Skip to main content

Currently Skimming:

Report of U.S.-Russian Working Group on Cyberterrorism Issues
Pages 9-13

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 9...
... These activities include several National Academies reports, the 2003 Conference on Grand Challenges in Information Security and Assurance, the curriculum for the six-year program to train cybersecurity specialists at Bauman Moscow State Technical University, and advancements to incorporate cybersecurity into Russian government policy and legal framework.
From page 10...
... NCSD's international objectives include international cooperation with industry and critical infrastructure sectors; increased computer security incident response capabilities through training and technical assistance, adoption and implementation of principles described in OECD Guidelines for the Security of Information Systems and Networks: Toward a Culture of Security;3 and encouragement of other countries' acceptance of the Council of Europe Convention on Cybercrime or individual laws at least as comprehensive (this becomes relevant when criminals are not physically within U.S. jurisdiction)
From page 11...
... power grid and has backup battery power, a backup generator, and analog telephones in case of power failure. Weekly tests are conducted on the generator.
From page 12...
... The main goals for specialist training include · developing a security policy based on international and national standards · using international standards to analyze information security risks · developing a network traffic security policy · applying techniques of information security identification and elimination of information security threats · implementing techniques of information security based on international and national standards · identifying information security risks · modeling attacks and protection technologies · auditing information security systems Special Knowledge Model of Model of protection attacker technique Modeling Initial data Protection Requirements of technique systems Analysis model and Analysis of information requirements of security risks computer systems Technical project Requirements to Requirements to develop Integration with protected computer develop special current protection systems protection means means Fine-tuning of Perimeter security Interface design protection means Probing protected computer systems Using protected computer systems FIGURE 1 Skills for cybercrime prevention specialists at Bauman Moscow State Technical University.
From page 13...
... Enable exchange visits of university scholars studying cybersecurity. The working group believes that academic exchanges are the best way to get experience with alternative curricula for cybersecurity.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.