-0-309-10024-3", abstract = "Many election officials look to electronic voting systems as a means for improving their ability to more effectively conduct and administer elections. At the same time, many information technologists and activists have raised important concerns regarding the security of such systems. Policy makers are caught in the midst of a controversy with both political and technological overtones. The public debate about electronic voting is characterized by a great deal of emotion and rhetoric.\nAsking the Right Questions About Electronic Voting describes the important questions and issues that election officials, policy makers, and informed citizens should ask about the use of computers and information technology in the electoral process\u2014focusing the debate on technical and policy issues that need resolving. The report finds that while electronic voting systems have improved, federal and state governments have not made the commitment necessary for e-voting to be widely used in future elections. More funding, research, and public education are required if e-voting is to become viable.", url = "https://nap.nationalacademies.org/catalog/11449/asking-the-right-questions-about-electronic-voting", year = 2006, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", title = "Securing the Vote: Protecting American Democracy", isbn = "978-0-309-47647-8", abstract = "During the 2016 presidential election, America's election infrastructure was targeted by actors sponsored by the Russian government. Securing the Vote: Protecting American Democracy examines the challenges arising out of the 2016 federal election, assesses current technology and standards for voting, and recommends steps that the federal government, state and local governments, election administrators, and vendors of voting technology should take to improve the security of election infrastructure. In doing so, the report provides a vision of voting that is more secure, accessible, reliable, and verifiable.", url = "https://nap.nationalacademies.org/catalog/25120/securing-the-vote-protecting-american-democracy", year = 2018, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", title = "Decrypting the Encryption Debate: A Framework for Decision Makers", isbn = "978-0-309-47153-4", abstract = "Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats\nfrom a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.\nAt the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted \"end-to-end,\" intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by\ninvestigators.\nDecrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information. \n", url = "https://nap.nationalacademies.org/catalog/25010/decrypting-the-encryption-debate-a-framework-for-decision-makers", year = 2018, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", title = "A 21st Century Cyber-Physical Systems Education", isbn = "978-0-309-45163-5", abstract = "Cyber-physical systems (CPS) are \"engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components.\" CPS can be small and closed, such as an artificial pancreas, or very large, complex, and interconnected, such as a regional energy grid. CPS engineering focuses on managing inter- dependencies and impact of physical aspects on cyber aspects, and vice versa. With the development of low-cost sensing, powerful embedded system hardware, and widely deployed communication networks, the reliance on CPS for system functionality has dramatically increased. These technical developments in combination with the creation of a workforce skilled in engineering CPS will allow the deployment of increasingly capable, adaptable, and trustworthy systems. \n\nEngineers responsible for developing CPS but lacking the appropriate education or training may not fully understand at an appropriate depth, on the one hand, the technical issues associated with the CPS software and hardware or, on the other hand, techniques for physical system modeling, energy and power, actuation, signal processing, and control. In addition, these engineers may be designing and implementing life-critical systems without appropriate formal training in CPS methods needed for verification and to assure safety, reliability, and security. \n\nA workforce with the appropriate education, training, and skills will be better positioned to create and manage the next generation of CPS solutions. A 21st Century Cyber-Physical Systems Education examines the intellectual content of the emerging field of CPS and its implications for engineering and computer science education. This report is intended to inform those who might support efforts to develop curricula and materials; faculty and university administrators; industries with needs for CPS workers; and current and potential students about intellectual foundations, workforce requirements, employment opportunities, and curricular needs.", url = "https://nap.nationalacademies.org/catalog/23686/a-21st-century-cyber-physical-systems-education", year = 2016, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", title = "Making the Nation Safer: The Role of Science and Technology in Countering Terrorism", isbn = "978-0-309-08481-9", abstract = "Vulnerabilities abound in U.S. society. The openness and efficiency of our key infrastructures \u2014 transportation, information and telecommunications systems, health systems, the electric power grid, emergency response units, food and water supplies, and others \u2014 make them susceptible to terrorist attacks. Making the Nation Safer discusses technical approaches to mitigating these vulnerabilities.\nA broad range of topics are covered in this book, including:\n\n Nuclear and radiological threats, such as improvised nuclear devices and \"dirty bombs;\"\n Bioterrorism, medical research, agricultural systems and public health;\n Toxic chemicals and explosive materials;\n Information technology, such as communications systems, data management, cyber attacks, and identification and authentication systems;\n Energy systems, such as the electrical power grid and oil and natural gas systems;\n Transportation systems;\n Cities and fixed infrastructures, such as buildings, emergency operations centers, and tunnels;\n The response of people to terrorism, such as how quality of life and morale of the population can be a target of terrorists and how people respond to terrorist attacks; and\n Linked infrastructures, i.e. the vulnerabilities that result from the interdependencies of key systems.\n\nIn each of these areas, there are recommendations on how to immediately apply existing knowledge and technology to make the nation safer and on starting research and development programs that could produce innovations that will strengthen key systems and protect us against future threats. The book also discusses issues affecting the government's ability to carry out the necessary science and engineering programs and the important role of industry, universities, and states, counties, and cities in homeland security efforts.\nA long term commitment to homeland security is necessary to make the nation safer, and this book lays out a roadmap of how science and engineering can assist in countering terrorism.", url = "https://nap.nationalacademies.org/catalog/10415/making-the-nation-safer-the-role-of-science-and-technology", year = 2002, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Countermeasures Assessment and Security Experts LLC and Western Management and Consulting LLC", title = "Protection of Transportation Infrastructure from Cyber Attacks: A Primer", abstract = "TRB's Protection of Transportation Infrastructure from Cyber Attacks: A Primer provides transportation organizations with reference materials concerning cybersecurity concepts, guidelines, definitions, and standards. The primer is a joint product of two TRB Cooperative Research Programs, and is categorized as Transit Cooperative Research Program (TCRP) Web-Only Document 67 and National Cooperative Highway Research Program (NCHRP) Web-Only Document 221.The Primer delivers strategic, management, and planning information associated with cybersecurity and its applicability to transit and state DOT operations. It includes definitions and rationales that describe the principles and practices that enable effective cybersecurity risk management. The primer provides transportation managers and employees with greater context and information regarding the principles of information technology and operations systems security planning and procedures.The report is supplemented with an Executive Briefing for use as a 20-minute presentation to senior executives on security practices for transit and DOT cyber and industrial control systems. A PowerPoint summary of the project is also available.", url = "https://nap.nationalacademies.org/catalog/23516/protection-of-transportation-infrastructure-from-cyber-attacks-a-primer", year = 2016, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "Transportation Research Board and National Academies of Sciences, Engineering, and Medicine", editor = "Countermeasures Assessment and Security Experts LLC and Western Management and Consulting LLC", title = "Protection of Transportation Infrastructure from Cyber Attacks: A Primer", abstract = "TRB's Protection of Transportation Infrastructure from Cyber Attacks: A Primer provides transportation organizations with reference materials concerning cybersecurity concepts, guidelines, definitions, and standards. The primer is a joint product of two TRB Cooperative Research Programs, and is categorized as Transit Cooperative Research Program (TCRP) Web-Only Document 67 and National Cooperative Highway Research Program (NCHRP) Web-Only Document 221.The Primer delivers strategic, management, and planning information associated with cybersecurity and its applicability to transit and state DOT operations. It includes definitions and rationales that describe the principles and practices that enable effective cybersecurity risk management. The primer provides transportation managers and employees with greater context and information regarding the principles of information technology and operations systems security planning and procedures.The report is supplemented with an Executive Briefing for use as a 20-minute presentation to senior executives on security practices for transit and DOT cyber and industrial control systems. A PowerPoint summary of the project is also available.", url = "https://nap.nationalacademies.org/catalog/23520/protection-of-transportation-infrastructure-from-cyber-attacks-a-primer", year = 2016, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", editor = "Anne Johnson and Lynette I. Millett", title = "Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop", isbn = "978-0-309-49149-5", abstract = "In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop.", url = "https://nap.nationalacademies.org/catalog/25418/beyond-spectre-confronting-new-technical-and-policy-challenges-proceedings-of", year = 2019, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academies of Sciences, Engineering, and Medicine", editor = "Lynette I. Millett and Baruch Fischhoff and Peter J. Weinberger", title = "Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions", isbn = "978-0-309-45529-9", abstract = "Attaining meaningful cybersecurity presents a broad societal challenge. Its complexity and the range of systems and sectors in which it is needed mean that successful approaches are necessarily multifaceted. Moreover, cybersecurity is a dynamic process involving human attackers who continue to adapt. Despite considerable investments of resources and intellect, cybersecurity continues to poses serious challenges to national security, business performance, and public well-being. Modern developments in computation, storage and connectivity to the Internet have brought into even sharper focus the need for a better understanding of the overall security of the systems we depend on.\n\nFoundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance. These strategies seek to ensure the sustained support needed to create an agile, effective research community, with collaborative links across disciplines and between research and practice. This report is aimed primarily at the cybersecurity research community, but takes a broad view that efforts to improve foundational cybersecurity research will need to include many disciplines working together to achieve common goals.", url = "https://nap.nationalacademies.org/catalog/24676/foundational-cybersecurity-research-improving-science-engineering-and-institutions", year = 2017, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "Daniel Jackson and Martyn Thomas and Lynette I. Millett", title = "Software for Dependable Systems: Sufficient Evidence?", isbn = "978-0-309-10394-7", abstract = "The focus of Software for Dependable Systems is a set of fundamental principles that underlie software system dependability and that suggest a different approach to the development and assessment of dependable software.\n\nUnfortunately, it is difficult to assess the dependability of software. The field of software engineering suffers from a pervasive lack of evidence about the incidence and severity of software failures; about the dependability of existing software systems; about the efficacy of existing and proposed development methods; about the benefits of certification schemes; and so on. There are many anecdotal reports, which\u2014although often useful for indicating areas of concern or highlighting promising avenues of research\u2014do little to establish a sound and complete basis for making policy decisions regarding dependability. The committee regards claims of extraordinary dependability that are sometimes made on this basis for the most critical of systems as unsubstantiated, and perhaps irresponsible. This difficulty regarding the lack of evidence for system dependability leads to two conclusions: (1) that better evidence is needed, so that approaches aimed at improving the dependability of software can be objectively assessed, and (2) that, for now, the pursuit of dependability in software systems should focus on the construction and evaluation of evidence.\n\nThe committee also recognized the importance of adopting the practices that are already known and used by the best developers; this report gives a sample of such practices. Some of these (such as systematic configuration management and automated regression testing) are relatively easy to adopt; others (such as constructing hazard analyses and threat models, exploiting formal notations when appropriate, and applying static analysis to code) will require new training for many developers. However valuable, though, these practices are in themselves no silver bullet, and new techniques and methods will be required in order to build future software systems to the level of dependability that will be required.", url = "https://nap.nationalacademies.org/catalog/11923/software-for-dependable-systems-sufficient-evidence", year = 2007, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Research Council", editor = "John L. Hennessy and David A. Patterson and Herbert S. Lin", title = "Information Technology for Counterterrorism: Immediate Actions and Future Possibilities", isbn = "978-0-309-08736-0", abstract = "Information technology (IT) is essential to virtually all of the nation\u2019s critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation\u2019s communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks. \n", url = "https://nap.nationalacademies.org/catalog/10640/information-technology-for-counterterrorism-immediate-actions-and-future-possibilities", year = 2003, publisher = "The National Academies Press", address = "Washington, DC" } @BOOK{NAP author = "National Academy of Sciences", title = "Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum", isbn = "978-0-309-38008-9", abstract = "Individuals, businesses, governments, and society at large have tied their future to information technologies, and activities carried out in cyberspace have become integral to daily life. Yet these activities - many of them drivers of economic development - are under constant attack from vandals, criminals, terrorists, hostile states, and other malevolent actors. In addition, a variety of legitimate actors, including businesses and governments, have an interest in collecting, analyzing, and storing information from and about individuals and organizations, potentially creating security and privacy risks. Cybersecurity is made extremely difficult by the incredible complexity and scale of cyberspace. The challenges to achieving cybersecurity constantly change as technologies advance, new applications of information technologies emerge, and societal norms evolve.\nIn our interconnected world, cyberspace is a key topic that transcends borders and should influence (as well as be influenced by) international relations. As such, both national and international laws will need careful evaluation to help ensure the conviction of cybercriminals, support companies that work internationally, and protect national security. On December 8 and 9, 2014, the Raymond and Beverly Sackler U.S.-U.K. Scientific Forum \"Cybersecurity Dilemmas: Technology, Policy, and Incentives\" examined a broad range of topics including cybersecurity and international relations, privacy, rational cybersecurity, and accelerating progress in cybersecurity. This report summarizes the presentations and discussions from this forum.", url = "https://nap.nationalacademies.org/catalog/21833/cybersecurity-dilemmas-technology-policy-and-incentives-summary-of-discussions-at", year = 2015, publisher = "The National Academies Press", address = "Washington, DC" }